{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:31:47Z","timestamp":1649093507396},"reference-count":28,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.3934\/amc.2016048","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T18:57:08Z","timestamp":1478285828000},"page":"895-919","source":"Crossref","is-referenced-by-count":0,"title":["Variation on correlation immune Boolean and vectorial functions"],"prefix":"10.3934","volume":"10","author":[{"given":"Jian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"given":"Lusheng","family":"Chen","sequence":"first","affiliation":[]}],"member":"2321","reference":[{"key":"1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","article-title":"Privacy amplification by public discussion,","volume":"17","author":"C. H. Bennett","year":"1988","journal-title":"<em>SIAM J. Comp.<\/em>"},{"key":"2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-540-30556-9_11","article-title":"On Boolean functions with generalized cryptographic properties,","author":"A. Braeken","year":"2004","journal-title":"in <em>Progr. Crypt. - INDOCRYPT 2004<\/em>"},{"key":"3","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/ITW.2002.1115421","article-title":"On the correlations between a combining functions and functions of fewer variables,","author":"A. Canteaut","year":"2002","journal-title":"in <em>Proc. Inform. Theory Workshop 2002<\/em>"},{"key":"4","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","article-title":"Improved fast correlation attacks using parity-check equations of weight $4$ and $5$,","author":"A. Canteaut","year":"2000","journal-title":"in <em>Adv. Crypt. - EUROCRYPT 2000<\/em>"},{"key":"5","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/3-540-69053-0_29","article-title":"More correlation-immune and resilient functions over Galois fields and Galois rings,","author":"C. Carlet","year":"1997","journal-title":"in <em>Adv. Crypt. - EUROCRYPT'97<\/em>"},{"key":"6","first-page":"131","article-title":"On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions,","author":"C. Carlet","year":"2002","journal-title":"in <em>Proc. SETA'01 Seq. Appl.<\/em>"},{"key":"7","first-page":"257","article-title":"Boolean functions for cryptography and error correcting codes,","author":"C. Carlet","year":"2010","journal-title":"in <em>Boolean Models and Methods in Mathematics"},{"key":"8","first-page":"398","article-title":"Vectorial Boolean functions for cryptography,","author":"C. Carlet","year":"2010","journal-title":"in <em>Boolean Models and Methods in Mathematics"},{"key":"9","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11863854_32","article-title":"On immunity profile of Boolean functions,","author":"C. Carlet","year":"2006","journal-title":"in <em>Proc Seq. Appl. - SETA 2006<\/em>"},{"key":"10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1006\/ffta.2001.0332","article-title":"Spectral domain analysis of correlation immune and resilient Boolean functions,","volume":"8","author":"C. Carlet","year":"2002","journal-title":"<em>Finite Fields Appl.<\/em>"},{"key":"11","first-page":"181","article-title":"A simple algorithm for fast correlation attacks on stream ciphers,","author":"V. V. Chepyzhov","year":"2000","journal-title":"in <em>Fast Software Encryption"},{"key":"12","first-page":"396","article-title":"The bit extraction problem or $t$-resilient functions,","author":"B. Chor","year":"1985","journal-title":"in <em>26th IEEE Symp. Found. Comp. Sci.<\/em>"},{"key":"13","article-title":"<em>Covering Codes<\/em>,","author":"G. Cohen","year":"1997","journal-title":"North-Holland"},{"key":"14","article-title":"<em>Elementary Hadamard Difference Sets<\/em>,","author":"J. F. Dillon","year":"1974","journal-title":"Ph.D. thesis"},{"key":"15","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TIT.2002.807297","article-title":"A construction of resilient functions with high nonlinearity,","volume":"49","author":"T. Johansson","year":"2003","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"16","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/3-540-69053-0_28","article-title":"Almost $k$-wise independent sample spaces and their cryptologic applications,","volume":"14","author":"K. Kurosawa","year":"2001","journal-title":"<em>J. Crypt.<\/em>"},{"key":"17","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIT.2004.836684","article-title":"Almost security of cryptographic Boolean functions,","volume":"50","author":"K. Kurosawa","year":"2004","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"18","doi-asserted-by":"publisher","first-page":"4742","DOI":"10.1109\/TIT.2009.2027483","article-title":"Analysis and construction of correctors,","volume":"55","author":"P. Lacharme","year":"2009","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"19","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1587\/transfun.E97.A.1405","article-title":"Highly nonlinear resilient functions without linear structures,","volume":"E97-A","author":"J. Liu","year":"2014","journal-title":"<em>IEICE Trans. Fundam.<\/em>"},{"key":"20","article-title":"<em>The Theory of Error-Correcting Codes<\/em>,","author":"F. J. MacWilliams","year":"1977","journal-title":"North-Holland"},{"key":"21","first-page":"301","article-title":"Fast correlation attacks on stream ciphers,","author":"W. Meier","year":"1988","journal-title":"in <em>Adv. Crypt. - EUROCRYPT'88<\/em>"},{"key":"22","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-44598-6_32","article-title":"Nonlinearity bounds and constructions of resilient Boolean functions,","author":"P. Sarkar","year":"2000","journal-title":"in <em>Adv. Crypt. - CRYPTO 2000<\/em>"},{"key":"23","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","article-title":"Correlation immunity of nonlinear combining functions for cryptographic applications,","volume":"30","author":"T. Siegenthaler","year":"1984","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"24","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","article-title":"Decrypting a class of stream ciphers using ciphertext only,","volume":"C-34","author":"T. Siegenthaler","year":"1985","journal-title":"<em>IEEE Trans. Comp.<\/em>"},{"key":"25","first-page":"66","article-title":"New constructions of resilient Boolean functions with maximum nonlinearity,","author":"Y. V. Tarannikov","year":"2001","journal-title":"in <em>Proc. 8th Int. Workshop FSE 2001<\/em>"},{"key":"26","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","article-title":"A spectral characterization of correlation-immune combining functions,","volume":"34","author":"G. Z. Xiao","year":"1988","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"27","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TIT.2014.2300067","article-title":"Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes,","volume":"60","author":"W. Zhang","year":"2014","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"28","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/18.623184","article-title":"Cryptographically resilient functions,","volume":"43","author":"X.-M. Zhang","year":"1997","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:53:05Z","timestamp":1498359185000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016048","relation":{},"ISSN":["1930-5346"],"issn-type":[{"value":"1930-5346","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}