{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:17:17Z","timestamp":1725603437275},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242083"},{"type":"electronic","value":"9783642242090"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24209-0_21","type":"book-chapter","created":{"date-parts":[[2011,8,29]],"date-time":"2011-08-29T04:37:43Z","timestamp":1314592663000},"page":"311-324","source":"Crossref","is-referenced-by-count":1,"title":["On Equivalence Classes of Boolean Functions"],"prefix":"10.1007","author":[{"given":"Qichun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"21_CR1","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C. Carlet","year":"2006","unstructured":"Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory\u00a052(7), 3105\u20133121 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11596219_4","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"A. Braeken","year":"2005","unstructured":"Braeken, A., Preneel, B.: On the algebraic immunity of symmetric Boolean functions. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 35\u201348. Springer, Heidelberg (2005)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11502760_7","volume-title":"Fast Software Encryption","author":"D.K. Dalai","year":"2005","unstructured":"Dalai, D.K., Maitra, K.C., Maitra, S.: Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 98\u2013111. Springer, Heidelberg (2005)"},{"issue":"1","key":"21_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D.K. Dalai","year":"2006","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Baisc theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr\u00a040(1), 41\u201358 (2006)","journal-title":"Des. Codes Cryptogr"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11935230_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"N. Li","year":"2006","unstructured":"Li, N., Qi, W.-F.: Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 84\u201398. Springer, Heidelberg (2006)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-00730-9_25","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"E. Pasalic","year":"2009","unstructured":"Pasalic, E.: Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 399\u2013414. Springer, Heidelberg (2009)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 425\u2013440. Springer, Heidelberg (2008)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Tu, Z., Deng, Y.: A Conjecture on Binary String and its Application on constructing Boolean Functions of Optimal Algebraic Immunity. Des. Codes Cryptogr (2010), Online First Articles. doi:10.1007\/s10623-010-9413-9","DOI":"10.1007\/s10623-010-9413-9"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01877-0_1","volume-title":"Coding and Cryptology","author":"C. Carlet","year":"2009","unstructured":"Carlet, C., Feng, K.: An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity. In: Chee, Y.M., Li, C., Ling, S., Wang, H., Xing, C. (eds.) IWCC 2009. LNCS, vol.\u00a05557, pp. 1\u201311. Springer, Heidelberg (2009)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast Algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-77272-9_10","volume-title":"Cryptography and Coding","author":"N. Courtois","year":"2007","unstructured":"Courtois, N., Bard, G.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 152\u2013169. Springer, Heidelberg (2007)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic Attacks on Combiners with Memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013175. Springer, Heidelberg (2003)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/3-540-45961-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"W. Meier","year":"1988","unstructured":"Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 301\u2013314. Springer, Heidelberg (1988)"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-44598-6_19","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"T. Johansson","year":"2000","unstructured":"Johansson, T., J\u00f6nsson, F.: Fast Correlation Attacks through Reconstruction of Linear Polynomials. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 300\u2013315. Springer, Heidelberg (2000)"},{"key":"21_CR16","unstructured":"Carlet, C.: On a weakness of the Tu-Deng function and its repair. Cryptology ePrint Archive 2009\/606 (2009), \n \n http:\/\/eprint.iacr.org\/"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-13858-4_3","volume-title":"Fast Software Encryption","author":"S. R\u00f8njom","year":"2010","unstructured":"R\u00f8njom, S., Cid, C.: Nonlinear Equivalence of Stream Ciphers. