Construction and enumeration of Boolean functions with maximum algebraic immunity
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum alg...
Saved in:
| Published in: | Science China. Information sciences Vol. 52; no. 1; pp. 32 - 40 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Beijing
Science in China Press
2009
Springer Nature B.V |
| Subjects: | |
| ISSN: | 1009-2757, 1674-733X, 1862-2836, 1869-1919 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2]. |
|---|---|
| AbstractList | Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2]. Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < , we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than . Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < {expression}, we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than {expression}. Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p ( x ) with deg( p ( x )) < , we give a method to construct functions in the form p ( x )+ q ( x ) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q ( x ) has degree no less than . |
| Author | ZHANG WenYing WU ChuanKun LIU XiangZhong |
| AuthorAffiliation | School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China No. 2 Middle School Attached to Shandong Normal University, Jinan 250014, China |
| Author_xml | – sequence: 1 givenname: WenYing surname: Zhang fullname: Zhang, WenYing email: wenyingzh@is.iscas.ac.cn organization: School of Information Science and Engineering, Shandong Normal University, State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences – sequence: 2 givenname: ChuanKun surname: Wu fullname: Wu, ChuanKun organization: State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences – sequence: 3 givenname: XiangZhong surname: Liu fullname: Liu, XiangZhong organization: No. 2 Middle School Attached to Shandong Normal University |
| BookMark | eNp9kE1LAzEQhoMoqNUf4G1R8LaaSbZJe9TiFxRE8B6y2UmN7iZtsov235u2guDBQ0hCnmcy8x6TfR88EnIG9AooldcJoOKspHSaF5Xleo8cwUSwkk242M_nzQuTY3lIjlN6p7RijMMReZkFn_o4mN4FX2jfFOiHDqPe3oMtbkNoUfvCDn7LpOLT9W9Fp79cN3SFbhdYR-1M4bpu8K5fn5ADq9uEpz_7iLze373OHsv588PT7GZeGi6rvuRUV6gRgXKoUKJFphsLjWZSQDMFPjHSWllNx0xTQ0UtGFojhWhqilDzEbnclV3GsBow9apzyWDbao9hSIqPgVVjkBm8-AO-hyH63Jpi0xwRCCY3lNxRJoaUIlplXL8Noc_TtQqo2uSsdjmrnKba5KzW2YQ_5jK6Tsf1vw7bOSmzfoHxt6f_pPOfj96CX6yyp2ptPqxrMU_CuKCi4t_ao58C |
| CitedBy_id | crossref_primary_10_4304_jnw_6_2_255_262 crossref_primary_10_1007_s11432_010_3106_x |
| Cites_doi | 10.1007/978-3-540-24676-3_28 10.1007/s10623-005-6300-x 10.1109/TIT.2006.872977 10.1007/11596219_4 10.1007/3-540-54973-0 10.1109/TIT.2006.876253 10.1007/11935230_6 10.1007/11779360_10 |
| ContentType | Journal Article |
| Copyright | Science China Press and Springer-Verlag Berlin Heidelberg 2009 Science China Press and Springer-Verlag Berlin Heidelberg 2009. |
| Copyright_xml | – notice: Science China Press and Springer-Verlag Berlin Heidelberg 2009 – notice: Science China Press and Springer-Verlag Berlin Heidelberg 2009. |
