<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462009000100003</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity]]></article-title>
<article-title xml:lang="es"><![CDATA[Construcción de Funciones Booleanas de Rotación Simétrica con Inmunidad Algebraica Óptima]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[Sumanta]]></given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[Subhamoy]]></given-names>
</name>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,SECRET INRIA  ]]></institution>
<addr-line><![CDATA[Rocquencourt ]]></addr-line>
<country>FRANCE</country>
</aff>
<aff id="A02">
<institution><![CDATA[,SECRET INRIA Indian Statistical Institute Applied Statistics Unit]]></institution>
<addr-line><![CDATA[Calcutta ]]></addr-line>
<country>INDIA</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<volume>12</volume>
<numero>3</numero>
<fpage>267</fpage>
<lpage>284</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462009000100003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462009000100003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462009000100003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In this paper, we present theoretical constructions of Rotation Symmetric Boolean Functions (RSBFs) on odd number of variables with the maximum possible algebraic immunity. To get high nonlinearity, we generalize our construction to a search technique in the RSBF class. We present RSBFs with the maximum algebraic immunity and high nonlinearity for odd number of variables. We also study the RSBFs on even number of variables for maximum algebraic immunity.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo, presentamos construcciones teóricas de funciones Booleanas de rotación simétrica (RSBFs por sus siglas en inglés) con un número impar de variables y con máxima inmunidad algebraica. Con el objeto de obtener funciones Booleanas de muy alta no linealidad, generalizamos nuestra construcción a una técnica de búsqueda en la clase RSBF. Presentamos así RSBFs con inmunidad algebraica máxima y alta no linealidad para un número impar de variables, y también RSBFs con un número par de variables que exhiben inmunidad algebraica máxima.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Algebraic Immunity]]></kwd>
<kwd lng="en"><![CDATA[Boolean Function]]></kwd>
<kwd lng="en"><![CDATA[Nonlinearity]]></kwd>
<kwd lng="en"><![CDATA[Nonsingular Matrix]]></kwd>
<kwd lng="en"><![CDATA[Rotational Symmetry]]></kwd>
<kwd lng="en"><![CDATA[Walsh Spectrum]]></kwd>
<kwd lng="es"><![CDATA[Inmunidad algebraica]]></kwd>
<kwd lng="es"><![CDATA[funciones Booleanas]]></kwd>
<kwd lng="es"><![CDATA[no-linealidad]]></kwd>
<kwd lng="es"><![CDATA[matrices no singulares]]></kwd>
<kwd lng="es"><![CDATA[simetría rotacional]]></kwd>
<kwd lng="es"><![CDATA[Espectro de Walsh]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity<a href="#nota">*</a></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Construcci&oacute;n de Funciones Booleanas de Rotaci&oacute;n Sim&eacute;trica con Inmunidad Algebraica &Oacute;ptima</i></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Sumanta Sarkar<sup>1</sup> and Subhamoy Maitra<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1 </sup>SECRET INRIA Rocquencourt, B.P. 105 78153 Le Chesnay Cedex, FRANCE.  </i>E&#150;mail: <a href="mailto:sumanta.sarkar@inria.fr">sumanta.sarkar@inria.fr</a></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2 </sup>Applied Statistics Unit, Indian Statistical Institute, 203, B T Road, Calcutta 700 108, INDIA.  </i>E&#150;mail: <a href="mailto:subho@isical.ac.in">subho@isical.ac.in</a></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Article received on March 1, 2008    <br> Accepted on June 14, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In this paper, we present theoretical constructions of Rotation Symmetric Boolean Functions (RSBFs) on odd number of variables with the maximum possible algebraic immunity. To get high nonlinearity, we generalize our construction to a search technique in the RSBF class. We present RSBFs with the maximum algebraic immunity and high nonlinearity for odd number of variables. We also study the RSBFs on even number of variables for maximum algebraic immunity.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:   </b>Algebraic Immunity, Boolean Function, Nonlinearity, Nonsingular Matrix, Rotational Symmetry, Walsh Spectrum. </font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En este art&iacute;culo, presentamos construcciones te&oacute;ricas de funciones Booleanas de rotaci&oacute;n sim&eacute;trica (RSBFs por sus siglas en ingl&eacute;s) con un n&uacute;mero impar de variables y con m&aacute;xima inmunidad algebraica. Con el objeto de obtener funciones Booleanas de muy alta no linealidad, generalizamos nuestra construcci&oacute;n a una t&eacute;cnica de b&uacute;squeda en la clase RSBF. Presentamos as&iacute; RSBFs con inmunidad algebraica m&aacute;xima y alta no linealidad para un n&uacute;mero impar de variables, y tambi&eacute;n RSBFs con un n&uacute;mero par de variables que exhiben inmunidad algebraica m&aacute;xima.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Palabras Claves: </b>Inmunidad algebraica, funciones Booleanas, no&#150;linealidad, matrices no singulares, simetr&iacute;a rotacional, Espectro de Walsh.