{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T11:02:48Z","timestamp":1648897368200},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1007\/s11432-010-3106-x","type":"journal-article","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T05:03:10Z","timestamp":1278651790000},"page":"1379-1396","source":"Crossref","is-referenced-by-count":10,"title":["Identification and construction of Boolean functions with maximum algebraic immunity"],"prefix":"10.1007","volume":"53","author":[{"given":"MeiCheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"DingYi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"YuSong","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,10]]},"reference":[{"key":"3106_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology-EUROCRYPT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-EUROCRYPT 2003, LNCS Vol. 2656. Berlin, Heidelberg: Springer, 2003. 345\u2013359"},{"key":"3106_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology-CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-CRYPTO 2003, LNCS Vol. 2729. Berlin, Heidelberg: Springer, 2003. 176\u2013194"},{"key":"3106_CR3","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology-EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier W, Pasalic E, Carlet C. Algebraic attacks and decomposition of Boolean functions. In: Advances in Cryptology-EUROCRYPT 2004, LNCS Vol. 3027. Berlin, Heidelberg: Springer, 2004. 474\u2013491"},{"key":"3106_CR4","series-title":"LNCS","first-page":"98","volume-title":"FSE 2005","author":"D. K. Dalai","year":"2005","unstructured":"Dalai D K, Gupta K C, Maitra S. Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In: FSE 2005, LNCS Vol. 3557. Berlin, Heidelberg: Springer, 2005. 98\u2013111"},{"key":"3106_CR5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D. K. Dalai","year":"2006","unstructured":"Dalai D K, Maitra S, Sarkar S. Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Design Code Cryptography, 2006, 40: 41\u201358","journal-title":"Design Code Cryptography"},{"key":"3106_CR6","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/11596219_4","volume-title":"Progress in Cryptology-INDOCRYPT 2005","author":"A. Braeken","year":"2005","unstructured":"Braeken A, Preneel B. On the algebraic immunity of symmetric Boolean functions. In: Progress in Cryptology-INDOCRYPT 2005, LNCS Vol. 3797. Berlin, Heidelberg: Springer, 2005. 35\u201348"},{"key":"3106_CR7","doi-asserted-by":"crossref","first-page":"2908","DOI":"10.1109\/TIT.2007.901189","volume":"53","author":"L. J. Qu","year":"2007","unstructured":"Qu L J, Li C, Feng K Q. A note on symmetric Boolean functions with maximum algebraic immunity in oddnumber of variables. IEEE Trans Inf Theory, 2007, 53: 2908\u20132910","journal-title":"IEEE Trans Inf Theory"},{"key":"3106_CR8","first-page":"120","volume":"51","author":"L.J. Qu","year":"2008","unstructured":"Qu LJ, Li C. On the 2m-variable symmetric Boolean functions with maximum algebraic immunity. Sci China Ser F-Inf Sci, 2008, 51: 120\u2013127","journal-title":"Sci China Ser F-Inf Sci"},{"key":"3106_CR9","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TIT.2006.872977","volume":"52","author":"N. Li","year":"2006","unstructured":"Li N, Qi W F. Symmetric Boolean function with maximum algebraic immunity depending on an odd number of variables. IEEE Trans Inf Theory, 2006, 52: 2271\u20132273","journal-title":"IEEE Trans Inf Theory"},{"key":"3106_CR10","unstructured":"Qu L J, Feng G Z, Li C. On the Boolean functions with maximum possible algebraic immunity: construction and a lower bound of the count. Available at http:\/\/eprint.iacr.org\/2005\/449"},{"key":"3106_CR11","unstructured":"Li N, Qi W F. Construction and count of Boolean functions of an odd number of variables with maximum algebraic immunity. Available at http:\/\/arxiv.org\/abs\/cs\/0605139"},{"key":"3106_CR12","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N. Li","year":"2008","unstructured":"Li N, Qu L J, Qi W F, et al. On