{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:05:06Z","timestamp":1718150706179},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,11,1]],"date-time":"2005-11-01T00:00:00Z","timestamp":1130803200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2005,11]]},"DOI":"10.1007\/s10623-004-3995-z","type":"journal-article","created":{"date-parts":[[2005,9,10]],"date-time":"2005-09-10T15:06:01Z","timestamp":1126364761000},"page":"319-346","source":"Crossref","is-referenced-by-count":10,"title":["Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces"],"prefix":"10.1007","volume":"37","author":[{"given":"Pascale","family":"Charpin","sequence":"first","affiliation":[]},{"given":"Enes","family":"Pasalic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3995_CR1","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, K. Gopalakrishnan and R. D. Stinson, Bounds for resilient functions and orthogonal arrays. In Advances in Cryptology\u2014CRYPTO\u201994., vol. LNCS 839, Springer-Verlag (1994) pp. 247\u2013256","DOI":"10.1007\/3-540-48658-5_24"},{"key":"3995_CR2","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1137\/0217014","volume":"24","author":"C.H. Bennet","year":"1988","journal-title":"SIAM Journal on Computing."},{"key":"3995_CR3","unstructured":"P. Camion, C. Carlet, P. Charpin and N. Sendrier, On correlation-immune functions. In Advances in Cryptology\u2014EUROCRYPT\u201991., Vol. LNCS 547, Springer-Verlag (1991) pp. 86\u2013100"},{"key":"3995_CR4","unstructured":"C. Carlet, On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. In Sequences and their Applications - SETA \u201901., Discrete Mathematics and Theoretical Computer Science., Springer-Verlag (2001) pp. 131\u2013144"},{"key":"3995_CR5","doi-asserted-by":"crossref","unstructured":"C. Carlet, A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction In Advances in Cryptology - CRYPT0 2002., Lecture Notes in Computer Science, 2442, pp. 549\u2013564","DOI":"10.1007\/3-540-45708-9_35"},{"key":"3995_CR6","doi-asserted-by":"crossref","unstructured":"P. Charpin and E. Pasalic, On propagation characteristics of resilient functions. In Selected Areas in Cryptography\u2014SAC 2002., LNCS, 2595, Springer-Verlag (2003) pp. 356\u2013365","DOI":"10.1007\/3-540-36492-7_13"},{"key":"3995_CR7","doi-asserted-by":"crossref","unstructured":"S. Chee, S. Lee, D. Lee and H. S. Sung, On the correlation immune functions and their nonlinearity. In Advances in Cryptology\u2014ASIACRYPT\u201996., Vol. LNCS, 1163, Springer-Verlag (1996) pp. 232\u2013243.","DOI":"10.1007\/BFb0034850"},{"key":"3995_CR8","doi-asserted-by":"crossref","unstructured":"J. H. Cheon, Nonlinear vector resilient functions In Advances in Cryptology\u2014CRYPTO 2001., Vol. LNCS, 2139, Springer-Verlag (2001) pp. 181\u2013195","DOI":"10.1007\/3-540-44647-8_27"},{"key":"3995_CR9","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, J. Hastad, J. Friedman, S Rudich and R. Smolensky, The bit extraction problem or t-resilient functions. In 26th IEEE Symposium on Foundations of Computer Science., (1985) pp. 396\u2013407","DOI":"10.1109\/SFCS.1985.55"},{"key":"3995_CR10","unstructured":"G. Xiao, C. Ding and W. Shan, The Stability Theory of Stream Ciphers., Vol. LNCS, 561 Springer-Verlag (1991)"},{"key":"3995_CR11","unstructured":"H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity. In Fast Software Encryption, Cambridge Security Workshop., Vol. LNCS, 1008, Springer-Verlag (1994) pp. 61\u201374"},{"key":"3995_CR12","unstructured":"J. Friedman, On the bit extraction problem. In 33rd IEEE Symposium on Foundations of Computer Science., (1982) pp. 314\u2013319"},{"issue":"3","key":"3995_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/BF01388386","volume":"5","author":"K. Gopalakrishnan","year":"1995","journal-title":"Des. Codes Cryptogr."