{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T02:16:37Z","timestamp":1721268997791},"reference-count":5,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1997,2,1]],"date-time":"1997-02-01T00:00:00Z","timestamp":854755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[1997,2]]},"DOI":"10.1016\/s0020-0190(97)00010-0","type":"journal-article","created":{"date-parts":[[2003,4,23]],"date-time":"2003-04-23T20:36:00Z","timestamp":1051130160000},"page":"209-212","source":"Crossref","is-referenced-by-count":11,"title":["Improving bounds for the number of correlation immune Boolean functions"],"prefix":"10.1016","volume":"61","author":[{"given":"Sung Mo","family":"Park","sequence":"first","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Soo Hak","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S0020-0190(97)00010-0_BIB1","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","article-title":"A spectral characterization of correlation-immune combining functions","volume":"34","author":"Guo-Zhen","year":"1988","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"10.1016\/S0020-0190(97)00010-0_BIB2","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BF00190802","article-title":"Enumerating boolean functions of cryptographic significance","volume":"2","author":"Mitchell","year":"1990","journal-title":"J. Cryptology"},{"key":"10.1016\/S0020-0190(97)00010-0_BIB3","series-title":"Contemporary Cryptography: The Science of Information Integrity","first-page":"65","article-title":"Stream ciphers","author":"Rueppel","year":"1992"},{"key":"10.1016\/S0020-0190(97)00010-0_BIB4","doi-asserted-by":"crossref","unstructured":"T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Inform. Theory 30 (5) 91984) 776\u2013779.","DOI":"10.1109\/TIT.1984.1056949"},{"issue":"3","key":"10.1016\/S0020-0190(97)00010-0_BIB5","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00202268","article-title":"Further enumerating boolean functions of cryptographic significance","volume":"8","author":"Yang","year":"1995","journal-title":"J. Cryptology"}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019097000100?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019097000100?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T18:57:02Z","timestamp":1620241022000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020019097000100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,2]]},"references-count":5,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,2]]}},"alternative-id":["S0020019097000100"],"URL":"https:\/\/doi.org\/10.1016\/s0020-0190(97)00010-0","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[1997,2]]}}}