| DBID | 2RA 92L CQIGP W92 ~WA AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI 7SC 8FD L7M L~C L~D |
| DOI | 10.1007/s11432-009-0007-y |
| DatabaseName | 维普_期刊 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition Computer and Information Systems Abstracts Technology Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: P5Z name: Advanced Technologies & Aerospace Database url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| DocumentTitleAlternate | Construction and enumeration of Boolean functions with maximum algebraic immunity |
| EISSN | 1862-2836 1869-1919 |
| EndPage | 40 |
| ExternalDocumentID | 10_1007_s11432_009_0007_y 29236064 |
| GroupedDBID | .86 06D 0R~ 123 2JN 2LR 2RA 4.4 406 408 40E 6NX 8UJ 92L 95- 95. 96X AABHQ ABFTV ABKCH ABTMW ADHHG ADURQ ADYFF AEGNC AEOHA AEXYK AFGCZ AGDGC AGQMX AJRNO ALMA_UNASSIGNED_HOLDINGS AMKLP AMYQR B-. BA0 BGNMA CAG COF CQIGP CS3 CW9 EBS EJD FNLPD HF~ HZ~ IHE IPNFZ I~X I~Z J9A KOV M4Y MA- N2Q NB0 NQJWS NU0 O9- PF0 PT4 QOS RIG ROL RPX RSV S27 SAP SCO SDH SNX SOJ T13 U2A UG4 VC2 W48 W92 ~A9 ~WA ABQSL CJPJV DPUIP AAYXX ADHKG AGQPQ CITATION -SI -S~ -Y2 .VR 0VY 2J2 2JY 2KG 2KM 30V 5VR 5VS 8FE 8FG 8TC AAAVM AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO ABAKF ABBBX ABBRH ABDBE ABDZT ABECU ABHQN ABJNI ABJOX ABKTR ABMQK ABNWP ABQBU ABRTQ ABSXP ABTEG ABTHY ABTKH ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACREN ACSNA ACZOJ ADHIR ADKNI ADKPE ADRFC ADTPH ADYOE ADZKW AEBTG AEFQL AEGAL AEJHL AEJRE AEMSY AEPYU AESKC AETLH AEVLU AFDZB AFFHD AFKRA AFLOW AFQWF AFUIB AFWTZ AFYQB AFZKB AGAYW AGJBK AGMZJ AGQEE AGRTI AGWZB AGYKE AHBYD AHPBZ AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJZVZ ALWAN AMTXH AMXSW AMYLF AOCGG ARAPS ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AZFZN AZQEC BDATZ BENPR BGLVJ BSONS CAJEI CCEZO CCPQU CHBEP CSCUP CUBFJ DDRTE DNIVK DWQXO EBLON EIOEI ESBYG FEDTE FERAY FFXSO FIGPU FINBP FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ7 HCIFZ HG6 HMJXF HRMNR HVGLF IJ- IKXTQ IWAJR IXD J-C JBSCW JQ2 JZLTJ K7- LLZTM NPVJJ O9J P62 P9O PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI Q-- R89 S16 S3B SCL SHX SISQX SJYHP SNE SNPRN SOHCF SPISZ SRMVM SSLCW SZN TR2 TSG TUC U1G U5S UOJIU UTJUX UZXMN VFIZW W23 YLTOR ZMTXR 7SC 8FD L7M L~C L~D |
| ID | FETCH-LOGICAL-c374t-30a4eaee10314e7efe2adf1da2761d9138c7ff74952a0c06b62efc766db0e1b3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000262702000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1009-2757 1674-733X |
| IngestDate | Thu Oct 02 12:10:21 EDT 2025 Fri Nov 07 23:36:01 EST 2025 Tue Nov 18 21:08:55 EST 2025 Sat Nov 29 03:21:06 EST 2025 Fri Feb 21 02:33:09 EST 2025 Thu Nov 24 20:29:23 EST 2022 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | algebraic immunity cryptography Boolean function algebraic attack |
| Language | English |
| License | http://www.springer.com/tdm |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c374t-30a4eaee10314e7efe2adf1da2761d9138c7ff74952a0c06b62efc766db0e1b3 |
