{"id":"https://openalex.org/W4383221411","doi":"https://doi.org/10.1145/3579856.3590337","title":"IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity","display_name":"IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221411","doi":"https://doi.org/10.1145/3579856.3590337"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3590337","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3590337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011176150","display_name":"Lili Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lili Yan","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0009-0000-8455-2731","affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031301187","display_name":"Jingyi Cui","orcid":"https://orcid.org/0000-0003-3055-7785"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyi Cui","raw_affiliation_strings":["School of New Media and Communication, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0003-3055-7785","affiliations":[{"raw_affiliation_string":"School of New Media and Communication, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414637","display_name":"Jian Liu","orcid":"https://orcid.org/0000-0001-9104-2975"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Liu","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0001-9104-2975","affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040791046","display_name":"Guangquan Xu","orcid":"https://orcid.org/0000-0001-8701-3944"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangquan Xu","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0001-8701-3944","affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064458680","display_name":"Lidong Han","orcid":"https://orcid.org/0000-0003-2094-5629"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong Han","raw_affiliation_strings":["The Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, China"],"raw_orcid":"https://orcid.org/0000-0003-2094-5629","affiliations":[{"raw_affiliation_string":"The Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045461052","display_name":"Alireza Jolfaei","orcid":"https://orcid.org/0000-0001-7818-459X"},"institutions":[{"id":"https://openalex.org/I169541294","display_name":"Flinders University","ror":"https://ror.org/01kpzv902","country_code":"AU","type":"education","lineage":["https://openalex.org/I169541294"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Alireza Jolfaei","raw_affiliation_strings":["College of Science and Engineering, Flinders University, Australia"],"raw_orcid":"https://orcid.org/0000-0001-7818-459X","affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Flinders University, Australia","institution_ids":["https://openalex.org/I169541294"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081182489","display_name":"Xi Zheng","orcid":"https://orcid.org/0000-0002-2572-2355"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xi Zheng","raw_affiliation_strings":["School of Computing, Macquarie University, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2572-2355","affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5011176150"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":1.1929,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82838574,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"638","last_page":"648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.8090863227844238},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.7557213306427002},{"id":"https://openalex.org/keywords/crossover","display_name":"Crossover","score":0.7497988939285278},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5606842041015625},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.5359734892845154},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.5113541483879089},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5049837231636047},{"id":"https://openalex.org/keywords/boolean-network","display_name":"Boolean network","score":0.5019791126251221},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.44736552238464355},{"id":"https://openalex.org/keywords/maximum-satisfiability-problem","display_name":"Maximum satisfiability problem","score":0.4350528120994568},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4344620108604431},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4181044399738312},{"id":"https://openalex.org/keywords/exclusive-or","display_name":"Exclusive or","score":0.4119046628475189},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3802216947078705},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37869152426719666},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3301244080066681},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.1464678943157196}],"concepts":[{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.8090863227844238},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.7557213306427002},{"id":"https://openalex.org/C122507166","wikidata":"https://www.wikidata.org/wiki/Q628906","display_name":"Crossover","level":2,"score":0.7497988939285278},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5606842041015625},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.5359734892845154},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.5113541483879089},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5049837231636047},{"id":"https://openalex.org/C134444547","wikidata":"https://www.wikidata.org/wiki/Q585230","display_name":"Boolean network","level":3,"score":0.5019791126251221},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.44736552238464355},{"id":"https://openalex.org/C111797529","wikidata":"https://www.wikidata.org/wiki/Q17080584","display_name":"Maximum satisfiability problem","level":3,"score":0.4350528120994568},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4344620108604431},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4181044399738312},{"id":"https://openalex.org/C35898486","wikidata":"https://www.wikidata.org/wiki/Q498186","display_name":"Exclusive or","level":3,"score":0.4119046628475189},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3802216947078705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37869152426719666},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3301244080066681},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.1464678943157196},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3590337","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3590337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W243424403","https://openalex.org/W2495595500","https://openalex.org/W2499930225","https://openalex.org/W2502753018","https://openalex.org/W2505008844","https://openalex.org/W2594834629","https://openalex.org/W2765254330","https://openalex.org/W2790824722","https://openalex.org/W2963732009","https://openalex.org/W3002948307","https://openalex.org/W3004165904","https://openalex.org/W3034033513","https://openalex.org/W3111471029","https://openalex.org/W3136693420","https://openalex.org/W3149318513","https://openalex.org/W3213285982","https://openalex.org/W4289524100","https://openalex.org/W4297895270"],"related_works":["https://openalex.org/W64805845","https://openalex.org/W2014833376","https://openalex.org/W1967292023","https://openalex.org/W2995617542","https://openalex.org/W3020918109","https://openalex.org/W2058779747","https://openalex.org/W67752311","https://openalex.org/W3141532631","https://openalex.org/W2292828258","https://openalex.org/W2615739385"],"abstract_inverted_index":{"The":[0,117],"Boolean":[1,29,62],"functions":[2,30,96,130,146,175],"satisfying":[3],"secure":[4],"properties":[5,34],"on":[6,105],"the":[7,20,23,41,53,58,72,75,81,128,138,143,148,154,166,170],"restricted":[8,155],"sets":[9,156],"of":[10,22,61,80,90,151,157,162,169],"inputs":[11,158],"are":[12,102],"studied":[13],"recently":[14],"due":[15],"to":[16,69,141],"their":[17],"importance":[18],"in":[19,40,153],"framework":[21],"FLIP":[24],"stream":[25],"cipher.":[26],"However,":[27],"finding":[28],"with":[31,52,97,131,147,159],"optimal":[32],"cryptographic":[33,42],"is":[35,67,137],"an":[36,47],"open":[37],"research":[38],"problem":[39],"community.":[43],"This":[44],"paper":[45],"presents":[46],"Improved":[48],"Genetic":[49],"Algorithm":[50],"(IGA)":[51],"directed":[54],"changes":[55],"that":[56,71,120],"keep":[57],"weightwise":[59,77,91,133,149,171],"balancedness":[60,78],"functions.":[63],"A":[64],"cross-protection":[65],"strategy":[66],"proposed":[68],"ensure":[70],"offspring":[73],"has":[74,122],"same":[76],"characteristics":[79],"parents":[82],"while":[83],"implementing":[84],"crossover.":[85],"Then,":[86],"a":[87,98,123],"large":[88],"number":[89],"(almost)":[92],"perfectly":[93],"balanced":[94],"(W(A)PB)":[95],"good":[99],"nonlinearity":[100,150,172],"profile":[101],"obtained":[103],"based":[104],"IGA.":[106],"Finally,":[107],"we":[108],"make":[109],"comparisons":[110,118],"between":[111],"our":[112],"constructions":[113],"and":[114,164],"relevant":[115],"works.":[116],"show":[119],"IGA":[121],"significant":[124],"advantage":[125],"for":[126,173,176],"reaching":[127],"W(A)PB":[129,174],"high":[132],"nonlinearity.":[134],"Moreover,":[135],"it":[136],"first":[139],"time":[140],"obtain":[142],"8-variable":[144],"WPB":[145],"28":[152],"Hamming":[160],"weight":[161],"4,":[163],"list":[165],"statistical":[167],"indicators":[168],"input":[177],"size":[178],"n":[179],"=":[180],"9,":[181],"10.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
