Construction and enumeration of Boolean functions with maximum algebraic immunity

Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum alg...

Full description

Saved in:
Bibliographic Details
Published in:Science China. Information sciences Vol. 52; no. 1; pp. 32 - 40
Main Authors: Zhang, WenYing, Wu, ChuanKun, Liu, XiangZhong
Format: Journal Article
Language:English
Published: Beijing Science in China Press 2009
Springer Nature B.V
Subjects:
ISSN:1009-2757, 1674-733X, 1862-2836, 1869-1919
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2].
AbstractList Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2].
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < , we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than .
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < {expression}, we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than {expression}.
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p ( x ) with deg( p ( x )) < , we give a method to construct functions in the form p ( x )+ q ( x ) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q ( x ) has degree no less than .
Author ZHANG WenYing WU ChuanKun LIU XiangZhong
AuthorAffiliation School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China No. 2 Middle School Attached to Shandong Normal University, Jinan 250014, China
Author_xml – sequence: 1
  givenname: WenYing
  surname: Zhang
  fullname: Zhang, WenYing
  email: wenyingzh@is.iscas.ac.cn
  organization: School of Information Science and Engineering, Shandong Normal University, State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences
– sequence: 2
  givenname: ChuanKun
  surname: Wu
  fullname: Wu, ChuanKun
  organization: State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences
– sequence: 3
  givenname: XiangZhong
  surname: Liu
  fullname: Liu, XiangZhong
  organization: No. 2 Middle School Attached to Shandong Normal University
BookMark eNp9kE1LAzEQhoMoqNUf4G1R8LaaSbZJe9TiFxRE8B6y2UmN7iZtsov235u2guDBQ0hCnmcy8x6TfR88EnIG9AooldcJoOKspHSaF5Xleo8cwUSwkk242M_nzQuTY3lIjlN6p7RijMMReZkFn_o4mN4FX2jfFOiHDqPe3oMtbkNoUfvCDn7LpOLT9W9Fp79cN3SFbhdYR-1M4bpu8K5fn5ADq9uEpz_7iLze373OHsv588PT7GZeGi6rvuRUV6gRgXKoUKJFphsLjWZSQDMFPjHSWllNx0xTQ0UtGFojhWhqilDzEbnclV3GsBow9apzyWDbao9hSIqPgVVjkBm8-AO-hyH63Jpi0xwRCCY3lNxRJoaUIlplXL8Noc_TtQqo2uSsdjmrnKba5KzW2YQ_5jK6Tsf1vw7bOSmzfoHxt6f_pPOfj96CX6yyp2ptPqxrMU_CuKCi4t_ao58C
CitedBy_id crossref_primary_10_4304_jnw_6_2_255_262
crossref_primary_10_1007_s11432_010_3106_x
Cites_doi 10.1007/978-3-540-24676-3_28
10.1007/s10623-005-6300-x
10.1109/TIT.2006.872977
10.1007/11596219_4
10.1007/3-540-54973-0
10.1109/TIT.2006.876253
10.1007/11935230_6
10.1007/11779360_10
ContentType Journal Article
Copyright Science China Press and Springer-Verlag Berlin Heidelberg 2009
Science China Press and Springer-Verlag Berlin Heidelberg 2009.
Copyright_xml – notice: Science China Press and Springer-Verlag Berlin Heidelberg 2009
– notice: Science China Press and Springer-Verlag Berlin Heidelberg 2009.
DBID 2RA
92L
CQIGP
W92
~WA
AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
7SC
8FD
L7M
L~C
L~D
DOI 10.1007/s11432-009-0007-y
DatabaseName 维普_期刊
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
Computer and Information Systems Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: P5Z
  name: Advanced Technologies & Aerospace Database
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
DocumentTitleAlternate Construction and enumeration of Boolean functions with maximum algebraic immunity
EISSN 1862-2836
1869-1919
EndPage 40
ExternalDocumentID 10_1007_s11432_009_0007_y
29236064
GroupedDBID .86
06D
0R~
123
2JN
2LR
2RA
4.4
406
408
40E
6NX
8UJ
92L
95-
95.
96X
AABHQ
ABFTV
ABKCH
ABTMW
ADHHG
ADURQ
ADYFF
AEGNC
AEOHA
AEXYK
AFGCZ
AGDGC
AGQMX
AJRNO
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMYQR
B-.
