{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T19:50:02Z","timestamp":1723060202224},"reference-count":34,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.3934\/amc.2014.8.153","type":"journal-article","created":{"date-parts":[[2014,5,13]],"date-time":"2014-05-13T15:49:09Z","timestamp":1399996149000},"page":"153-165","source":"Crossref","is-referenced-by-count":7,"title":["Concatenations of the hidden weighted bit function and their cryptographic properties"],"prefix":"10.3934","volume":"8","author":[{"given":"Qichun","family":"Wang","sequence":"first","affiliation":[]},{"name":",Temasek Laboratories, National University of Singapore, 117411","sequence":"first","affiliation":[]},{"given":"Chik","family":"How Tan","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]},{"name":",Department of Applied Mathematics, Naval Postgraduate School, Monterey, CA 93943-5216","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/12.73590","article-title":"On the complexity of VLSI implementations and graph representations of Boolean functions with application to integer multiplication,","volume":"40","author":"R. E. Bryant","year":"1991","journal-title":"IEEE Trans. Comput.<\/em>"},{"key":"2","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/11818175_35","article-title":"On the higher order nonlinearities of algebraic immune functions,","author":"C. Carlet","year":"2006","journal-title":"in Advances in Cryptology - CRYPTO 2006<\/em>"},{"key":"3","first-page":"257","article-title":"Boolean functions for cryptography and error correcting codes,","author":"C. Carlet","year":"2010","journal-title":"in Boolean Models and Methods in Mathematics"},{"key":"4","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","article-title":"Algebraic immunity for cryptographically significant Boolean functions: analysis and construction,","volume":"52","author":"C. Carlet","year":"2006","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"5","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","article-title":"An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity,","author":"C. Carlet","year":"2008","journal-title":"in Advances in Cryptology - ASIACRYPT 2008<\/em>"},{"key":"6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01877-0_1","article-title":"An infinite class of balanced vectorial Boolean functions with optimum algebraic immunity and good nonlinearity,","author":"C. Carlet","year":"2009","journal-title":"in IWCC 2009<\/em>"},{"key":"7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","article-title":"Fast algebraic attacks on stream ciphers with linear feedback,","author":"N. Courtois","year":"2003","journal-title":"in Advances in Cryptology - CRYPTO 2003<\/em>"},{"key":"8","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","article-title":"Algebraic attacks on stream ciphers with linear feedback,","author":"N. Courtois","year":"2003","journal-title":"in Advances in Cryptology - EUROCRYPT 2003<\/em>"},{"key":"9","article-title":"Cryptographic Boolean Functions and Applications<\/em>,","author":"T. W. Cusick","year":"2009","journal-title":"Elsevier-Academic Press"},{"key":"10","first-page":"98","article-title":"Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity,","author":"D. K. Dalai","year":"2005","journal-title":"in Proceedings of FSE 2005<\/em>"},{"key":"11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","article-title":"Basic theory in construction of Boolean functions with maximum possible annihilator immunity,","volume":"40","author":"D. K. Dalai","year":"2006","journal-title":"Des. Codes Cryptogr.<\/em>"},{"key":"12","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-28628-8_24","article-title":"Rewriting variables: the complexity of fast algebraic attacks on stream ciphers,","author":"P. Hawkes","year":"2004","journal-title":"in Advances in Cryptology - CRYPTO 2004<\/em>"},{"key":"13","article-title":"The Art of Computer Programming: Bitwise Tricks & Techniques; Binary Decision Diagrams<\/em>,","author":"D. E. Knuth","year":"2009","journal-title":"Addison-Wesley Professional"},{"key":"14","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-46035-7_15","article-title":"BDD-based cryptanalysis of keystream generators,","author":"M. Krause","year":"2002","journal-title":"in Advances in Cryptology - EUROCRYPT 2002<\/em>"},{"key":"15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11935230_6","article-title":"Construction and analysis of Boolean functions of $2t+1$ variables with maximum algebraic immunity,","author":"N. Li","year":"2006","journal-title":"in Advances in Cryptology - ASIACRYPT 2006<\/em>"},{"key":"16","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","article-title":"On the construction of Boolean functions with optimal algebraic immunity,","volume":"54","author":"N. Li","year":"2008","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"17","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1515\/156939206779238418","article-title":"Exact relation between nonlinearity and algebraic immunity,","volume":"16","author":"M. S. Lobanov","year":"2006","journal-title":"Discrete Math. Appl.