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 40\u201354. Springer, Heidelberg (2010), \n \n http:\/\/www.isg.rhul.ac.uk\/~ccid\/publications\/NL-equivalence.pdf"},{"issue":"3","key":"21_CR18","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"A20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. J. Comb. Theory\u00a0A20(3), 300\u2013305 (1976)","journal-title":"J. Comb. Theory"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"issue":"6","key":"21_CR20","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1109\/TIT.2010.2046195","volume":"56","author":"Q. Wang","year":"2010","unstructured":"Wang, Q., Peng, J., Kan, H., Xue, X.: Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials. IEEE Trans. Inf. Theory\u00a056(6), 3048\u20133053 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-642-21518-6_28","volume-title":"Information Security and Cryptology","author":"Q. Wang","year":"2011","unstructured":"Wang, Q., Johansson, T.: A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. In: Lai, X., Yung, M., Lin, D. (eds.) INSCRYPT 2010. LNCS, vol.\u00a06584, pp. 404\u2013414. Springer, Heidelberg (2011)"},{"key":"21_CR22","unstructured":"Rizomiliotis, P.: On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks. Des. Codes Cryptogr, \n \n http:\/\/www.springerlink.com\/content\/yj27532v5481857v\/"},{"issue":"2","key":"21_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K. Feng","year":"2009","unstructured":"Feng, K., Liao, Q., Yang, J.: Maximal values of generalized algebraic immunity. Des. Codes Cryptogr\u00a050(2), 243\u2013252 (2009)","journal-title":"Des. Codes Cryptogr"},{"key":"21_CR24","unstructured":"Liu, M., Lin, D.: Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. ArXiv: 0910.4632v1 [cs.CR]"},{"key":"21_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-77224-8_37","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"S. Kavut","year":"2007","unstructured":"Kavut, S., Yucel, M.: Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242. In: Bozta\u015f, S., Lu, H.-F. (eds.) AAECC 2007. LNCS, vol.\u00a04851, pp. 321\u2013329. Springer, Heidelberg (2007)"},{"issue":"6","key":"21_CR26","first-page":"34","volume":"15","author":"M.S. Lobanov","year":"2008","unstructured":"Lobanov, M.S.: Tight bounds between algebraic immunity and high-order nonlinearities. Diskretn. Anal. Issled. Oper\u00a015(6), 34\u201347 (2008)","journal-title":"Diskretn. Anal. Issled. Oper"},{"key":"21_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/11818175_35","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"C. Carlet","year":"2006","unstructured":"Carlet, C.: On the higher order nonlinearities of algebraic immune functions. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 584\u2013601. Springer, Heidelberg (2006)"},{"issue":"1","key":"21_CR28","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TIT.2006.887494","volume":"53","author":"C. Carlet","year":"2007","unstructured":"Carlet, C., Mesnager, S.: Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes. IEEE Trans. Inf. Theory\u00a053(1), 162\u2013173 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"21_CR29","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1109\/TIT.2007.915704","volume":"54","author":"C. Carlet","year":"2008","unstructured":"Carlet, C.: Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications. IEEE Trans. Inf. Theory\u00a054(3), 1262\u20131272 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"21_CR30","unstructured":"Lobanov, M.S.: Tight bounds between algebraic immunity and nonlinearities of high orders. Cryptology ePrint Archive 2007\/444 (2007), \n \n http:\/\/eprint.iacr.org\/"},{"key":"21_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-85912-3_31","volume-title":"Sequences and Their Applications - SETA 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet, C.: On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol.\u00a05203, pp. 345\u2013367. Springer, Heidelberg (2008)"},{"issue":"8","key":"21_CR32","doi-asserted-by":"publisher","first-page":"3656","DOI":"10.1109\/TIT.2008.926360","volume":"54","author":"S. Mesnager","year":"2008","unstructured":"Mesnager, S.: Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity. IEEE Trans. Inf. Theory\u00a054(8), 3656\u20133662 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"21_CR33","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S. R\u00f8njom","year":"2007","unstructured":"R\u00f8njom, S., Helleseth, T.: A New Attack on the Filter Generator. IEEE Trans. Inf. Theory\u00a053(5), 1752\u20131758 (2007)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24209-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T13:48:06Z","timestamp":1554126486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24209-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242083","9783642242090"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24209-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}