{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T15:27:48Z","timestamp":1649172468496},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10623-013-9801-z","type":"journal-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T13:35:16Z","timestamp":1359639316000},"page":"653-673","source":"Crossref","is-referenced-by-count":7,"title":["A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed\u2013Muller code"],"prefix":"10.1007","volume":"72","author":[{"given":"Sihong","family":"Su","sequence":"first","affiliation":[]},{"given":"Xiaohu","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,1]]},"reference":[{"key":"9801_CR1","unstructured":"Armknecht F.: Improving fast algebraic attacks. In: Fast Software Encryption 2004. Lecture Notes in Computer Science, vol. 3017. Springer, Berlin, pp. 65\u201382 (2004)."},{"key":"9801_CR2","unstructured":"Canteaut A.: Open problems related to algebraic attacks on stream ciphers. In: Workshop on Coding and Cryptography 2005. Lecture Notes in Computer Science, vol. 3969. Springer, Berlin, pp. 120\u2013134 (2006)."},{"key":"9801_CR3","doi-asserted-by":"crossref","unstructured":"Carlet C.: A method of construction of balanced functions with optimum algebraic immunity. In: International Workshop on Coding and Cryptology, pp. 25\u201343, 2007.","DOI":"10.1142\/9789812832245_0003"},{"key":"9801_CR4","doi-asserted-by":"crossref","unstructured":"Carlet C.: Constructing balanced functions with optimum algebraic immunity. In: IEEE International Symposium on Information Theory 2007, pp. 451\u2013455.","DOI":"10.1109\/ISIT.2007.4557094"},{"key":"9801_CR5","unstructured":"Carlet C., Feng K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In Advances in Cryptology-ASIACRYPT 2008. Lecture Notes in Computer Science, vol. 5350. Springer, Berlin, pp. 425\u2013440 (2008)."},{"key":"9801_CR6","unstructured":"Carlet C., Gaborit P.: On the construction of balanced Boolean functions with a good algebraic immunity. In: Proceeding of IEEE International Symposium on Information Theory (ISIT) 2005, pp. 1101\u20131105, 2005."},{"key":"9801_CR7","unstructured":"Carlet C., Dalai D., Gupta K., Maitra S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory, 52, 3105\u20133121 (2006)."},{"key":"9801_CR8","doi-asserted-by":"crossref","unstructured":"Carlet C., Zeng X., Li C., Hu L.: Further properties of several classes of Boolean functions with optimum algebraic immunity. Des. Codes Cryptogr. 52, 303\u2013338 (2009).","DOI":"10.1007\/s10623-009-9284-0"},{"key":"9801_CR9","unstructured":"Courtois N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729. Springer, Berlin, pp. 176\u2013194 (2003)."},{"key":"9801_CR10","unstructured":"Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656. Springer, Berlin, pp. 345\u2013359 (2003)."},{"key":"9801_CR11","unstructured":"Dalai D., Maitra S.: Reducing the number of homogeneous linear equations in finding annihilators. In: Sequences and Their Applications 2006. Lecture Notes in Computer Science, vol. 4086. Springer, Berlin, pp. 376\u2013390 (2006)."},{"key":"9801_CR12","unstructured":"Dalai D., Gupta K., Maitra S.: Cryptographically significant Boolean functions: construction and analysis in terms of algebraic immunity. In: Workshop on Fast Software Encryption, FSE 2005. Lecture Notes in Computer Science, vol. 3557. Springer, Berlin, pp. 98\u2013111 (2005)."},{"key":"9801_CR13","unstructured":"Dalai D., Gupta K., Maitra S.: Notion of algebraic immunity and its evaluation related to fast algebraic attacks. In: Second International Workshop on Boolean Functions: Cryptography and Applications, BFCA 2006, Cryptology ePrint Archive, Report 2006\/018. http:\/\/eprint.iacr.org\/2006\/018.pdf ."