<\/em>"},{"key":"18","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1134\/S1990478909030077","article-title":"Exact relations between nonlinearity and algebraic immunity,","volume":"3","author":"M. S. Lobanov","year":"2009","journal-title":"J. Appl. Ind. Math.<\/em>"},{"key":"19","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","article-title":"Algebraic attacks and decomposition of Boolean functions,","author":"W. Meier","year":"2004","journal-title":"in Advances in Cryptology - EUROCRYPT 2004<\/em>"},{"key":"20","first-page":"301","article-title":"Fast correlation attacks on stream ciphers,","author":"W. Meier","year":"1988","journal-title":"in Advances in Cryptology - EUROCRYPT '88<\/em>"},{"key":"21","doi-asserted-by":"publisher","first-page":"3656","DOI":"10.1109\/TIT.2008.926360","article-title":"Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity,","volume":"54","author":"S. Mesnager","year":"2008","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"22","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-00730-9_25","article-title":"Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic cryptanalysis,","author":"E. Pasalic","year":"2008","journal-title":"in Proceedings of ICISC 2008<\/em>"},{"key":"23","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TIT.2010.2050801","article-title":"On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation,","volume":"56","author":"P. Rizomiliotis","year":"2010","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"24","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","article-title":"On bent functions,","volume":"20","author":"O. S. Rothaus","year":"1976","journal-title":"J. Comb. Theory Ser. A<\/em>"},{"key":"25","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1587\/transfun.E94.A.165","article-title":"Several classes of even-variable balanced Boolean functions with optimal algebraic immunity,","volume":"E94.A","author":"C. Tan","year":"2011","journal-title":"IEICE Trans. Fund.<\/em>"},{"key":"26","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","article-title":"Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks,","volume":"59","author":"D. Tang","year":"2013","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","article-title":"A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity,","volume":"60","author":"Z. Tu","year":"2011","journal-title":"Des. Codes Cryptogr.<\/em>"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2014.01.010","article-title":"Cryptographic properties of the hidden weighted bit function,","author":"Q. Wang","journal-title":"Discrete Appl. Math.<\/em>"},{"key":"29","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1049\/iet-ifs.2011.0090","article-title":"Some results on fast algebraic attacks and higher-order non-linearities,","volume":"6","author":"Q. Wang","year":"2012","journal-title":"IET Inform. Secur.<\/em>"},{"key":"30","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1109\/TIT.2010.2046195","article-title":"Constructions of cryptographically significant Boolean functions using primitive polynomials,","volume":"56","author":"Q. Wang","year":"2010","journal-title":"IEEE Trans. Inf. Theory<\/em>"},{"key":"31","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ipl.2013.04.017","article-title":"A new method to construct Boolean functions with good cryptographic properties,","volume":"113","author":"Q. Wang","year":"2013","journal-title":"Inform. Proc. Lett.<\/em>"},{"key":"32","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dam.2013.11.014","article-title":"Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity,","volume":"1673","author":"Q. Wang","year":"2014","journal-title":"Discrete Appl. Math.<\/em>"},{"key":"33","first-page":"523","article-title":"On the design of S-boxes,","author":"A. F. Webster","year":"1985","journal-title":"in Advances in Cryptology - CRYPTO '85<\/em>"},{"key":"34","doi-asserted-by":"publisher","first-page":"6310","DOI":"10.1109\/TIT.2011.2109935","article-title":"More balanced Boolean functions with optimal algebraic immunity, and good nonlinearity and resistance to fast algebraic attacks,","volume":"57","author":"X. Zeng","year":"2011","journal-title":"IEEE Trans. Inf. Theory<\/em>"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.aimsciences.org\/article\/exportPdf?id=542fd54f-92ba-44a5-bb3f-5135a7a56a80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T20:16:57Z","timestamp":1578428217000},"score":1,"resource":{"primary":{"URL":"http:\/\/aimsciences.org\/\/article\/doi\/10.3934\/amc.2014.8.153"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2014.8.153","relation":{},"ISSN":["1930-5338"],"issn-type":[{"type":"print","value":"1930-5338"}],"subject":[],"published":{"date-parts":[[2014]]}}}