{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:51:28Z","timestamp":1772808688670,"version":"3.50.1"},"reference-count":8,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2018]]},"DOI":"10.3934\/amc.2018007","type":"journal-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T23:52:21Z","timestamp":1523490741000},"page":"115-122","source":"Crossref","is-referenced-by-count":4,"title":["Generalized nonlinearity of &lt;inline-formula&gt;&lt;tex-math id=\"M1\"&gt;$ S$&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-boxes"],"prefix":"10.3934","volume":"12","author":[{"given":"Sugata","family":"Gangopadhyay","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[{"name":"Cryptology and Security Research Unit, R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata 700108, India"}]},{"given":"Nishant","family":"Sinha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee 247667, India"}]},{"given":"Pantelimon","family":"St\u01cenic\u01ce","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Naval Postgraduate School, Monterey, CA 93943-5216, USA"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2018007-1"},{"key":"key-10.3934\/amc.2018007-2"},{"key":"key-10.3934\/amc.2018007-3"},{"key":"key-10.3934\/amc.2018007-4","doi-asserted-by":"crossref","unstructured":"<p>Y. Lu and Y. Desmedt, Bias analysis of a certain problem with applications to E0 and Shannon ciper, in <i>ICISC 2010<\/i>, 2011, 16-28.<\/p>","DOI":"10.1007\/978-3-642-24209-0_2"},{"key":"key-10.3934\/amc.2018007-5","doi-asserted-by":"crossref","unstructured":"<p>M. Matsui, Linear cryptanalysis method for DES cipher, in <i>EUROCRYPT'93<\/i>, Springer, 1994,386-397.<\/p>","DOI":"10.1007\/3-540-48285-7_33"},{"key":"key-10.3934\/amc.2018007-6","unstructured":"<p>R. O'Donnell,  <i>Analysis of Boolean Functions<\/i>, Cambridge Univ. Press, 2014.<\/p>"},{"key":"key-10.3934\/amc.2018007-7","unstructured":"<p>M. G. Parker, Generalised <i>S<\/i>-box nonlinearity, NESSIE Public Document, 11. 02. 03: NES\/DOC\/UIB\/WP5\/020\/A.<\/p>"},{"key":"key-10.3934\/amc.2018007-8","doi-asserted-by":"crossref","unstructured":"<p>D. R. Stinson,  <i>Cryptography: Theory and Practice<\/i>, 3rd Edition, Chapman and Hall\/CRC, 2005.<\/p>","DOI":"10.1201\/9781420057133"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2018_1_115.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:06:15Z","timestamp":1772791575000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2018007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2018007","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}