{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:41Z","timestamp":1726004321986},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051525"},{"type":"electronic","value":"9783030051532"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05153-2_11","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T15:42:30Z","timestamp":1546098150000},"page":"207-223","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Symmetry and Differential Properties of Generalized Boolean Functions"],"prefix":"10.1007","author":[{"given":"Thor","family":"Martinsen","sequence":"first","affiliation":[]},{"given":"Wilfried","family":"Meidl","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Pott","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-12991-4"},{"key":"11_CR2","first-page":"257","volume-title":"Boolean Methods and Models","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)"},{"key":"11_CR3","first-page":"398","volume-title":"Boolean Methods and Models","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, pp. 398\u2013472. Cambridge University Press, Cambridge (2010)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C Carlet","year":"1993","unstructured":"Carlet, C.: Partially bent functions. Des. Codes Cryptogr. 3, 135\u2013145 (1993)","journal-title":"Des. Codes Cryptogr."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1017\/CBO9781139696456.003","volume-title":"Applied Algebra and Number Theory","author":"A \u00c7e\u015fmelio\u011flu","year":"2014","unstructured":"\u00c7e\u015fmelio\u011flu, A., Meidl, W., Topuzo\u011flu, A.: Partially bent functions and their properties. Applied Algebra and Number Theory, pp. 22\u201338. Cambridge University Press, Cambridge (2014)"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.dam.2005.02.006","volume":"149","author":"TW Cusick","year":"2005","unstructured":"Cusick, T.W., Li, Y.: $$k$$-th order symmetric SAC Boolean functions and bisecting binomial coefficients. Discrete Appl. Math. 149, 73\u201386 (2005)","journal-title":"Discrete Appl. Math."},{"key":"11_CR7","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean Functions and Applications, 2nd edn. Academic Press, San Diego (2017)","edition":"2"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1008399109102","volume":"22","author":"S Dubuc","year":"2001","unstructured":"Dubuc, S.: Characterization of linear structures. Des. Codes Cryptogr. 22, 33\u201345 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/3-540-39118-5_23","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 87","author":"J-H Evertse","year":"1988","unstructured":"Evertse, J.-H.: Linear structures in blockciphers. In: Chaum, D., Price, W.L. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 249\u2013266. Springer, Heidelberg (1988). \nhttps:\/\/doi.org\/10.1007\/3-540-39118-5_23"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-1-4612-2418-1_10","volume-title":"Number Theory: New York Seminar 1991\u20131995","author":"GA Freiman","year":"1996","unstructured":"Freiman, G.A.: On solvability of a system of two Boolean linear equations. In: Chudnovsky, D.V., Chudnovsky, G.V., Nathanson, M.B. (eds.) Number Theory: New York Seminar 1991\u20131995, pp. 135\u2013150. Springer, New York (1996)"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/BF01215917","volume":"17","author":"J Gathen von zur","year":"1997","unstructured":"von zur Gathen, J., Roche, J.: Polynomials with two values. Combinatorica 17, 345\u2013362 (1997)","journal-title":"Combinatorica"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0020-0190(93)90237-4","volume":"47","author":"K Gopalakrishnan","year":"1993","unstructured":"Gopalakrishnan, K., Hoffman, D.G., Stinson, D.R.: A note on a conjecture concerning symmetric resilient functions. Inf. Process. Lett. 47, 139\u2013143 (1993)","journal-title":"Inf. Process. Lett."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-0348-7865-4_9","volume-title":"Coding, Cryptography and Combinatorics","author":"A Gouget","year":"2004","unstructured":"Gouget, A.: On the propagation criterion of Boolean functions. In: Feng, K., Niederreiter, H., Xing, C. (eds.) Coding, Cryptography and Combinatorics, vol. 23, pp. 153\u2013168. Birkh\u00e4user, Basel (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-0348-7865-4_9"},{"issue":"7","key":"11_CR14","doi-asserted-by":"publisher","first-page":"5432","DOI":"10.1109\/TIT.2018.2837883","volume":"64","author":"S Hod\u017ei\u0107","year":"2018","unstructured":"Hod\u017ei\u0107, S., Meidl, W., Pasalic, E.: Full characterization of generalized bent functions as (semi)-bent spaces, their dual and the Gray image. IEEE Trans. Inf. Theory 64(7), 5432\u20135440 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.dam.2017.04.035","volume":"227","author":"EJ Ionascu","year":"2017","unstructured":"Ionascu, E.J., Martinsen, T., St\u0103nic\u0103, P.: Bisecting binomial coefficients. Discrete Appl. Math. 227, 70\u201383 (2017)","journal-title":"Discrete Appl. Math."},{"issue":"15","key":"11_CR16","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1049\/el:19910839","volume":"27","author":"N Jefferies","year":"1991","unstructured":"Jefferies, N.: Sporadic partitions of binomial coefficients. Electron. Lett. 27(15), 134\u2013136 (1991)","journal-title":"Electron. Lett."