BA0
BGNMA
CAG
COF
CQIGP
CS3
CW9
EBS
EJD
FNLPD
HF~
HZ~
IHE
IPNFZ
I~X
I~Z
J9A
KOV
M4Y
MA-
N2Q
NB0
NQJWS
NU0
O9-
PF0
PT4
QOS
RIG
ROL
RPX
RSV
S27
SAP
SCO
SDH
SNX
SOJ
T13
U2A
UG4
VC2
W48
W92
~A9
~WA
ABQSL
CJPJV
DPUIP
AAYXX
ADHKG
AGQPQ
CITATION
-SI
-S~
-Y2
.VR
0VY
2J2
2JY
2KG
2KM
30V
5VR
5VS
8FE
8FG
8TC
AAAVM
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
ABAKF
ABBBX
ABBRH
ABDBE
ABDZT
ABECU
ABHQN
ABJNI
ABJOX
ABKTR
ABMQK
ABNWP
ABQBU
ABRTQ
ABSXP
ABTEG
ABTHY
ABTKH
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACREN
ACSNA
ACZOJ
ADHIR
ADKNI
ADKPE
ADRFC
ADTPH
ADYOE
ADZKW
AEBTG
AEFQL
AEGAL
AEJHL
AEJRE
AEMSY
AEPYU
AESKC
AETLH
AEVLU
AFDZB
AFFHD
AFKRA
AFLOW
AFQWF
AFUIB
AFWTZ
AFYQB
AFZKB
AGAYW
AGJBK
AGMZJ
AGQEE
AGRTI
AGWZB
AGYKE
AHBYD
AHPBZ
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJZVZ
ALWAN
AMTXH
AMXSW
AMYLF
AOCGG
ARAPS
ARMRJ
ASPBG
ATHPR
AVWKF
AXYYD
AYFIA
AZFZN
AZQEC
BDATZ
BENPR
BGLVJ
BSONS
CAJEI
CCEZO
CCPQU
CHBEP
CSCUP
CUBFJ
DDRTE
DNIVK
DWQXO
EBLON
EIOEI
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
HCIFZ
HG6
HMJXF
HRMNR
HVGLF
IJ-
IKXTQ
IWAJR
IXD
J-C
JBSCW
JQ2
JZLTJ
K7-
LLZTM
NPVJJ
O9J
P62
P9O
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
Q--
R89
S16
S3B
SCL
SHX
SISQX
SJYHP
SNE
SNPRN
SOHCF
SPISZ
SRMVM
SSLCW
SZN
TR2
TSG
TUC
U1G
U5S
UOJIU
UTJUX
UZXMN
VFIZW
W23
YLTOR
ZMTXR
7SC
8FD
L7M
L~C
L~D
ID FETCH-LOGICAL-c374t-30a4eaee10314e7efe2adf1da2761d9138c7ff74952a0c06b62efc766db0e1b3
IEDL.DBID RSV
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000262702000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1009-2757
1674-733X
IngestDate Thu Oct 02 12:10:21 EDT 2025
Fri Nov 07 23:36:01 EST 2025
Tue Nov 18 21:08:55 EST 2025
Sat Nov 29 03:21:06 EST 2025
Fri Feb 21 02:33:09 EST 2025
Thu Nov 24 20:29:23 EST 2022
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords algebraic immunity
cryptography
Boolean function
algebraic attack
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c374t-30a4eaee10314e7efe2adf1da2761d9138c7ff74952a0c06b62efc766db0e1b3
Notes cryptography, algebraic attack, algebraic immunity, Boolean function
TN91
11-4426/N
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 2918616277
PQPubID 2043626
PageCount 9
ParticipantIDs proquest_miscellaneous_35124517
proquest_journals_2918616277
crossref_citationtrail_10_1007_s11432_009_0007_y
crossref_primary_10_1007_s11432_009_0007_y
springer_journals_10_1007_s11432_009_0007_y
chongqing_backfile_29236064
PublicationCentury 2000
PublicationDate 2009
20090100
2009-1-00
20090101
PublicationDateYYYYMMDD 2009-01-01
PublicationDate_xml – year: 2009
  text: 2009
PublicationDecade 2000
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
– name: Heidelberg
PublicationTitle Science China. Information sciences
PublicationTitleAbbrev Sci. China Ser. F-Inf. Sci
PublicationTitleAlternate Science in China(Series F)
PublicationYear 2009
Publisher Science in China Press
Springer Nature B.V
Publisher_xml – name: Science in China Press
– name: Springer Nature B.V
References Courtois, Meier (CR1) 2003
Braeken, Praneel (CR5) 2005
CR3
Meier, Pasalic, Carlet (CR4) 2004
CR8
Li, Qi (CR7) 2006; 52
CR9
CR12
CR11
Ding, Xiao, Shan (CR13) 1991
Carlet, Dalai, Gupta (CR10) 2006; 52
