{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:03:30Z","timestamp":1725739410028},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379482"},{"type":"electronic","value":"9783642379499"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37949-9_67","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T07:42:10Z","timestamp":1372923730000},"page":"771-777","source":"Crossref","is-referenced-by-count":3,"title":["On Generalized Nega\u2013Hadamard Transform"],"prefix":"10.1007","author":[{"given":"Ankita","family":"Chaturvedi","sequence":"first","affiliation":[]},{"given":"Aditi Kar","family":"Gangopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models. Cambridge Univ. Press, Cambridge, \n                    \n                      http:\/\/www-roc.inria.fr\/secret\/Claude.Carlet\/pubs.html"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean functions and Applications. Elsevier\u2013Academic Press (2009)","DOI":"10.1016\/B978-0-12-374890-4.00009-4"},{"issue":"1","key":"67_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"P.V. Kumar","year":"1985","unstructured":"Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. Journal of Combinatorial Theory (Series A)\u00a040(1), 90\u2013107 (1985)","journal-title":"Journal of Combinatorial Theory (Series A)"},{"key":"67_CR4","unstructured":"Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications. Cambridge University Press (1983)"},{"key":"67_CR5","volume-title":"The theory of error\u2013correcting codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error\u2013correcting codes. North-Holland, Amsterdam (1977)"},{"key":"67_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-77404-4_2","volume-title":"Sequences, Subsequences, and Consequences","author":"M.G. Parker","year":"2007","unstructured":"Parker, M.G., Pott, A.: On Boolean functions which are bent and negabent. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.) SSC 2007. LNCS, vol.\u00a04893, pp. 9\u201323. Springer, Heidelberg (2007)"},{"key":"67_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/11779360_31","volume-title":"Coding and Cryptography","author":"C. Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: One and two-variable interlace polynomials: A spectral interpretation. In: Ytrehus, \u00d8. (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 397\u2013411. Springer, Heidelberg (2006)"},{"issue":"9","key":"67_CR8","doi-asserted-by":"publisher","first-page":"4142","DOI":"10.1109\/TIT.2006.880069","volume":"52","author":"C. Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: Generalized bent criteria for Boolean functions. IEEE Trans. Inform. Theory\u00a052(9), 4142\u20134159 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"67_CR9","unstructured":"Schmidt, K.-U.: Quaternary Constant-Amplitude Codes for Multicode CDMA. In: IEEE International Symposium on Information Theory, pp. 2781\u20132785 (2007), \n                    \n                      http:\/\/arxiv.org\/abs\/cs.IT\/0611162"},{"key":"67_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-85912-3_34","volume-title":"Sequences and Their Applications - SETA 2008","author":"K.-U. Schmidt","year":"2008","unstructured":"Schmidt, K.-U., Parker, M.G., Pott, A.: Negabent functions in the maiorana\u2013mcFarland class. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol.\u00a05203, pp. 390\u2013402. Springer, Heidelberg (2008)"},{"key":"67_CR11","unstructured":"Sol\u00e9, P., Tokareva, N.: Connections between Quaternary and Binary Bent Functions, \n                    \n                      http:\/\/eprint.iacr.org\/2009\/544.pdf"},{"key":"67_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/978-3-642-15874-2_31","volume-title":"SETA 2010","author":"P. St\u0103nic\u0103","year":"2010","unstructured":"St\u0103nic\u0103, P., Gangopadhyay, S., Chaturvedi, A., Gangopadhyay, A.K., Maitra, S.: Nega\u2013Hadamard transform, bent and negabent functions. In: Carlet, C., Pott, A. (eds.) SETA 2010. LNCS, vol.\u00a06338, pp. 359\u2013372. Springer, Heidelberg (2010)"},{"issue":"6","key":"67_CR13","doi-asserted-by":"publisher","first-page":"4064","DOI":"10.1109\/TIT.2012.2186785","volume":"58","author":"P. St\u0103nic\u0103","year":"2012","unstructured":"St\u0103nic\u0103, P., Gangopadhyay, S., Chaturvedi, A., Gangopadhyay, A.K., Maitra, S.: Investigations on bent and negabent functions via the nega\u2013Hadamard transform. IEEE Transactions on Information Theory\u00a058(6), 4064\u20134072 (2012)","journal-title":"IEEE Transactions on Information Theory"},{"key":"67_CR14","unstructured":"St\u0103nic\u0103, P., Gangopadhyay, S., Singh, B.K.: Some Results concerning generalized bent functions, \n                    \n                      http:\/\/eprint.iacr.org\/2011\/290.pdf"},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"St\u0103nic\u0103, P., Martinsen, T., Gangopadhyay, S., Singh, B.K.: Bent and generalized bent Boolean functions. In: Designs, Codes and Cryptography (2012), doi:10.1007\/s10623-012-9622-5","DOI":"10.1007\/s10623-012-9622-5"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37949-9_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T06:40:56Z","timestamp":1557902456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37949-9_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379482","9783642379499"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37949-9_67","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}