| Notes | cryptography, algebraic attack, algebraic immunity, Boolean function TN91 11-4426/N ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 2918616277 |
| PQPubID | 2043626 |
| PageCount | 9 |
| ParticipantIDs | proquest_miscellaneous_35124517 proquest_journals_2918616277 crossref_citationtrail_10_1007_s11432_009_0007_y crossref_primary_10_1007_s11432_009_0007_y springer_journals_10_1007_s11432_009_0007_y chongqing_backfile_29236064 |
| PublicationCentury | 2000 |
| PublicationDate | 2009 20090100 2009-1-00 20090101 |
| PublicationDateYYYYMMDD | 2009-01-01 |
| PublicationDate_xml | – year: 2009 text: 2009 |
| PublicationDecade | 2000 |
| PublicationPlace | Beijing |
| PublicationPlace_xml | – name: Beijing – name: Heidelberg |
| PublicationTitle | Science China. Information sciences |
| PublicationTitleAbbrev | Sci. China Ser. F-Inf. Sci |
| PublicationTitleAlternate | Science in China(Series F) |
| PublicationYear | 2009 |
| Publisher | Science in China Press Springer Nature B.V |
| Publisher_xml | – name: Science in China Press – name: Springer Nature B.V |
| References | Courtois, Meier (CR1) 2003 Braeken, Praneel (CR5) 2005 CR3 Meier, Pasalic, Carlet (CR4) 2004 CR8 Li, Qi (CR7) 2006; 52 CR9 CR12 CR11 Ding, Xiao, Shan (CR13) 1991 Carlet, Dalai, Gupta (CR10) 2006; 52 Mihaljevie, Imai (CR2) 2002; E85-A Dalai, Maitra, Sarkar (CR6) 2006; 40 A. Braeken (7_CR5) 2005 D. Dalai (7_CR6) 2006; 40 7_CR11 7_CR12 7_CR3 C. Carlet (7_CR10) 2006; 52 N. Courtois (7_CR1) 2003 7_CR9 7_CR8 W. Meier (7_CR4) 2004 N. Li (7_CR7) 2006; 52 C. Ding (7_CR13) 1991 M. Mihaljevie (7_CR2) 2002; E85-A |
| References_xml | – start-page: 346 year: 2003 end-page: 359 ident: CR1 article-title: Algebraic attacks on stream ciphers with linear feedback publication-title: Advances in Cryptology-EUROCRYPT 2003 – ident: CR3 – ident: CR12 – ident: CR11 – start-page: 474 year: 2004 end-page: 491 ident: CR4 article-title: Algebraic attacks and decomposition of Boolean functions publication-title: Advances in Cryptology-EUROCRYPT 2004 doi: 10.1007/978-3-540-24676-3_28 – ident: CR9 – volume: 40 start-page: 41 issue: 1 year: 2006 end-page: 58 ident: CR6 article-title: Basic theory in construction of Boolean functions with maximum possible annihilator immunity publication-title: Design, Codes and Cryptography doi: 10.1007/s10623-005-6300-x – volume: 52 start-page: 2271 issue: 5 year: 2006 end-page: 2273 ident: CR7 article-title: Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2006.872977 – ident: CR8 – start-page: 35 year: 2005 end-page: 48 ident: CR5 article-title: On the algebraic immunity of symmetric Boolean functions publication-title: Advances in Indocrypt 2005 doi: 10.1007/11596219_4 – year: 1991 ident: CR13 publication-title: The Stability Theory of Stream Ciphers doi: 10.1007/3-540-54973-0 – volume: 52 start-page: 3105 issue: 7 year: 2006 end-page: 3121 ident: CR10 article-title: Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2006.876253 – volume: E85-A start-page: 66 year: 2002 end-page: 73 ident: CR2 article-title: Cryptanalysis of