Mihaljevie, Imai (CR2) 2002; E85-A
Dalai, Maitra, Sarkar (CR6) 2006; 40
A. Braeken (7_CR5) 2005
D. Dalai (7_CR6) 2006; 40
7_CR11
7_CR12
7_CR3
C. Carlet (7_CR10) 2006; 52
N. Courtois (7_CR1) 2003
7_CR9
7_CR8
W. Meier (7_CR4) 2004
N. Li (7_CR7) 2006; 52
C. Ding (7_CR13) 1991
M. Mihaljevie (7_CR2) 2002; E85-A
References_xml – start-page: 346
  year: 2003
  end-page: 359
  ident: CR1
  article-title: Algebraic attacks on stream ciphers with linear feedback
  publication-title: Advances in Cryptology-EUROCRYPT 2003
– ident: CR3
– ident: CR12
– ident: CR11
– start-page: 474
  year: 2004
  end-page: 491
  ident: CR4
  article-title: Algebraic attacks and decomposition of Boolean functions
  publication-title: Advances in Cryptology-EUROCRYPT 2004
  doi: 10.1007/978-3-540-24676-3_28
– ident: CR9
– volume: 40
  start-page: 41
  issue: 1
  year: 2006
  end-page: 58
  ident: CR6
  article-title: Basic theory in construction of Boolean functions with maximum possible annihilator immunity
  publication-title: Design, Codes and Cryptography
  doi: 10.1007/s10623-005-6300-x
– volume: 52
  start-page: 2271
  issue: 5
  year: 2006
  end-page: 2273
  ident: CR7
  article-title: Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2006.872977
– ident: CR8
– start-page: 35
  year: 2005
  end-page: 48
  ident: CR5
  article-title: On the algebraic immunity of symmetric Boolean functions
  publication-title: Advances in Indocrypt 2005
  doi: 10.1007/11596219_4
– year: 1991
  ident: CR13
  publication-title: The Stability Theory of Stream Ciphers
  doi: 10.1007/3-540-54973-0
– volume: 52
  start-page: 3105
  issue: 7
  year: 2006
  end-page: 3121
  ident: CR10
  article-title: Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2006.876253
– volume: E85-A
  start-page: 66
  year: 2002
  end-page: 73
  ident: CR2
  article-title: Cryptanalysis of toyocrypt-HSI stream cipher
  publication-title: IEICE Trans Fundamentals
– ident: 7_CR11
– volume: 52
  start-page: 3105
  issue: 7
  year: 2006
  ident: 7_CR10
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2006.876253
– ident: 7_CR8
  doi: 10.1007/11935230_6
– volume: E85-A
  start-page: 66
  year: 2002
  ident: 7_CR2
  publication-title: IEICE Trans Fundamentals
– start-page: 474
  volume-title: Advances in Cryptology-EUROCRYPT 2004
  year: 2004
  ident: 7_CR4
  doi: 10.1007/978-3-540-24676-3_28
– ident: 7_CR12
  doi: 10.1007/11779360_10
– volume-title: The Stability Theory of Stream Ciphers
  year: 1991
  ident: 7_CR13
  doi: 10.1007/3-540-54973-0
– ident: 7_CR3
– volume: 40
  start-page: 41
  issue: 1
  year: 2006
  ident: 7_CR6
  publication-title: Design, Codes and Cryptography
  doi: 10.1007/s10623-005-6300-x
– start-page: 35
  volume-title: Advances in Indocrypt 2005
  year: 2005
  ident: 7_CR5
  doi: 10.1007/11596219_4
– ident: 7_CR9
– start-page: 346
  volume-title: Advances in Cryptology-EUROCRYPT 2003
  year: 2003
  ident: 7_CR1
– volume: 52
  start-page: 2271
  issue: 5
  year: 2006
  ident: 7_CR7
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2006.872977
SSID ssj0042231
ssj0000330278
Score 1.8137255
Snippet Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many...
