{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:09Z","timestamp":1772283549016,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_29","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"422-433","source":"Crossref","is-referenced-by-count":22,"title":["More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings"],"prefix":"10.1007","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"4","key":"29_CR1","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1515\/dma.1994.4.4.341","volume":"4","author":"A.S. Ambrosimov","year":"1994","unstructured":"A.S. Ambrosimov. Properties of bent functions of q-valued logic over finite fields. Discrete Math. Appl. vol 4, No 4, pages 341\u2013350 (1994)","journal-title":"Discrete Math. Appl."},{"key":"29_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/3-540-48658-5_24","volume-title":"Advances in Cryptology, CRYPTO\u201994","author":"J. Bierbrauer","year":"1994","unstructured":"J. Bierbrauer, K. Gopalakrishnan and D.R. Stinson. Bounds for resilient functions and orthogonal arrays. Advances in Cryptology, CRYPTO\u201994, Lecture Notes in Computer Sciences, Springer Verlag no 839, pages 247\u2013256 (1994)"},{"key":"29_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/3-540-68339-9_25","volume-title":"Advances in Cryptology, EUROCRYPT\u201996","author":"P. Camion","year":"1996","unstructured":"P. Camion and A. Canteaut. Construction of t-resilient functions over a finite alphabet, Advances in Cryptology, EUROCRYPT\u201996, Lecture Notes in Computer Sciences, Springer Verlag no 1070, pages 283\u2013293 (1996)"},{"key":"29_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-68697-5_28","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201996","author":"P. Camion","year":"1996","unstructured":"P. Camion and A. Canteaut. Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations. In N. Koblitz, editor, Advances in Cryptology \u2014 CRYPTO\u201996, number 1109 in Lecture Notes in Computer Science, pages 372\u2013386 Springer-Verlag, 1996."},{"key":"29_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-46766-1_6","volume-title":"Advances in Cryptology, CRYPTO\u201991","author":"P. Camion","year":"1992","unstructured":"P. Camion, C. Carlet, P. Charpin and N. Sendrier. On correlation-immune functions. Advances in Cryptology, CRYPTO\u201991, Lecture Notes in Computer Sciences, Springer Verlag no 576, pages 86\u2013100 (1992)"},{"key":"29_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-48285-7_8","volume-title":"EUROCRYPT\u2019 93, Advances in Cryptology","author":"C. Carlet","year":"1994","unstructured":"C. Carlet. Two new classes of bent functions. EUROCRYPT\u2019 93, Advances in Cryptology, Lecture Notes in Computer Science 765, pages 77\u2013101 (1994)"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/18.412693","volume":"41","author":"C. Carlet","year":"1995","unstructured":"C. Carlet, Generalized Partial Sprcads, IEEE Transactions on Information Theory vol 41 pages 1482\u20131487 (1995)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"C. Carlet. A construction of bent functions. Finite Fields and Applications, London Mathematical Society, Lecture Series 233, Cambridge University Press, pages 47\u201358 (1996)","DOI":"10.1017\/CBO9780511525988.006"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1006\/jcta.1996.0110","volume":"76","author":"C. Carlet","year":"1996","unstructured":"C. Carlet and P. Guillot. A characterization of binary bent functions. Journal of Combinatorial Theory, Series A, Vol. 76, No. 2 pages 328\u2013335 (1996)","journal-title":"Journal of Combinatorial Theory, Series A"},{"key":"29_CR10","unstructured":"C. Carlet. Hyperbent functions. PRAGOCRYPT\u201997, Czech Technical University Publishing House, pages 145\u2013155 (1996)."},{"key":"29_CR11","unstructured":"J. F. Dillon. Elementary Hadamard Difference sets. Ph. D. Thesis, Univ. of Maryland (1974)."},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"A. R. Hammons Jr.","year":"1994","unstructured":"A. R. Hammons Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane and P. Sol\u00e9. The Z 4-linearity of Kerdock, Preparata, Goethals and related codes. IEEE Transactions on Information Theory, vol 40, pages 301\u2013320, (1994)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR13","first-page":"90","volume":"40","author":"P. V. Kumar","year":"1985","unstructured":"P. V. Kumar, R.A. Scholtz and L.R. Welch. Generalized bent functions and their properties. Journal of Combinatorial Theory, Series A 40, pages 90\u2013107 (1985)","journal-title":"Series A"},{"key":"29_CR14","volume-title":"Finite rings with identity","author":"B.R. MacDonald","year":"1974","unstructured":"B.R. MacDonald. Finite rings with identity. Marcel Dekker, NY, 1974"},{"key":"29_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology, EUROCRYPT\u2019 89","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinearity Criteria for Cryptographic Functions. Advances in Cryptology, EUROCRYPT\u2019 89, Lecture Notes in Computer Science 434, pages 549\u2013562, Springer Verlag (1990)"},{"key":"29_CR16","series-title":"Lect Notes Comput Sci","first-page":"378","volume-title":"Advances in Cryptology, EUROCRYPT\u2019 91","author":"K. Nyberg","year":"1992","unstructured":"K. Nyberg. Perfect non-linear S-boxes. Advances in Cryptology, EUROCRYPT\u2019 91, Lecture Notes in Computer Science 547, pages 378\u2013386, Springer Verlag (1992)"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20A","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus. On bent functions. J. Comb. Theory, 20A, pages 300\u2013305 (1976)","journal-title":"J. Comb. Theory"},{"key":"29_CR18","volume-title":"Algebraic Theory of Numbers","author":"P. Samuel","year":"1970","unstructured":"P. Samuel. Algebraic Theory of Numbers. Boston, Houghton Mifflin, 1970"},{"key":"29_CR19","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication theory of secrecy systems. in Bell system technical journal, vol. 28, pages 656\u2013715 (1949)","journal-title":"Bell system technical journal"},{"issue":"5","key":"29_CR20","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler. Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. on Inf. Theory, vol IT-30, no 5, pages 776\u2013780 (1984)","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"29_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BFb0053423","volume-title":"Advances in Cryptology, EUROCRYPT\u2019 94","author":"C.P. Schnorr","year":"1995","unstructured":"C.P. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. Advances in Cryptology, EUROCRYPT\u2019 94, Lecture Notes in Computer Science 950, pages 47\u201357, Springer Verlag (1995)"},{"key":"29_CR22","first-page":"569","volume":"IT 34","author":"X. Guo-Zhen","year":"1988","unstructured":"Xiao Guo-Zhen and J. L. Massey. A Spectral Characterization of Correlation-Immune Combining Functions. IEEE Trans. Inf. Theory, Vol IT 34, no 3, pages 569\u2013571 (1988).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:32:10Z","timestamp":1556739130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}