toyocrypt-HSI stream cipher publication-title: IEICE Trans Fundamentals – ident: 7_CR11 – volume: 52 start-page: 3105 issue: 7 year: 2006 ident: 7_CR10 publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2006.876253 – ident: 7_CR8 doi: 10.1007/11935230_6 – volume: E85-A start-page: 66 year: 2002 ident: 7_CR2 publication-title: IEICE Trans Fundamentals – start-page: 474 volume-title: Advances in Cryptology-EUROCRYPT 2004 year: 2004 ident: 7_CR4 doi: 10.1007/978-3-540-24676-3_28 – ident: 7_CR12 doi: 10.1007/11779360_10 – volume-title: The Stability Theory of Stream Ciphers year: 1991 ident: 7_CR13 doi: 10.1007/3-540-54973-0 – ident: 7_CR3 – volume: 40 start-page: 41 issue: 1 year: 2006 ident: 7_CR6 publication-title: Design, Codes and Cryptography doi: 10.1007/s10623-005-6300-x – start-page: 35 volume-title: Advances in Indocrypt 2005 year: 2005 ident: 7_CR5 doi: 10.1007/11596219_4 – ident: 7_CR9 – start-page: 346 volume-title: Advances in Cryptology-EUROCRYPT 2003 year: 2003 ident: 7_CR1 – volume: 52 start-page: 2271 issue: 5 year: 2006 ident: 7_CR7 publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2006.872977 |
| SSID | ssj0042231 ssj0000330278 |
| Score | 1.8137255 |
| Snippet | Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many... |
| SourceID | proquest crossref springer chongqing |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 32 |
| SubjectTerms | Algebra Algorithms Boolean functions Computer Science Cryptography Encryption Enumeration Information Systems and Communication Service Mathematical analysis 代数攻击 加解密算法 密码学 密钥值 源代码 |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NT9wwEB3B0gM9UPolloXWh55aWcR21k5OCBCopxWtOOwtchybrsomwC5V9993xpvstpXgwjlOouSNZ8bz7DcAn7RNvUHceW5N4KkXgue61DyUWaacFegtQ2w2YUajbDzOL9uC26zdVtn5xOioq8ZRjfxI5iLTQktjjm_vOHWNIna1baGxCVukVIZ2vnV6Prr8vqqyJIp4uXgeTtPGQ6XGHbUZz89htiB55AeoZLcggYUfTX19h2Hj30C1zj7_I0xjHLp49dwv2IWdNgNlJ0uTeQ0bvn4DL__SJXwL36iNZycsy2xdMdow75fGwprATpvmxtuaUVSMhsuonsum9vdk-jBl1DsEV-ETxybx-Ml88Q6uLs6vzr7ytvcCd8qkc64SBNF6T10gEE0fvLRVEJWVRosqFypzJgSDyytpE5cgvNIHZ7SuysSLUr2HXt3Ufg-YxCQuiypHpkyNtVagUxlWaeblUFVq2IfB6p9j6HY_SZCqkJh44toq7UPSoVC4VrWcmmfcFGu9ZQKxQBCJSDfFog-fV7fcLiU7nhp80IFVtLN3VqyR6sPH1WWcd0Sm2No3D7NCYaaUDgWO-NIZxPoBj75u_-nXDWB7yVZRiecAeoi0P4QX7td8Mrv_0Br3Hw6vAA4 priority: 102 providerName: ProQuest |
| Title | Construction and enumeration of Boolean functions with maximum algebraic immunity |
| URI | http://lib.cqvip.com/qk/84009X/20091/29236064.html https://link.springer.com/article/10.1007/s11432-009-0007-y https://www.proquest.com/docview/2918616277 https://www.proquest.com/docview/35124517 |
| Volume | 52 |