SourceID proquest
crossref
springer
chongqing
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 32
SubjectTerms Algebra
Algorithms
Boolean functions
Computer Science
Cryptography
Encryption
Enumeration
Information Systems and Communication Service
Mathematical analysis
代数攻击
加解密算法
密码学
密钥值
源代码
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NT9wwEB3B0gM9UPolloXWh55aWcR21k5OCBCopxWtOOwtchybrsomwC5V9993xpvstpXgwjlOouSNZ8bz7DcAn7RNvUHceW5N4KkXgue61DyUWaacFegtQ2w2YUajbDzOL9uC26zdVtn5xOioq8ZRjfxI5iLTQktjjm_vOHWNIna1baGxCVukVIZ2vnV6Prr8vqqyJIp4uXgeTtPGQ6XGHbUZz89htiB55AeoZLcggYUfTX19h2Hj30C1zj7_I0xjHLp49dwv2IWdNgNlJ0uTeQ0bvn4DL__SJXwL36iNZycsy2xdMdow75fGwprATpvmxtuaUVSMhsuonsum9vdk-jBl1DsEV-ETxybx-Ml88Q6uLs6vzr7ytvcCd8qkc64SBNF6T10gEE0fvLRVEJWVRosqFypzJgSDyytpE5cgvNIHZ7SuysSLUr2HXt3Ufg-YxCQuiypHpkyNtVagUxlWaeblUFVq2IfB6p9j6HY_SZCqkJh44toq7UPSoVC4VrWcmmfcFGu9ZQKxQBCJSDfFog-fV7fcLiU7nhp80IFVtLN3VqyR6sPH1WWcd0Sm2No3D7NCYaaUDgWO-NIZxPoBj75u_-nXDWB7yVZRiecAeoi0P4QX7td8Mrv_0Br3Hw6vAA4
  priority: 102
  providerName: ProQuest
Title Construction and enumeration of Boolean functions with maximum algebraic immunity
URI http://lib.cqvip.com/qk/84009X/20091/29236064.html
https://link.springer.com/article/10.1007/s11432-009-0007-y
https://www.proquest.com/docview/2918616277
https://www.proquest.com/docview/35124517
Volume 52
WOSCitedRecordID wos000262702000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1862-2836
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0000330278
  issn: 1009-2757
  databaseCode: P5Z
  dateStart: 20010201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1862-2836
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0000330278
  issn: 1009-2757
  databaseCode: K7-
  dateStart: 20010201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1862-2836
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0000330278
  issn: 1009-2757
  databaseCode: BENPR
  dateStart: 20010201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1862-2836
  dateEnd: 20091231
  omitProxy: false
  ssIdentifier: ssj0042231
  issn: 1009-2757
  databaseCode: RSV