the construction of Boolean Functions with optimal algebraic immunity. IEEE Trans Inf Theory, 2008, 54: 1330\u20131334","journal-title":"IEEE Trans Inf Theory"},{"key":"3106_CR13","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s11432-007-0027-4","volume":"50","author":"N. Li","year":"2007","unstructured":"Li N, Qi W F. Boolean functions of an odd number of variables with maximum algebraic immunity. Sci China Ser F-Inf Sci, 2007, 50: 307\u2013317","journal-title":"Sci China Ser F-Inf Sci"},{"key":"3106_CR14","doi-asserted-by":"crossref","unstructured":"Carlet C. A method of construction of balanced functions with optimum algebraic immunity. Available at http:\/\/eprint.iacr.org\/2006\/149","DOI":"10.1109\/ISIT.2007.4557094"},{"key":"3106_CR15","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume-title":"ASIACRYPT 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet C, Feng K Q. An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: ASIACRYPT 2008, LNCS Vol. 5350. Berlin, Heidelberg: Springer, 2008. 425\u2013440"},{"key":"3106_CR16","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/s11432-009-0007-y","volume":"52","author":"W. Y. Zhang","year":"2009","unstructured":"Zhang W Y, Wu C K, Liu X Z. Construction and enumeration of Boolean functions with maximum algebraic immunity. Sci China Ser F-Inf Sci, 2009, 52: 32\u201340","journal-title":"Sci China Ser F-Inf Sci"},{"key":"3106_CR17","doi-asserted-by":"crossref","unstructured":"Carlet C. Boolean functions for cryptography and error correcting codes. In: Crama Y, Hammer P, eds. Boolean Methods and Models. Cambridge: Cambridge University Press, in press","DOI":"10.1017\/CBO9780511780448.011"},{"key":"3106_CR18","series-title":"LNCS","first-page":"120","volume-title":"WCC 2005","author":"A. Canteaut","year":"2006","unstructured":"Canteaut A. Open problems related to algebraic attacks on stream ciphers. In: WCC 2005, LNCS Vol. 3969. Berlin, Heidelberg: Springer, 2006. 120\u2013134"},{"key":"3106_CR19","series-title":"LNCS","first-page":"92","volume-title":"Progress in Cryptology-INDOCRYPT 2004","author":"D. K. Dalai","year":"2005","unstructured":"Dalai D K, Gupta K C, Maitra S. Results on algebraic immunity for cryptographically significant Boolean functions. In: Progress in Cryptology-INDOCRYPT 2004, LNCS Vol. 3348. Berlin, Heidelberg: Springer, 2005. 92\u2013106"},{"key":"3106_CR20","volume-title":"The theory of error correcting codes","author":"F. J. MacWilliams","year":"1977","unstructured":"MacWilliams F J, Sloane N J A. The theory of error correcting codes. New York: North-Holland, 1977"},{"key":"3106_CR21","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1006\/jcta.1996.0038","volume":"74","author":"I. Krasikov","year":"1996","unstructured":"Krasikov I, Litsyn S. On integral zeros of Krawtchouk polynomials. J Combin Theory Ser A, 1996, 74: 71\u201399","journal-title":"J Combin Theory Ser A"},{"key":"3106_CR22","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1515\/156939206779238418","volume":"16","author":"M. S. Lobanov","year":"2006","unstructured":"Lobanov M S. Exact relation between nonlinearity and algebraic immunity. Discrete Math Appl, 2006, 16: 453\u2013460","journal-title":"Discrete Math Appl"},{"key":"3106_CR23","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1007\/s11432-010-0064-2","volume":"53","author":"Y. S. Du","year":"2010","unstructured":"Du Y S, Pei D Y. Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. Sci China Inf Sci, 2010, 53: 780\u2013787","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-3106-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-3106-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-3106-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:36:04Z","timestamp":1559388964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-3106-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["3106"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-3106-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}