| WOSCitedRecordID | wos000262702000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1862-2836 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0000330278 issn: 1009-2757 databaseCode: P5Z dateStart: 20010201 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1862-2836 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0000330278 issn: 1009-2757 databaseCode: K7- dateStart: 20010201 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1862-2836 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0000330278 issn: 1009-2757 databaseCode: BENPR dateStart: 20010201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1862-2836 dateEnd: 20091231 omitProxy: false ssIdentifier: ssj0042231 issn: 1009-2757 databaseCode: RSV dateStart: 20010201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB6Vx6E9lEKLujy2PvQEshQ7D2ePgECVkFZLQQj1EjmOXVawSdtdKvbfd8Yb75aqIMEll0zsyON5298AfM50YhXynfe0cjyxQvBeVmbclXkeGy1QWzrfbEL1-_nVVW_Q3uMeh9PuoSTpNfXishuadsl9Mp_ya9MlWEkJbIZC9PPLoH4TtHc-yiJCqVIVSpn_G4IAFa6b-vtPnO6hYVp4m_8USL3dOVl70R-_g7etm8kOZvtiHV7ZegPWQgsH1kr0Brz5C4_wPZxR-84AKMt0XTE6KG9nm4Q1jh02za3VNSNr6DcsozwuG-n74ehuxKhnCEbfQ8OG_trJZPoBLk6OL46-8LbnAjexSiY8jpB52lrq_oBctM5KXTlRaakyUfVEnBvlnMKwSurIRMhWaZ1RWVaVkRVlvAnLdVPbj8AkOm-5RzdSZaK01gKVSVoluZVpXMVpB7bna48m29wQEFUh0eHEmCrpQBS4UZgWrZyaZtwWC5xlWt0CV5cK6KqYdmBv_smPGVTHU8Q7gcVFK7VjnFzkmcikUh34NH-N8kZFFF3b5m5cxOghJalAiv3A9MUAj0639SzqbXg9K1pRpmcHlpHxdhdWze_JcPyrCyuHx_3B1y4snSqOz0H6retF4A9UI_2d |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJw4I1YWqgPcAFFjR-Jk0NVtdCqVcuqoD3szXIcB1Z0k7a7BfZH9T8yk8cuINFbD5zj2E7m6RnPfACvY6u8RroHqdVFoDznQRpncVBkSSKd5agtixpsQg8GyWiUnqzAVVcLQ9cqO51YK-q8chQj3xQpT2IeC623z84DQo2i7GoHodGwxZGf_8Aj23Tr8APS940Q-3vD9wdBiyoQOKnVLJAhbs96T_gGuE9feGHzgudW4Ik-T7lMnC4KjQcHYUMX4saFL5yO4zwLPc8kTnsLVpVUcdSD1d29wcnnRVAnlJQGrMvvYrrnKOWoy6TW5XronIigTkdQhHBO_Ry-VuWXc7RSf9rFpbP7V362Nnv7D_6zH_YQ7rf-NdtpBOIRrPjyMdz7reviE_hEIKVd21xmy5xROYBvRIFVBdutqlNvS0Y2vxZLRtFqNrE_x5PLCSNklOzCjh0b18U1s_lTGN7EJz2DXlmV_jkwgS5qUvdw0pnS1lqOKjPKVeJFJHMZ9WFtQWJ0TNw3ardlBLrVeHJUfQg7ohvX9mQnaJBTs-wmTTxjkGfomoA28z68Xbxy1jQkuW7wescbptVNU7NkjD5sLB6jVqFUkS19dTk1Ev1AFXEc8a7jv-UE_1zuxfXLbcCdg-HHY3N8ODhag7tNXo6CWevQQ6r7l3DbfZ-NpxevWrliYG6YMX8B8k9eGA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Rb9MwED6NDaHxwKADrWxQP_DEFC12nDh9HBsVCFR1Y0J9ixzHHhVrsq0dov9-d0ncAmKTEM-52FHuznfns78P4E2ipVWo96CvlQuk5TzoJ3kSuDxNI6M5rpauJptQw2E6HvdHLc_pzJ929y3J5k4DoTSV84PLwh2sLr5hmBdBvbFPe22LB7AhsZChM12nX776pVhi7KsrLhIUKla-rfm3IQhc4VtVnl_h1L8HqVXm-UeztI5Bg63__vqn8KRNP9lhYy_PYM2WHdjy1A6s9fQOPP4Fp3AbTojW0wPNMl0WjA7Q28Z4WOXYu6q6sLpkFCVrQ2a0v8um-udkejNlxCWCVfnEsEl9HWW-eA5ng_dnRx-CloshMJGS8yAKUanaWmKFQO1aZ4UuHC-0UAkv-jxKjXJOYbkldGhCVLewzqgkKfLQ8jx6AetlVdodYAKTurRGPVK5VFprjotMXMjUijgqorgLu0s9YCg33wmgKhOYiGKtJbsQes1kpkUxJzKNi2yFv0x_N8O_S411lS268Hb5ymUD4XGf8J5Xd9Z68wwn52nCE6FUF3rLx-iH1FzRpa1uZlmEmZOMOUrsewNYDXDndC__SboHj0bHg-zzx-GnXdhs-lq0GbQH62gD9hU8ND_mk9n169oLbgGxnAYK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Construction+and+enumeration+of+Boolean+functions+with+maximum+algebraic+immunity&rft.jtitle=Science+in+China.+Series+F%2C+Information+sciences&rft.au=ZHANG+WenYing+WU+ChuanKun+LIU+XiangZhong&rft.date=2009&rft.issn=1009-2757&rft.eissn=1862-2836&rft.issue=1&rft.spage=32&rft.epage=40&rft_id=info:doi/10.1007%2Fs11432-009-0007-y&rft.externalDocID=29236064 |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F84009X%2F84009X.jpg |