  dateStart: 20010201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB6Vx6E9lEKLujy2PvQEshQ7D2ePgECVkFZLQQj1EjmOXVawSdtdKvbfd8Yb75aqIMEll0zsyON5298AfM50YhXynfe0cjyxQvBeVmbclXkeGy1QWzrfbEL1-_nVVW_Q3uMeh9PuoSTpNfXishuadsl9Mp_ya9MlWEkJbIZC9PPLoH4TtHc-yiJCqVIVSpn_G4IAFa6b-vtPnO6hYVp4m_8USL3dOVl70R-_g7etm8kOZvtiHV7ZegPWQgsH1kr0Brz5C4_wPZxR-84AKMt0XTE6KG9nm4Q1jh02za3VNSNr6DcsozwuG-n74ehuxKhnCEbfQ8OG_trJZPoBLk6OL46-8LbnAjexSiY8jpB52lrq_oBctM5KXTlRaakyUfVEnBvlnMKwSurIRMhWaZ1RWVaVkRVlvAnLdVPbj8AkOm-5RzdSZaK01gKVSVoluZVpXMVpB7bna48m29wQEFUh0eHEmCrpQBS4UZgWrZyaZtwWC5xlWt0CV5cK6KqYdmBv_smPGVTHU8Q7gcVFK7VjnFzkmcikUh34NH-N8kZFFF3b5m5cxOghJalAiv3A9MUAj0639SzqbXg9K1pRpmcHlpHxdhdWze_JcPyrCyuHx_3B1y4snSqOz0H6retF4A9UI_2d
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJw4I1YWqgPcAFFjR-Jk0NVtdCqVcuqoD3szXIcB1Z0k7a7BfZH9T8yk8cuINFbD5zj2E7m6RnPfACvY6u8RroHqdVFoDznQRpncVBkSSKd5agtixpsQg8GyWiUnqzAVVcLQ9cqO51YK-q8chQj3xQpT2IeC623z84DQo2i7GoHodGwxZGf_8Aj23Tr8APS940Q-3vD9wdBiyoQOKnVLJAhbs96T_gGuE9feGHzgudW4Ik-T7lMnC4KjQcHYUMX4saFL5yO4zwLPc8kTnsLVpVUcdSD1d29wcnnRVAnlJQGrMvvYrrnKOWoy6TW5XronIigTkdQhHBO_Ry-VuWXc7RSf9rFpbP7V362Nnv7D_6zH_YQ7rf-NdtpBOIRrPjyMdz7reviE_hEIKVd21xmy5xROYBvRIFVBdutqlNvS0Y2vxZLRtFqNrE_x5PLCSNklOzCjh0b18U1s_lTGN7EJz2DXlmV_jkwgS5qUvdw0pnS1lqOKjPKVeJFJHMZ9WFtQWJ0TNw3ardlBLrVeHJUfQg7ohvX9mQnaJBTs-wmTTxjkGfomoA28z68Xbxy1jQkuW7wescbptVNU7NkjD5sLB6jVqFUkS19dTk1Ev1AFXEc8a7jv-UE_1zuxfXLbcCdg-HHY3N8ODhag7tNXo6CWevQQ6r7l3DbfZ-NpxevWrliYG6YMX8B8k9eGA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Rb9MwED6NDaHxwKADrWxQP_DEFC12nDh9HBsVCFR1Y0J9ixzHHhVrsq0dov9-d0ncAmKTEM-52FHuznfns78P4E2ipVWo96CvlQuk5TzoJ3kSuDxNI6M5rpauJptQw2E6HvdHLc_pzJ929y3J5k4DoTSV84PLwh2sLr5hmBdBvbFPe22LB7AhsZChM12nX776pVhi7KsrLhIUKla-rfm3IQhc4VtVnl_h1L8HqVXm-UeztI5Bg63__vqn8KRNP9lhYy_PYM2WHdjy1A6s9fQOPP4Fp3AbTojW0wPNMl0WjA7Q28Z4WOXYu6q6sLpkFCVrQ2a0v8um-udkejNlxCWCVfnEsEl9HWW-eA5ng_dnRx-CloshMJGS8yAKUanaWmKFQO1aZ4UuHC-0UAkv-jxKjXJOYbkldGhCVLewzqgkKfLQ8jx6AetlVdodYAKTurRGPVK5VFprjotMXMjUijgqorgLu0s9YCg33wmgKhOYiGKtJbsQes1kpkUxJzKNi2yFv0x_N8O_S411lS268Hb5ymUD4XGf8J5Xd9Z68wwn52nCE6FUF3rLx-iH1FzRpa1uZlmEmZOMOUrsewNYDXDndC__SboHj0bHg-zzx-GnXdhs-lq0GbQH62gD9hU8ND_mk9n169oLbgGxnAYK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Construction+and+enumeration+of+Boolean+functions+with+maximum+algebraic+immunity&rft.jtitle=Science+in+China.+Series+F%2C+Information+sciences&rft.au=ZHANG+WenYing+WU+ChuanKun+LIU+XiangZhong&rft.date=2009&rft.issn=1009-2757&rft.eissn=1862-2836&rft.issue=1&rft.spage=32&rft.epage=40&rft_id=info:doi/10.1007%2Fs11432-009-0007-y&rft.externalDocID=29236064
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F84009X%2F84009X.jpg