{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:09Z","timestamp":1740099069665,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319893389"},{"type":"electronic","value":"9783319893396"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89339-6_1","type":"book-chapter","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T21:32:30Z","timestamp":1522877550000},"page":"3-10","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Complete Characterization of\u00a0Plateaued Boolean Functions in Terms of\u00a0Their Cayley Graphs"],"prefix":"10.1007","author":[{"given":"Constanza","family":"Riera","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8622-7120","authenticated-orcid":false,"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/12.755000","volume":"48","author":"A Bernasconi","year":"1999","unstructured":"Bernasconi, A., Codenotti, B.: Spectral analysis of Boolean functions as a graph eigenvalue problem. IEEE Trans. Comput. 48(3), 345\u2013351 (1999)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"1_CR2","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/12.954512","volume":"50","author":"A Bernasconi","year":"2001","unstructured":"Bernasconi, A., Codenotti, B., VanderKam, J.M.: A characterization of bent functions in terms of strongly regular graphs. IEEE Trans. Comput. 50(9), 984\u2013985 (2001)","journal-title":"IEEE Trans. Comput."},{"key":"1_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-12991-4"},{"key":"1_CR4","first-page":"257","volume-title":"Boolean Functions for Cryptography and Error Correcting Codes","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Boolean models and methods in mathematics, computer science, and engineering. In: Hammer, P., Crama, Y. (eds.) Boolean Functions for Cryptography and Error Correcting Codes, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)"},{"key":"1_CR5","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean Functions and Applications, 2nd edn. Academic Press, San Diego (2017). 1st edn. (2009)","edition":"2"},{"key":"1_CR6","volume-title":"Spectra of Graphs","author":"DM Cvetkovic","year":"1979","unstructured":"Cvetkovic, D.M., Doob, M., Sachs, H.: Spectra of Graphs. Academic Press, New York (1979)"},{"key":"1_CR7","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.jcta.2013.01.006","volume":"120","author":"ER Dam van","year":"2013","unstructured":"van Dam, E.R., Omidi, G.R.: Strongly walk-regular graphs. J. Comb. Theory Ser. A 120, 803\u2013810 (2013)","journal-title":"J. Comb. Theory Ser. A"},{"key":"1_CR8","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.endm.2007.07.057","volume":"29","author":"MA Fiol","year":"2007","unstructured":"Fiol, M.A., Garriga, E.: Spectral and geometric properties of $$k$$k-walk-regular graphs. Electron. Notes Discrete Math. 29, 333\u2013337 (2007)","journal-title":"Electron. Notes Discrete Math."},{"issue":"4","key":"1_CR9","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/BF02189090","volume":"8","author":"CD Godsil","year":"1988","unstructured":"Godsil, C.D.: Bounding the diameter of distance-regular graphs. Combinatorica 8(4), 333\u2013343 (1988)","journal-title":"Combinatorica"},{"key":"1_CR10","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.laa.2016.09.043","volume":"512","author":"X Huang","year":"2017","unstructured":"Huang, X., Huang, Q.: On regular graphs with four distinct eigenvalues. Linear Algebra Appl. 512, 219\u2013233 (2017)","journal-title":"Linear Algebra Appl."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10683-0_11","volume-title":"Open Problems in Mathematics and Computational Science","author":"S Mesnager","year":"2014","unstructured":"Mesnager, S.: On semi-bent functions and related plateaued functions over the Galois field $$\\mathbb{F}_{2^{n}}$$F2n. In: Ko\u00e7, \u00c7.K. (ed.) Open Problems in Mathematics and Computational Science, pp. 243\u2013273. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10683-0_11"},{"key":"1_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S.: Bent Functions: Fundamentals and Results. Springer, New York (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-32595-8"},{"key":"1_CR13","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. J. Comb. Theory Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Comb. Theory Ser. A"},{"key":"1_CR14","volume-title":"Bent Functions, Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva, N.: Bent Functions, Results and Applications to Cryptography. Academic Press, San Diego (2015)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89339-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T11:05:48Z","timestamp":1523012748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89339-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319893389","9783319893396"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89339-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}