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"PV Kumar","year":"1985","unstructured":"Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Comb. Theory Ser. A 40, 90\u2013107 (1985)","journal-title":"J. Comb. Theory Ser. A"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/3-540-60590-8_6","volume-title":"Fast Software Encryption","author":"X Lai","year":"1995","unstructured":"Lai, X.: Additive and linear structures of cryptographic functions. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 75\u201385. Springer, Heidelberg (1995). \nhttps:\/\/doi.org\/10.1007\/3-540-60590-8_6"},{"key":"11_CR19","volume-title":"Recent Developments in Switching Theory","author":"RL Lechner","year":"1971","unstructured":"Lechner, R.L.: Harmonic analysis of switching functions. In: Mukhopadhyay, A. (ed.) Recent Developments in Switching Theory. Academic Press, New York (1971)"},{"key":"11_CR20","volume-title":"The Theory of Error Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"11_CR21","unstructured":"Martinsen, T.: Correlation immunity, avalanche features, and other cryptographic properties of generalized Boolean functions. Ph.D. dissertation, Naval Postgraduate School, Monterey, CA (2017)"},{"issue":"12","key":"11_CR22","doi-asserted-by":"publisher","first-page":"7804","DOI":"10.1109\/TIT.2017.2754498","volume":"63","author":"T Martinsen","year":"2017","unstructured":"Martinsen, T., Meidl, W., Mesnager, S., Stanica, P.: Decomposing generalized bent and hyperbent functions. IEEE Trans. Inf. Theory 63(12), 7804\u20137812 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-319-55227-9_12","volume-title":"Arithmetic of Finite Fields","author":"T Martinsen","year":"2016","unstructured":"Martinsen, T., Meidl, W., St\u0103nic\u0103, P.: Generalized bent functions and their Gray images. In: Duquesne, S., Petkova-Nikova, S. (eds.) WAIFI 2016. LNCS, vol. 10064, pp. 160\u2013173. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-55227-9_12"},{"issue":"1","key":"11_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-016-0283-7","volume":"85","author":"T Martinsen","year":"2017","unstructured":"Martinsen, T., Meidl, W., St\u0103nic\u0103, P.: Partial spread and vectorial generalized bent functions. Des. Codes Cryptogr. 85(1), 1\u201313 (2017)","journal-title":"Des. Codes Cryptogr."},{"key":"11_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S.: Bent Functions: Fundamentals and Results. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-32595-8"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1006\/eujc.1994.1044","volume":"15","author":"P Savicky","year":"1994","unstructured":"Savicky, P.: On the bent Boolean functions that are symmetric. Eur. J. Comb. 15, 407\u2013410 (1994)","journal-title":"Eur. J. Comb."},{"issue":"4","key":"11_CR27","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1109\/TIT.2009.2013041","volume":"55","author":"KU Schmidt","year":"2009","unstructured":"Schmidt, K.U.: Quaternary constant-amplitude codes for multicode CDMA. IEEE Trans. Inf. Theory 55(4), 1824\u20131832 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR28","unstructured":"Sol\u00e9, P., Tokareva, N.: Connections between quaternary and binary bent functions. Prikl. Diskr. Mat. 1, 16\u201318 (2009). \nhttp:\/\/eprint.iacr.org\/2009\/544.pdf"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-012-9622-5","volume":"69","author":"P St\u0103nic\u0103","year":"2013","unstructured":"St\u0103nic\u0103, P., Martinsen, T., Gangopadhyay, S., Singh, B.K.: Bent and generalized bent Boolean functions. Des. Codes Cryptogr. 69, 77\u201394 (2013)","journal-title":"Des. Codes Cryptogr."},{"issue":"7","key":"11_CR30","doi-asserted-by":"publisher","first-page":"4668","DOI":"10.1109\/TIT.2017.2686987","volume":"63","author":"C Tang","year":"2017","unstructured":"Tang, C., Xiang, C., Qi, Y., Feng, K.: Complete characterization of generalized bent and $$2^k$$-bent Boolean functions. IEEE Trans. Inf. Theory 63(7), 4668\u20134674 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR31","volume-title":"Bent Functions, Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva, N.: Bent Functions, Results and Applications to Cryptography. Academic Press, San Diego (2015)"},{"issue":"9","key":"11_CR32","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/18.915690","volume":"47","author":"YL Zheng","year":"2001","unstructured":"Zheng, Y.L., Zhang, X.M.: On plateaued functions. IEEE Trans. Inf. Theory 47(9), 1215\u20131223 (2001)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Arithmetic of Finite Fields"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05153-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T15:46:09Z","timestamp":1546098369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05153-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051525","9783030051532"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05153-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"WAIFI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Arithmetic of Finite Fields","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waifi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/waifi.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}