{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T09:21:12Z","timestamp":1773912072525,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540666820","type":"print"},{"value":"9783540479420","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_24","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"284-300","source":"Crossref","is-referenced-by-count":85,"title":["Plateaued Functions"],"prefix":"10.1007","author":[{"given":"Yuliang","family":"Zheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xian-Mo","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","first-page":"87","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"P. Camion","year":"1992","unstructured":"Camion, P., Carlet, C., Charpin, P., Sendrier, N.: On correlation-immune functions. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 87\u2013100. Springer, Heidelberg (1992)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C. Carlet","year":"1993","unstructured":"Carlet, C.: Partially-bent functions. Designs, Codes and Cryptography\u00a03, 135\u2013145 (1993)","journal-title":"Designs, Codes and Cryptography"},{"key":"24_CR3","volume-title":"Differential And Integral Calculus","author":"F. Erwe","year":"1967","unstructured":"Erwe, F.: Differential And Integral Calculus. Oliver And Boyd Ltd., Edinburgh And London (1967)"},{"issue":"3","key":"24_CR4","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"X. Guo-Zhen","year":"1988","unstructured":"Guo-Zhen, X., Massey, J.L.: A spectral characterization of correlationimmune combining functions. IEEE Transactions on Information Theory\u00a034(3), 569\u2013571 (1988)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR5","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1978","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1978)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"W. Meier","year":"1990","unstructured":"Meier, W., Staffelbach, O.: Nonlinearity criteria for cryptographic functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 549\u2013562. Springer, Heidelberg (1990)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","first-page":"155","volume-title":"Current Trends in SNePS - Semantic Network Processing System","author":"B. Preneel","year":"1991","unstructured":"Preneel, B., Leekwijck, W.V., Linden, L.V., Govaerts, R., Vandewalle, J.: Propagation characteristics of boolean functions. In: Kumar, D. (ed.) SNePS 1989. LNCS, vol.\u00a0437, pp. 155\u2013165. Springer, Heidelberg (1991)"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On \u201cbent\u201d functions. Journal of Combinatorial Theory\u00a020, 300\u2013305 (1976)","journal-title":"Journal of Combinatorial Theory"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0020-0190(94)90042-6","volume":"50","author":"J. Seberry","year":"1994","unstructured":"Seberry, J., Zhang, X.M., Zheng, Y.: Improving the strict avalanche characteristics of cryptographic functions. Information Processing Letters\u00a050, 37\u201341 (1994)","journal-title":"Information Processing Letters"},{"key":"24_CR10","first-page":"6","volume":"10","author":"J. Wang","year":"1997","unstructured":"Wang, J.: The linear kernel of boolean functions and partially-bent functions. System Science and Mathematical Science\u00a010, 6\u201311 (1997)","journal-title":"System Science and Mathematical Science"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology","author":"A.F. Webster","year":"1986","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 523\u2013534. Springer, Heidelberg (1986)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BFb0028472","volume-title":"Information and Communications Security","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y., Zhang, X.M., Imai, H.: Duality of boolean functions and its cryptographic significance. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 159\u2013169. Springer, Heidelberg (1997)"},{"key":"24_CR13","first-page":"112","volume":"136","author":"R. Yarlagadda","year":"1989","unstructured":"Yarlagadda, R., Hershey, J.E.: Analysis and synthesis of bent sequences. IEEE Proceedings (Part E)\u00a0136, 112\u2013123 (1989)","journal-title":"IEEE Proceedings (Part E)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T16:40:06Z","timestamp":1553272806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999]]}}}