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v12n3/v12n3a3.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>     <p align="justify"><font face="verdana" size="2">The authors would like to thank the anonymous reviewer for his comments and suggestions on this paper.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1.<b> Armknecht, F. </b>(2004). Improving fast algebraic attacks. In B. K. Roy and W Meier (Eds.), <i>FSE, </i>Volume 3017 of <i>Lecture Notes in Computer Science, </i>pp. 65&#150;82. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046588&pid=S1405-5546200900010000300001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2.<b> Armknecht, F., C. Carlet, P. Gaborit, S. K&uuml;nzli, W. Meier, and O. Ruatta </b>(2006). Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In S. Vaudenay (Ed.), <i>EUROCRYPT, </i>Volume 4004 of <i>Lecture Notes in Computer Science, </i>pp. 147&#150;164. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046589&pid=S1405-5546200900010000300002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3.<b> Batten, L. M. </b>(2004). Algebraic attacks over GF(q). In A. Canteaut and K. Viswanathan (Eds.), <i>INDOCRYPT, </i>Volume 3348 of <i>Lecture Notes in Computer Science, </i>pp. 84&#150;91. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046590&pid=S1405-5546200900010000300003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4.<b> Braeken, A. and B. Preneel </b>(2005). Probabilistic algebraic attacks. In N. P. Smart (Ed.), <i>IMA International Conference, </i>Volume 3796 <i>of Lecture Notes in Computer Science, </i>pp. 290&#150;303. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046591&pid=S1405-5546200900010000300004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Canteaut, A. </b>(2005). Open problems related to algebraic attacks on stream ciphers. <i>In International Workshop on Coding and Cryptography, WCC 2005, pp. </i>1&#150;10. Invited talk.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046592&pid=S1405-5546200900010000300005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Carlet, C, X. Zeng, C. Li, and L. Hu </b>(2007). Further properties of several classes of Boolean functions with optimum algebraic immunity. Cryptology ePrint Archive, Report 2007/370. <a href="http://eprint.iacr.org/" target="_blank">http://eprint.iacr.org/</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046593&pid=S1405-5546200900010000300006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7.<b> Cheon, J. H. and D. H. Lee </b>(2004). Resistance of S&#150;Boxes against algebraic attacks. In B. K. Roy and W. Meier (Eds.), <i>FSE, </i>Volume 3017 of <i>Lecture Notes in Computer Science, </i>pp. 83&#150;94. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046594&pid=S1405-5546200900010000300007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8.<b> Cho, J. Y. and J. Pieprzyk </b>(2004). Algebraic attacks on SOBER&#150;t32 and SOBER&#150;t16 without Stuttering. In B. K. Roy and W. Meier (Eds.), <i>FSE, </i>Volume 3017 of <i>Lecture Notes in Computer Science, </i>pp. 49&#150;64. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046595&pid=S1405-5546200900010000300008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9.<b> Courtois, N. </b>(2003). Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh (Ed.), <i>CRYPTO, </i>Volume 2729 <i>of Lecture Notes in Computer Science, </i>pp. 176&#150;194. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046596&pid=S1405-5546200900010000300009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10.<b> Courtois, N., B. Debraize, and E. Garrido </b>(2006). On exact algebraic (non&#150;)immunity of S&#150;Boxes based on power functions. In L. M. Batten and R. Safavi&#150;Naini (Eds.), <i>ACISP, </i>Volume 4058 of <i>Lecture Notes in Computer Science, </i>pp. 76&#150;86. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046597&pid=S1405-5546200900010000300010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11.<b> Courtois, N. and W. Meier </b>(2003). Algebraic attacks on stream ciphers with linear feedback. In E. Biham (Ed.), <i>EUROCRYPT, </i>Volume 2656 of <i>Lecture Notes in Computer Science, </i>pp. 345&#150;359. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046598&pid=S1405-5546200900010000300011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12.<b> Courtois, N. and J. Pieprzyk </b>(2002). Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng (Ed.), <i>ASIACRYPT, </i>Volume 2501 of <i>Lecture Notes in Computer Science, </i>pp. 267&#150;287. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046599&pid=S1405-5546200900010000300012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13.<b> Dalai, D. K., K. C. Gupta, and S. Maitra </b>(2004). Results on algebraic immunity for cryptographically significant Boolean functions. In A. Canteaut and K. Viswanathan (Eds.), <i>INDOCRYPT, </i>Volume 3348 <i>of Lecture Notes in Computer Science, </i>pp. 92&#150;106. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046600&pid=S1405-5546200900010000300013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14.<b> Dalai, D. K., K. C. Gupta, and S. Maitra </b>(2005). Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In H. Gilbert and H. Handschuh (Eds.), <i>FSE, </i>Volume 3557 of <i>Lecture Notes in Computer Science, </i>pp. 98&#150;111. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046601&pid=S1405-5546200900010000300014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15.<b> Dalai, D. K. and S. Maitra </b>(2006). Reducing the number of homogeneous linear equations in finding annihilators. In G. Gong, T. Helleseth, H. Song, and K. Yang (Eds.), <i>SETA, </i>Volume 4086 <i>of Lecture Notes in Computer Science, </i>pp. 376&#150;390. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046602&pid=S1405-5546200900010000300015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16.<b> Dalai, D. K., S. Maitra, and S. Sarkar </b>(2006). Basic theory in construction of Boolean functions with maximum possible annihilator immunity. <i>Design Codes and Cryptography 40(1), </i>41&#150;58.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046603&pid=S1405-5546200900010000300016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17.<b> Didier, F. and J. Tillich </b>(2006). Computing the algebraic immunity efficiently. In M. J. B. Robshaw (Ed.), <i>FSE, </i>Volume 4047 of <i>Lecture Notes in Computer Science, </i>pp. 359&#150;374. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046604&pid=S1405-5546200900010000300017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18.<b> Kurosh, A. G. </b>(1955). <i>Theory of Groups, </i>Volume 1. Chelsea Publishing Co., New York.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046605&pid=S1405-5546200900010000300018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19. <b>Li, N. and W. Qi</b> (2006a). Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity. In X. Lai and K. Chen (Eds.), <i>ASIACRYPT, </i>Volume 4284 of <i>Lecture Notes in Computer Science, </i>pp. 84&#150;98. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046606&pid=S1405-5546200900010000300019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20. <b>Li, N. and W. Qi</b> (2006b). Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity. <i>IEEE Transactions on Information Theory </i>52(5), 2271&#150;2273.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046607&pid=S1405-5546200900010000300020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21.<b> Lobanov, M.</b> (2005). Tight bound between nonlinearity and algebraic immunity. Available at Cryptology ePrint Archive, <a href="http://eprint.iacr.org/" target="_blank">eprint.iacr.org</a>, No. 2005/441.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046608&pid=S1405-5546200900010000300021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22.<b> MacWilliams, F. J. and N. J. A. Sloane </b>(1977). <i>The Theory of Error Correcting Codes. </i>North Holland.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046609&pid=S1405-5546200900010000300022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23. <b>Stanica, P. and S. Maitra</b> (2008). Rotation symmetric Boolean functions&#150;Count and cryptographic properties. <i>Discrete Applied Mathematics 156</i>(10), 1567&#150;1580.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046610&pid=S1405-5546200900010000300023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24. <b>Meier, W., E. Pasalic, and C. Carlet </b>(2004). Algebraic attacks and decomposition of Boolean functions. In C. Cachin and J. Camenisch (Eds.), <i>EUROCRYPT, </i>Volume 3027 of <i>Lecture Notes in Computer Science, </i>pp. 474&#150;491. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046611&pid=S1405-5546200900010000300024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25.<b> Olejar, D. and M. Stanek </b>(1998). On cryptographic properties of random Boolean functions. <i>Journal of Universal Computer Science </i>4(8), 705&#150;717.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046612&pid=S1405-5546200900010000300025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26.<b> Qu, L., C. Li, and K. Feng </b>(2007). A note on symmetric Boolean functions with maximum algebraic immunity in odd number of variables. <i>IEEE Transactions on Information Theory </i>53(8), 2908&#150;2910.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046613&pid=S1405-5546200900010000300026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">27. <b>Sarkar, S. and S. Maitra</b> (2008). Idempotents in the neighbourhood of Patterson&#150;Wiedemann functions having Walsh spectra zeros. <i>Design Codes and Cryptography, </i>49(1&#150;3), 95&#150;103.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046614&pid=S1405-5546200900010000300027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">28. <b>Sarkar, S. and S. Maitra</b> (2007). Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunity. In S. Boztas and H. F. Lu (Eds.), <i>AAECC, </i>Volume 4851 <i>of Lecture Notes in Computer Science, </i>pp. 271&#150;280. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046615&pid=S1405-5546200900010000300028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">29.<b> Stanica, P., S. Maitra, and J. A. Clark </b>(2004). Results on rotation symmetric bent and correlation immune Boolean functions. In B. K. Roy and W. Meier (Eds.), <i>FSE, </i>Volume 3017 of <i>Lecture Notes in Computer Science, </i>pp. 161&#150;177. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046616&pid=S1405-5546200900010000300029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b><a name="nota"></a>Note</b></font></p>     <p align="justify"><font face="verdana" size="2">* This in an extended and revised version of the paper (Sarkar and Maitra 2007).</font></p>     ]]></body>