},{"key":"3995_CR14","doi-asserted-by":"crossref","unstructured":"K. C. Gupta and P. Sarkar, Improved constructions of nonlinear resilient S-boxes. In Advances in Cryptology\u2014ASIACRYPT 2002., Vol. LNCS, 2501, Springer-Verlag (2002) pp. 466\u2013483","DOI":"10.1007\/3-540-36178-2_29"},{"key":"3995_CR15","doi-asserted-by":"crossref","unstructured":"T. Johansson and E. Pasalic, A construction of resilient functions with high nonlinearity, IEEE Trans. on Inform. Theory., IT-49(2) (2003)","DOI":"10.1109\/TIT.2002.807297"},{"issue":"6","key":"3995_CR16","first-page":"721","volume":"3","author":"K. Kurosawa","year":"1997","journal-title":"Journal of Universal Computer Science."},{"key":"3995_CR17","volume-title":"Finite Fields, Encyclopedia of Mathematics and its Applications, Vol. 20.","author":"R. Lidl","year":"1983"},{"key":"3995_CR18","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. Macwilliams","year":"1977"},{"key":"3995_CR19","unstructured":"W. Meier and O. Staffelbach, Nonlinearity criteria of cryptographic functions. In Advances in Cryptology\u2014EUROCRYPT\u201988., Vol. LNCS, 330, Springer-Verlag (1988) pp. 549\u2013562"},{"key":"3995_CR20","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997"},{"key":"3995_CR21","unstructured":"K. Nyberg, On the construction of highly nonlinear permutations. In Advances in Cryptology\u2014EUROCRYPT\u201992., Vol. LNCS 658, Springer-Verlag (1992) pp. 92\u201398"},{"issue":"8","key":"3995_CR22","doi-asserted-by":"crossref","first-page":"2182","DOI":"10.1109\/TIR.2002.800492","volume":"48","author":"E. Pasalic","year":"2002","journal-title":"IEEE Trans. Inform. Theory. Vol. IT."},{"issue":"3","key":"3995_CR23","first-page":"354","volume":"29","author":"N.J. Patterson","year":"1983","journal-title":"Theory. Vol. IT."},{"key":"3995_CR24","volume-title":"Correction to \u2013 the covering radius of the (215, 16) Reed-Muller code is at least 16276, IEEE Trans","author":"N.J. Patterson","year":"1990"},{"key":"3995_CR25","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","journal-title":"J. Combin Theory, Series A."},{"key":"3995_CR26","doi-asserted-by":"crossref","unstructured":"P. Sarkar and S. Maitra, Construction of nonlinear Boolean functions with important cryptographic properties. In Advances in Cryptology\u2014EUROCRYPT 2000., Vol. LNCS 1807, Springer-Verlag (2000) pp. 485\u2013506","DOI":"10.1007\/3-540-45539-6_35"},{"key":"3995_CR27","doi-asserted-by":"crossref","unstructured":"P. Sarkar and S. Maitra, Nonlinearity bounds and constructions of resilient Boolean functions. In Advances in Cryptology\u2014CRYPTO 2000., Vol. LNCS 1880, Springer-Verlag (2000) pp. 515\u2013532","DOI":"10.1007\/3-540-44598-6_32"},{"key":"3995_CR28","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","journal-title":"IEEE Trans. Inform. Theory. Vol. IT."},{"key":"3995_CR29","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","journal-title":"IEEE Trans. Computers., Vol. C."},{"key":"3995_CR30","first-page":"105","volume":"92","author":"D.R. Stinson","year":"1993","journal-title":"In Congressus Numeranitium."},{"key":"3995_CR31","doi-asserted-by":"crossref","unstructured":"Y. Tarannikov, On resilient Boolean functions with maximal possible nonlinearity. In Proceedings of Indocrypt., Vol. LNCS 1977, Springer-Verlag (2000) pp. 19\u201330","DOI":"10.1007\/3-540-44495-5_3"},{"issue":"5","key":"3995_CR32","doi-asserted-by":"crossref","first-page":"1740","DOI":"10.1109\/18.623184","volume":"43","author":"X.M. Zhang","year":"1997","journal-title":"IEEE Trans. Inform. Theory., Vol IT."},{"issue":"5","key":"3995_CR33","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"4","author":"G.-Z. Xiao","year":"1988","journal-title":"IEEE Trans. Inform. Theory. Vol. IT."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-3995-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-004-3995-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-3995-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T10:46:19Z","timestamp":1586429179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-004-3995-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,11]]}},"alternative-id":["3995"],"URL":"https:\/\/doi.org\/10.1007\/s10623-004-3995-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,11]]}}}
  NODES
Note 1
Project 1