{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:02:07Z","timestamp":1774368127264,"version":"3.50.1"},"reference-count":13,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017031","type":"journal-article","created":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T16:14:39Z","timestamp":1494346479000},"page":"373-377","source":"Crossref","is-referenced-by-count":2,"title":["Fast algebraic immunity of Boolean functions"],"prefix":"10.3934","volume":"11","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"given":"G\u00e9rard","family":"Cohen","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com ParisTech, department INFRES\/MIC2, CNRS, UMR 5441"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017031-1","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, Boolean functions for cryptography and error correcting codes, in <i>Boolean Models and Methods in Mathematics, Computer Science, and Engineering<\/i> (eds. Y. Crama and P. L. Hammer), Cambridge Univ. Press, 2010,257-397.<\/p>","DOI":"10.1017\/CBO9780511780448.011"},{"key":"key-10.3934\/amc.2017031-2","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet and K. Feng, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, in <i>Adv. Crypt. -ASIACRYPT 2008<\/i>, Springer, 2008,425-440.<\/p>","DOI":"10.1007\/978-3-540-89255-7_26"},{"key":"key-10.3934\/amc.2017031-3","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9978-9"},{"key":"key-10.3934\/amc.2017031-4","doi-asserted-by":"crossref","unstructured":"<p>N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, <i>Advances in Cryptology-CRYPTO 2003<\/i>, Springer, 2003,177-194.<\/p>","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"key-10.3934\/amc.2017031-5","doi-asserted-by":"crossref","unstructured":"<p>N. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, in <i>Advances in Cryptology<\/i>, Springer, 2002,346-359.<\/p>","DOI":"10.1007\/3-540-39200-9_21"},{"key":"key-10.3934\/amc.2017031-6","doi-asserted-by":"crossref","unstructured":"<p>Y. Du, F. Zhang and M. Liu, On the resistance of Boolean functions against fast algebraic attacks, in <i>ICISC 2011<\/i>, Springer, 2012,261-274.<\/p>","DOI":"10.1007\/978-3-642-31912-9_18"},{"key":"key-10.3934\/amc.2017031-7","unstructured":"<p>X. Feng and G. Gong, On algebraic immunity of trace inverse functions over finite fields with characteristic two, Cryptology ePrint Archive: Report 2013\/585.<\/p>"},{"key":"key-10.3934\/amc.2017031-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145690"},{"key":"key-10.3934\/amc.2017031-9","doi-asserted-by":"crossref","unstructured":"<p>W. Meier, E. Pasalic and C. Carlet, Algebraic attacks and decomposition of Boolean functions, in <i>Eurocrypt 2004<\/i>, Springer, 2004,474-491.<\/p>","DOI":"10.1007\/978-3-540-24676-3_28"},{"key":"key-10.3934\/amc.2017031-10","doi-asserted-by":"crossref","unstructured":"<p>Y. Nawaz, G. Gong and K. C. Gupta, Upper bounds on algebraic immunity of Boolean power functions, in <i>13th Int. Workshop Fast Softw. Encrypt.<\/i>, Springer, 2006,375-389.<\/p>","DOI":"10.1007\/11799313_24"},{"key":"key-10.3934\/amc.2017031-11","doi-asserted-by":"crossref","unstructured":"<p>K. Nyberg, Differentially uniform mappings for cryptography, in <i>Eurocrypt 1993<\/i>, Springer, 1994, 55-64.<\/p>","DOI":"10.1007\/3-540-48285-7_6"},{"key":"key-10.3934\/amc.2017031-12","doi-asserted-by":"crossref","unstructured":"<p>E. Pasalic, Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic cryptanalysis, in <i>ICISC 2008<\/i>, Springer, 2008,399-414.<\/p>","DOI":"10.1007\/978-3-642-00730-9_25"},{"key":"key-10.3934\/amc.2017031-13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_2_373.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:59:32Z","timestamp":1772791172000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017031","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}