{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:12:44Z","timestamp":1715299964157},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2022,2,1]]},"DOI":"10.1587\/transfun.2021eap1037","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T22:07:56Z","timestamp":1627942076000},"page":"93-99","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions"],"prefix":"10.1587","volume":"E105.A","author":[{"given":"Jiao","family":"DU","sequence":"first","affiliation":[{"name":"College of Mathematics and Information Science, Henan Normal University"}]},{"given":"Shaojing","family":"FU","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology"}]},{"given":"Longjiang","family":"QU","sequence":"additional","affiliation":[{"name":"College of Liberal Arts and Sciences, National University of Defense Technology"}]},{"given":"Chao","family":"LI","sequence":"additional","affiliation":[{"name":"College of Liberal Arts and Sciences, National University of Defense Technology"}]},{"given":"Tianyin","family":"WANG","sequence":"additional","affiliation":[{"name":"School of Mathematical Science, Luoyang Normal University"},{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology"}]},{"given":"Shanqi","family":"PANG","sequence":"additional","affiliation":[{"name":"College of Mathematics and Information Science, Henan Normal University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] J. Pieprzyk and C. Qu, \u201cFast hashing and rotation symmetric functions,\u201d J. Univers. Comput. Sci., vol.5, no.1, pp.20-31, 1999."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] P. St\u0103nic\u0103, S. Maitra, and J. Clark, \u201cResults on rotation symmetric bent and correlation immune Boolean functions,\u201d Fast Software Encryption Workshop (FSE 2004), New Delhi, India, LNCS3017, pp.161-177, Springer Verlag, 2004. 10.1007\/978-3-540-25937-4_11","DOI":"10.1007\/978-3-540-25937-4_11"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S. Kavut, S. Maitra, S. Sarkar, and M. Yucel, \u201cEnumeration of 9-variable rotation symmetric Boolean functions having nonlinearity &gt; 240,\u201d INDOCRYPT 2006, (LNCS, 4329), pp.266-279, Springer-Verlag. 10.1007\/11941378_19","DOI":"10.1007\/11941378_19"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] C. Carlet, D.K. Dalai, K.C. Gupta, and S. Maitra, \u201cAlgebraic immunity for cryptographically significant Boolean functions: Analysis and construction,\u201d IEEE Trans. Inf. Theory, vol.52, no.7, pp.3105-3121, 2006. 10.1109\/tit.2006.876253","DOI":"10.1109\/TIT.2006.876253"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] S. Kavut, S. Maitra, and M.D. Y\u00fccel, \u201cSearch for Boolean functions with excellent profiles in the rotation symmetric class,\u201d IEEE Trans. Inf. Theory, vol.53, no.5, pp.1743-1751, May 2007. 10.1109\/tit.2007.894696","DOI":"10.1109\/TIT.2007.894696"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] P. St\u0103nic\u0103, and S. Maitra, \u201cRotation symmetric Boolean functions count and cryptographic properties,\u201d Discrete Appl. Math., vol.156, no.10, pp.1567-1580, 2008. 10.1016\/j.dam.2007.04.029","DOI":"10.1016\/j.dam.2007.04.029"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] S. Su and X. Tang, \u201cConstruction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity,\u201d Des. Codes Cryptogr., vol.71, pp.183-199, 2014. 10.1007\/s10623-012-9727-x","DOI":"10.1007\/s10623-012-9727-x"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] G. Gao, T.W. Cusick, and W. Liu, \u201cFamilies of rotation symmetric functions with useful cryptographic properties,\u201d IET Information Security, vol.8, no.6, pp.297-302, 2014. 10.1049\/iet-ifs.2013.0241","DOI":"10.1049\/iet-ifs.2013.0241"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] S. Fu, C. Li, K. Matsuura, and L. Qu, \u201cConstruction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity,\u201d Sci. China Inf. Sci., vol.56, no.3, pp.1-9, 2013. 10.1007\/s11432-011-4350-4","DOI":"10.1007\/s11432-011-4350-4"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] J. Du, Q. Wen, J. Zhang, and S. Pang, \u201cConstructions of resilient rotation symmetric Boolean functions on given number of variables,\u201d IET Information Security, vol.8, no.5, pp.265-272, 2014. 