{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:12Z","timestamp":1772283672552,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540573401","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_19","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"280-291","source":"Crossref","is-referenced-by-count":20,"title":["Partially-bent functions"],"prefix":"10.1007","author":[{"given":"C.","family":"Carlet","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"P. Camion, C. Carlet, P. Charpin and N. SendrierOn correlation-immune functions. Crypto\u201991, Advances in Cryptology, Lecture Notes on Computer Science. Springer Verlag no 576."},{"key":"19_CR2","unstructured":"C. CarletCodes de Reed-Muller, codes de Kerdock et de Preparata, th\u00e8se, publication du LITP, Institut Blaise Pascal. Universit\u00e9 Paris 6, no 90.59 (1990)."},{"key":"19_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Eurocode 90","author":"C. Carlet","year":"1991","unstructured":"C. CarletA transformation on boolean functions, its consequences on some problems related to Reed-Muller codes, Eurocode 90. Lecture notes in computer science 514 (1991)."},{"key":"19_CR4","unstructured":"J. F. DillonElementary Hadamard Difference sets, Ph. D. Thesis, Univ. of Maryland (1974)."},{"key":"19_CR5","unstructured":"F. J. Mac Williams & N. J. A. SloaneThe theory of error correcting codes, North Holland 1977."},{"key":"19_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/3-540-46416-6_12","volume-title":"Eurocrypt\u201991","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, R. Govaerts and J. VandewalleBoolean Functions Satisfying Higher Order Propagation Critereia Eurocrypt\u201991, Lecture Notes in Computer Science 547 p 141\u2013152 also presented at Las Vegas Int. Conf. on Finite Fields and Adv. in Com. and Comp. 1991."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20A","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. RothausOn bent functions, J. Comb. Theory, 20A (1976) 300\u2013305.","journal-title":"J. Comb. Theory"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"T. SiegenthalerCorrelation-immunity of nonlinear combining functions for cryptographic applications, IEEE on Inf. Theory, vol IT-30, no 5, Sept. 84.","DOI":"10.1109\/TIT.1984.1056949"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"G.-Z. Xiao & J. L. MasseyA spectral characterization of correlation-immune combining functions, IEEE, Vol 34, no 3, May 88.","DOI":"10.1109\/18.6037"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:12Z","timestamp":1605647712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_19","relation":{},"subject":[]}}