<body><![CDATA[ ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Armknecht]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improving fast algebraic attacks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2004</year>
<volume>3017</volume>
<page-range>65-82</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Armknecht]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlet]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaborit]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Künzli]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruatta]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient computation of algebraic immunity for algebraic and fast algebraic attacks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Vaudenay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[EUROCRYPT]]></source>
<year>2006</year>
<volume>4004</volume><volume>Lecture Notes in Computer Science</volume>
<page-range>147-164</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Batten]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algebraic attacks over GF(q)]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Canteaut]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Viswanathan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[INDOCRYPT]]></source>
<year>2004</year>
<volume>3348</volume>
<page-range>84-91</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braeken]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Probabilistic algebraic attacks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Smart]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[IMA International Conference]]></source>
<year>2005</year>
<volume>3796</volume>
<page-range>290-303</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Canteaut]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Open problems related to algebraic attacks on stream ciphers]]></article-title>
<collab>International Workshop on Coding and Cryptography</collab>
<source><![CDATA[]]></source>
<year>2005</year>
<month>20</month>
<day>05</day>
<page-range>1-10</page-range><publisher-name><![CDATA[WCC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carlet]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Further properties of several classes of Boolean functions with optimum algebraic immunity. Cryptology ePrint Archive]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheon]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Resistance of S-Boxes against algebraic attacks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2004</year>
<volume>3017</volume>
<page-range>83-94</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cho]]></surname>
<given-names><![CDATA[J. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Pieprzyk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algebraic attacks on SOBER-t32 and SOBER-t16 without Stuttering]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2004</year>
<volume>3017</volume>
<page-range>49-64</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Courtois]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fast algebraic attacks on stream ciphers with linear feedback]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year>2003</year>
<volume>2729</volume>
<page-range>176-194</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Courtois]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Debraize]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Garrido]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On exact algebraic (non-)immunity of S-Boxes based on power functions]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Batten]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Safavi-Naini]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[ACISP]]></source>
<year>2006</year>
<volume>4058</volume>
<page-range>76-86</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Courtois]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algebraic attacks on stream ciphers with linear feedback]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[EUROCRYPT]]></source>
<year>2003</year>
<volume>2656</volume>
<page-range>345-359</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Courtois]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Pieprzyk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptanalysis of block ciphers with overdefined systems of equations]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[ASIACRYPT]]></source>
<year>2002</year>
<volume>2501</volume>
<page-range>267-287</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalai]]></surname>
<given-names><![CDATA[D. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Results on algebraic immunity for cryptographically significant Boolean functions]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Canteaut]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Viswanathan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[INDOCRYPT]]></source>