10.1049\/iet-ifs.2013.0090","DOI":"10.1049\/iet-ifs.2013.0090"},{"key":"11","unstructured":"[11] J. Du, S. Pang, Q. Wen, and X. Liao, \u201cConstruction and count of 1-resilient rotation symmetric Boolean functions on <i>p<sup>r<\/sup><\/i> variables,\u201d Chinese J. Electron., vol.23, no.4, pp.816-820, 2014."},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] S. Pang, X. Wang, J. Wang, J. Du, and M. Feng, \u201cConstruction and count of 1-resilient rotation symmetric Boolean functions,\u201d Inform. Sciences, vol.450, pp.336-342, June 2018. 10.1016\/j.ins.2018.03.052","DOI":"10.1016\/j.ins.2018.03.052"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] J. Du, S. Fu, L. Qu, C. Li, and S. Pang, \u201cNew constructions of <i>q<\/i>-variable 1-resilient rotation symmetric functions over <i>F<sub>p<\/sub><\/i>,\u201d Sci. China Inf. Sci., vol.59, no.7, 079102, 2016. 10.1007\/s11432-016-5569-x","DOI":"10.1007\/s11432-016-5569-x"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] J. Du, L. Qu, C. Li, and X. Liao, \u201cConstructing 1-resilient rotation symmetric functions over <i>F<sub>p<\/sub><\/i> with <i>q<\/i> variables through special orthogonal arrays,\u201d Advances in Mathematics of Communications, vol.14, no.2, pp.247-263, 2020. 10.3934\/amc.2020018","DOI":"10.3934\/amc.2020018"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] L. Sun, J. Liu, and F. Fu, \u201cSecondary constructions of RSBFs with good cryptographic properties,\u201d Inform. Process. Lett., vol.147, pp.44-48, 2019. 10.1016\/j.ipl.2019.03.004","DOI":"10.1016\/j.ipl.2019.03.004"},{"key":"16","unstructured":"[16] D.R. Stinson, \u201cResilient functions and large sets of orthogonal arrays,\u201d Congressus Numer., vol.92, pp.105-110, 1993."},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] W. Zhang and E. Pasalic, \u201cGeneralized Maiorana-McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties,\u201d IEEE Trans. Inf. Theory, vol.60, no.10, pp.6681-6695, 2014. 10.1109\/tit.2014.2345772","DOI":"10.1109\/TIT.2014.2345772"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] W. Zhang and E. Pasalic, \u201cConstructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes,\u201d IEEE Trans. Inf. Theory, vol.60, no.3, pp.1638-1651, 2014. 10.1109\/tit.2014.2300067","DOI":"10.1109\/TIT.2014.2300067"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] N. Li, L. Qu, W. Qi, G. Feng, C. Li, and D. Xie, \u201cOn the construction of Boolean functions with optimal algebraic immunity,\u201d IEEE Trans. Inform. Theory, vol.54, no.3, pp.1330-1334, 2008. 10.1109\/tit.2007.915914","DOI":"10.1109\/TIT.2007.915914"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] L. Qu, Y. Tan, C. Tan, and C. Li, \u201cConstructing differentially 4-uniform permutations over <i>F<\/i><sub>2<sup>2<i>k<\/i><\/sup><\/sub> via the switching method,\u201d IEEE Trans. Inf. Theory, vol.59, no.7, pp.4675-4686, 2013. 10.1109\/tit.2013.2252420","DOI":"10.1109\/TIT.2013.2252420"},{"key":"21","unstructured":"[21] S. Sarkar and S. Maitra, \u201cConstruction of rotation symmetric Boolean functions with optimal algebraic immunity,\u201d Comput. Syst., vol.12, no.3, pp.267-284, 2009."},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] G. Gao, X. Zhang, W. Liu, and C. Carlet, \u201cConstructions of quadratic and cubic rotation symmetric bent functions,\u201d IEEE Trans. Inf. Theory, vol.58, no.7, pp.4908-4913, 2012. 10.1109\/tit.2012.2193377","DOI":"10.1109\/TIT.2012.2193377"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[25] R.E.A.C. Paley, \u201cOn orthogonal matrices,\u201d J. Math. Phys., vol.12, no.1-4, pp.311-320, 1933. 10.1002\/sapm1933121311","DOI":"10.1002\/sapm1933121311"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E105.A\/2\/E105.A_2021EAP1037\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T05:28:49Z","timestamp":1715232529000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E105.A\/2\/E105.A_2021EAP1037\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2021eap1037","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,1]]},"article-number":"2021EAP1037"}}