{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:17:55Z","timestamp":1775053075311,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540774037","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77404-4_2","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:20:12Z","timestamp":1196940012000},"page":"9-23","source":"Crossref","is-referenced-by-count":37,"title":["On Boolean Functions Which Are Bent and Negabent"],"prefix":"10.1007","author":[{"given":"Matthew G.","family":"Parker","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Pott","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Parker, M.G.: The constabent properties of Golay-Davis-Jedwab sequences. In: IEEE Int. Symp. Inform. Theory, Sorrento, p. 302 (2000)","DOI":"10.1109\/ISIT.2000.866600"},{"key":"2_CR2","first-page":"4142","volume":"52","author":"C. Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: Generalized bent criteria for boolean functions (I). IEEE\u00a052, 4142\u20134159 (2006)","journal-title":"IEEE"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/11779360_31","volume-title":"Coding and Cryptography","author":"C. Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: One and Two-Variable Interlace Polynomials: A Spectral Interpretation. In: Ytrehus (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 397\u2013411. Springer, Heidelberg (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Schmidt, K.U.: Quaternary constant-amplitude codes for multicode cdma. In: Submitted to IEEE Transactions on Information Theory (2006)","DOI":"10.1109\/ISIT.2007.4557639"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge University Press, Cambridge (to appear)","DOI":"10.1017\/CBO9780511780448.011"},{"key":"2_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316529836","volume-title":"Designs and their codes","author":"E.F. Assmus Jr.","year":"1992","unstructured":"Assmus Jr., E.F., Key, J.D.: Designs and their codes. Cambridge University Press, Cambridge (1992)"},{"key":"2_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal design for good correlation","author":"S.W. Golomb","year":"2005","unstructured":"Golomb, S.W., Gong, G.: Signal design for good correlation. Cambridge University Press, Cambridge (2005)"}],"container-title":["Lecture Notes in Computer Science","Sequences, Subsequences, and Consequences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77404-4_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:10:57Z","timestamp":1619521857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77404-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774037"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77404-4_2","relation":{},"subject":[]}}