},{"key":"9801_CR14","doi-asserted-by":"crossref","unstructured":"Dalai D., Maitra S., Sarkar S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr. 40, 41\u201358 (2006).","DOI":"10.1007\/s10623-005-6300-x"},{"key":"9801_CR15","doi-asserted-by":"crossref","unstructured":"Ding C., Xiao G., Shan W.: The Stability Theory of Stream Ciphers. Springer, Berlin (1991).","DOI":"10.1007\/3-540-54973-0"},{"key":"9801_CR16","unstructured":"Dong D., Fu S., Qu L., Li C.: A new construction of Boolean functions with maximum algebraic immunity. In: ISC 2009. Lecture Notes in Computer Science, vol. 5735. Springer, Berlin, pp. 177\u2013185 (2009)."},{"key":"9801_CR17","doi-asserted-by":"crossref","unstructured":"Feng K., Liao Q., Yang J.: Maximal values of generalized algebraic immunity. Des. Codes Cryptogr. 50, 243\u2013252 (2009).","DOI":"10.1007\/s10623-008-9228-0"},{"key":"9801_CR18","unstructured":"Hawkes P., Rose G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Advances in Cryptology-CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152. Springer, Berlin, pp. 390\u2013406 (2004)."},{"key":"9801_CR19","unstructured":"Limniotis K., Kolokotronis N., Kalouptsidis N.: Constructing Boolean functions in odd number of variables with maximum algebraic immunity. In: Proceeding of IEEE International Symposium on Information Theory (ISIT) 2011, pp. 2662\u20132666, 2011."},{"key":"9801_CR20","unstructured":"Lobanov M.: Tight bound between nonlinearity and algebraic immunity. In: Cryptology ePrint Archive, Report 2005\/441. http:\/\/eprint.iacr.org\/2005\/441.pdf ."},{"key":"9801_CR21","unstructured":"Meier W., Staffelbach O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology-EUROCRYPT 1988. Lecture Notes in Computer Science, vol. 330. Springer, Berlin, pp. 301\u2013314 (1988)."},{"key":"9801_CR22","unstructured":"Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of Boolean functions. In: Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027. Springer, Berlin, pp. 474\u2013491 (2004)."},{"key":"9801_CR23","unstructured":"Muller D.: Application of Boolean algebra to switching circuit design and to error detection. IEEE Trans. Comput. 3, 6\u201312 (1954)."},{"key":"9801_CR24","unstructured":"Peng J., Wu Q., Kan H.: On symmetric Boolean functions with high algebraic immunity on even number of variables. IEEE Trans. Inf. Theory, 57, 7205\u20137220 (2011)."},{"key":"9801_CR25","unstructured":"Qu L., Feng K., Liu F., Wang L.: Constructing symmetric Boolean functions with maximum algebraic immunity. IEEE Trans. Inf. Theory 55, 2406\u20132412 (2009)."},{"key":"9801_CR26","unstructured":"Reed S.: A class of multiple-error-correcting codes and the decoding scheme. IEEE Trans. Inf. Theory 4, 38\u201349 (1954)."},{"key":"9801_CR27","unstructured":"Sarkar S., Maitra S.: Construction of rotation symmetric Boolean functions with maximun algebraic immunity on odd number of variables. In: AAECC 2007. Lecture Notes in Computer Science, vol. 4851. Springer, Berlin, pp. 271\u2013280 (2007)."},{"key":"9801_CR28","doi-asserted-by":"crossref","unstructured":"Tang D., Carlet C., Tang X.: Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inf. Theory, to be published (2012).","DOI":"10.1109\/TIT.2012.2217476"},{"key":"9801_CR29","unstructured":"Zeng X., Carlet C., Shan J., Hu L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory 57, 6310\u20136320 (2011)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9801-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9801-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9801-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T02:50:44Z","timestamp":1562640644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9801-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,1]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9801"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9801-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,1]]}}}