<year>2004</year>
<volume>3348</volume>
<page-range>92-106</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalai]]></surname>
<given-names><![CDATA[D. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gilbert]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Handschuh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2005</year>
<volume>3557</volume>
<page-range>98-111</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalai]]></surname>
<given-names><![CDATA[D. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Reducing the number of homogeneous linear equations in finding annihilators]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Helleseth]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[SETA]]></source>
<year>2006</year>
<volume>4086</volume>
<page-range>376-390</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dalai]]></surname>
<given-names><![CDATA[D. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Basic theory in construction of Boolean functions with maximum possible annihilator immunity]]></article-title>
<source><![CDATA[Design Codes and Cryptography]]></source>
<year>2006</year>
<volume>40</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>41-58</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Didier]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Tillich]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Computing the algebraic immunity efficiently]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Robshaw]]></surname>
<given-names><![CDATA[M. J. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2006</year>
<volume>4047</volume>
<page-range>359-374</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kurosh]]></surname>
<given-names><![CDATA[A. G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Theory of Groups]]></source>
<year>1955</year>
<volume>1</volume>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Chelsea Publishing Co.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[ASIACRYPT]]></source>
<year>2006</year>
<volume>4284</volume>
<page-range>84-98</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>2006</year>
<volume>52</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>2271-2273</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lobanov]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tight bound between nonlinearity and algebraic immunity]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MacWilliams]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sloane]]></surname>
<given-names><![CDATA[N. J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Theory of Error Correcting Codes]]></source>
<year>1977</year>
<publisher-name><![CDATA[North Holland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stanica]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rotation symmetric Boolean functions-Count and cryptographic properties]]></article-title>
<source><![CDATA[Discrete Applied Mathematics]]></source>
<year>2008</year>
<volume>156</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1567-1580</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pasalic]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlet]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algebraic attacks and decomposition of Boolean functions]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Cachin]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Camenisch]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[EUROCRYPT]]></source>
<year>2004</year>
<volume>3027</volume>
<page-range>474-491</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olejar]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Stanek]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On cryptographic properties of random Boolean functions]]></article-title>
<source><![CDATA[Journal of Universal Computer Science]]></source>
<year>1998</year>
<volume>4</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>705-717</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A note on symmetric Boolean functions with maximum algebraic immunity in odd number of variables]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>2007</year>
<volume>53</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>2908-2910</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros]]></article-title>
<source><![CDATA[Design Codes and Cryptography]]></source>
<year>2008</year>
<volume>49</volume>
<numero>1-3</numero>
<issue>1-3</issue>
<page-range>95-103</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunit]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Boztas]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[H. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[AAECC]]></source>
<year>2007</year>
<volume>4851</volume>
<page-range>271-280</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stanica]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Maitra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Results on rotation symmetric bent and correlation immune Boolean functions]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2004</year>
<volume>3017</volume>
<page-range>161-177</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
