{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T12:58:20Z","timestamp":1762606700555,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319291710"},{"type":"electronic","value":"9783319291727"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29172-7_2","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T11:38:22Z","timestamp":1452253102000},"page":"17-30","source":"Crossref","is-referenced-by-count":13,"title":["Results on Characterizations of Plateaued Functions in Arbitrary Characteristic"],"prefix":"10.1007","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"given":"Ferruh","family":"\u00d6zbudak","sequence":"additional","affiliation":[]},{"given":"Ahmet","family":"S\u0131nak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"key":"2_CR1","unstructured":"Cao, X., Chen, H., Mesnager, S.: Further results on semi-bent functions in polynomial form. J. Adv. Math. Commun. (AMC) (To appear)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1017\/CBO9780511780448.012","volume":"134","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial boolean functions for cryptography. Boolean Models Methods Math. Comput. Sci. Eng. 134, 398\u2013469 (2010)","journal-title":"Boolean Models Methods Math. Comput. Sci. Eng."},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-319-18681-8_5","volume-title":"Codes, Cryptology, and Information Security","author":"C Carlet","year":"2015","unstructured":"Carlet, C.: On the properties of vectorial functions with plateaued components and their consequences on APN functions. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E.M. (eds.) Codes, Cryptology, and Information Security. LNCS, vol. 9084, pp. 63\u201373. Springer, Heidelberg (2015)"},{"issue":"2\u20133","key":"2_CR4","first-page":"205","volume":"20","author":"C Carlet","year":"2004","unstructured":"Carlet, C., Ding, C.: Highly nonlinear mappings. Spec. Issue Complex. Issues Coding Crypt. J. Complex. 20(2\u20133), 205\u2013244 (2004)","journal-title":"Spec. Issue Complex. Issues Coding Crypt. J. Complex."},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ffa.2005.07.003","volume":"13","author":"C Carlet","year":"2007","unstructured":"Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite Fields Appl. 13(1), 121\u2013135 (2007)","journal-title":"Finite Fields Appl."},{"issue":"5","key":"2_CR6","doi-asserted-by":"publisher","first-page":"3287","DOI":"10.1109\/TIT.2011.2181330","volume":"58","author":"C Carlet","year":"2012","unstructured":"Carlet, C., Mesnager, S.: On semi-bent boolean functions. IEEE Trans. Inf. Theory 58(5), 3287\u20133292 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-540-39887-5_6","volume-title":"Fast Software Encryption","author":"C Carlet","year":"2003","unstructured":"Carlet, C., Prouff, E.: On plateaued functions and their constructions. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 54\u201373. Springer, Heidelberg (2003)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1090\/conm\/625\/12496","volume":"625","author":"G Cohen","year":"2014","unstructured":"Cohen, G., Mesnager, S.: On constructions of semi-bent functions from bent functions. J. Contemp. Math. 625, 141\u2013154 (2014). Discrete Geometry and Algebraic Combinatorics, American Mathematical Society","journal-title":"J. Contemp. Math."},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.ffa.2006.10.003","volume":"14","author":"E \u00c7ak\u00e7ak","year":"2008","unstructured":"\u00c7ak\u00e7ak, E., \u00d6zbudak, F.: Curves related to coulter\u2019s maximal curves. Finite Fields Appl. 14(1), 209\u2013220 (2008)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jpaa.2006.08.007","volume":"210","author":"E \u00c7ak\u00e7ak","year":"2007","unstructured":"\u00c7ak\u00e7ak, E., \u00d6zbudak, F.: Some Artin-Schreier type function fields over finite fields with prescribed genus and number of rational places. J. Pure Appl. Algebra 210(1), 113\u2013135 (2007)","journal-title":"J. Pure Appl. Algebra"},{"issue":"1\u20133","key":"2_CR11","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10623-012-9686-2","volume":"66","author":"A \u00c7e\u015fmelio\u011flu","year":"2013","unstructured":"\u00c7e\u015fmelio\u011flu, A., Meidl, W.: A construction of bent functions from plateaued functions. Des. Codes Crypt. 66(1\u20133), 231\u2013242 (2013)","journal-title":"Des. Codes Crypt."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"\u00c7e\u015fmelio\u011flu, A., Meidl, W.: Non weakly regular bent polynomials from vectorial quadratic functions. In: Topics in Finite Fields-Proceedings of Fq11, Contemporary Mathematics, AMS, vol. 632, pp. 83\u201394 (2015)","DOI":"10.1090\/conm\/632\/12620"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/18.923728","volume":"47","author":"H Dobbertin","year":"2001","unstructured":"Dobbertin, H., Helleseth, T., Kumar, P.V., Martinsen, H.M.: Ternary m-sequences with three-valued cross-correlation function: new decimations of Welch and Niho type. IEEE Trans. Inf. Theory 47(4), 1473\u20131481 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"2_CR14","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth, T., Kholosha, K.: Monomial and quadratic bent functions over the finite filed of odd characteristic. IEEE Trans. Inf. Theory 52(5), 2018\u20132032 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-77404-4_5","volume-title":"Sequences, Subsequences, and Consequences","author":"T Helleseth","year":"2007","unstructured":"Helleseth, T., Kholosha, A.: On the dual of monomial quadratic p-ary bent functions. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.) SSC 2007. LNCS, vol. 4893, pp. 50\u201361. Springer, Heidelberg (2007)"},{"issue":"2","key":"2_CR16","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/18.748997","volume":"45","author":"T Helleseth","year":"1999","unstructured":"Helleseth, T., Rong, C., Sandberg, D.: New families of almost perfect nonlinear power mappings. IEEE Trans. Inf. Theory 45(2), 475\u2013485 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.ffa.2003.12.004","volume":"10","author":"X-D Hou","year":"2004","unstructured":"Hou, X.-D.: p-ary and q-ary versions of certain results about bent functions and resilient functions. Finite Fields Appl. 10(4), 566\u2013582 (2004)","journal-title":"Finite Fields Appl."},{"issue":"2","key":"2_CR18","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10623-005-6345-x","volume":"38","author":"G Khoo","year":"2006","unstructured":"Khoo, G.: A new characterization of semi-bent and bent functions on finite fields. Des. Codes Crypt. 38(2), 279\u2013295 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"PV Kumar","year":"1985","unstructured":"Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Comb. Theory Ser. A 40(1), 90\u2013107 (1985)","journal-title":"J. Comb. Theory Ser. A"},{"issue":"11","key":"2_CR20","doi-asserted-by":"publisher","first-page":"7443","DOI":"10.1109\/TIT.2011.2160039","volume":"57","author":"S Mesnager","year":"2011","unstructured":"Mesnager, S.: Semi-bent functions from Dillon and Niho exponents, Kloosterman sums and Dickson polynomials. IEEE Trans. Inf. Theory 57(11), 7443\u20137458 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-33481-8_2","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"S Mesnager","year":"2012","unstructured":"Mesnager, S.: Semi-bent functions with multiple trace terms and hyperelliptic curves. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 18\u201336. Springer, Heidelberg (2012)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-45239-0_1","volume-title":"Cryptography and Coding","author":"S Mesnager","year":"2013","unstructured":"Mesnager, S.: Semi-bent functions from oval polynomials. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 1\u201315. Springer, Heidelberg (2013)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-319-12325-7_6","volume-title":"Sequences and Their Applications - SETA 2012","author":"S Mesnager","year":"2014","unstructured":"Mesnager, S.: Characterizations of plateaued and bent functions in characteristic p. In: Schmidt, K.-U., Winterhof, A. (eds.) SETA 2014. LNCS, vol. 8865, pp. 72\u201382. Springer, Heidelberg (2014)"},{"key":"2_CR24","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-319-10683-0_11","volume-title":"Open Problems in Mathematics and Computational Science","author":"S Mesnager","year":"2014","unstructured":"Mesnager, S.: On semi-bent functions and related plateaued functions over the Galois field $$F_{2^n}$$ . In: Ko\u00e7, \u00c7.K. (ed.) Open Problems in Mathematics and Computational Science, pp. 243\u2013273. Springer International Publishing, Switzerland (2014)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 1991","author":"K Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect nonlinear S-boxes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 378\u2013386. Springer, Heidelberg (1991)"},{"issue":"3","key":"2_CR26","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. J. Comb. Theory Ser. A 20(3), 300\u2013305 (1976)","journal-title":"J. Comb. Theory Ser. A"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Tan, Y., Yang, J., Zhang, X.: A recursive construction of p-ary bent functions which are not weakly regular. In: IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 156\u2013159 (2010)","DOI":"10.1109\/ICITIS.2010.5688751"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-540-47942-0_24","volume-title":"Information and Communication Security","author":"Y Zheng","year":"1999","unstructured":"Zheng, Y., Zhang, X.-M.: Plateaued functions. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 284\u2013300. Springer, Heidelberg (1999)"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/10719994_6","volume-title":"Information Security and Cryptology - ICISC\u201999","author":"Y Zheng","year":"2000","unstructured":"Zheng, Y., Zhang, X.-M.: Relationships between bent functions and complementary plateaued functions. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol. 1787, pp. 60\u201375. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Information Security in the Balkans"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29172-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T02:39:41Z","timestamp":1748745581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29172-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319291710","9783319291727"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29172-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}