{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:38:27Z","timestamp":1743104307788,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662437988"},{"type":"electronic","value":"9783662437995"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43799-5_31","type":"book-chapter","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T03:46:18Z","timestamp":1412048778000},"page":"467-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Constructing Generalized Bent Functions from Trace Forms of Galois Rings"],"prefix":"10.1007","author":[{"given":"Xiaoming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qingfang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1137\/0220037","volume":"20","author":"JVZ Gathen","year":"1991","unstructured":"Gathen, J.V.Z.: Tests for permutation polynomials. SIAM J. Comput. 20, 591\u2013602 (1991)","journal-title":"SIAM J. Comput."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1006\/jsco.1998.0224","volume":"26","author":"M Giesbrecht","year":"1998","unstructured":"Giesbrecht, M.: Factoring in skew-polynomial rings over finite fields. J. Symb. Comput. 26, 463\u2013486 (1998)","journal-title":"J. Symb. Comput."},{"issue":"3","key":"31_CR3","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s12095-011-0045-3","volume":"3","author":"Y Li","year":"2011","unstructured":"Li, Y., Wang, M.: Permutation polynomials EA-equivalent to the inverse function over GF($$2^n$$). Cryptogr. Commun. 3(3), 175\u2013186 (2011)","journal-title":"Cryptogr. Commun."},{"key":"31_CR4","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"31_CR5","volume-title":"Finite Rings with Identity","author":"BR McDonald","year":"1974","unstructured":"McDonald, B.R.: Finite Rings with Identity. Marcel Dekker, New York (1974)"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/18.817512","volume":"46","author":"KG Paterson","year":"2000","unstructured":"Paterson, K.G.: Generalized Reed-Muller codes and power control in OFDM modulation. IEEE Trans. Inf. Theory 46, 104\u2013120 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1109\/TIT.2009.2013041","volume":"55","author":"KU Schmidt","year":"2009","unstructured":"Schmidt, K.U.: Quaternary constant-amplitude codes for multicode CDMA. IEEE Trans. Inf. Theory 55, 1824\u20131832 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/BF01202000","volume":"2","author":"IE Shparlinski","year":"1992","unstructured":"Shparlinski, I.E.: A deterministic test for permutation polynomials. Comput. Complex. 2, 129\u2013132 (1992)","journal-title":"Comput. Complex."},{"key":"31_CR9","unstructured":"Sol\u00e9 P., Tokareva N.: Connections between quaternary and binary bent functions. In: Cryptology ePrint Archives http:\/\/www.eprint.iacr.org\/2009\/544 (2009)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Wu, B., Liu, Z.: Linearized polynomials over finite fields revisited. Finite Fields Appl. 2, 79\u2013100 (2013)","DOI":"10.1016\/j.ffa.2013.03.003"}],"container-title":["Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43799-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T02:50:43Z","timestamp":1675824643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43799-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662437988","9783662437995"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43799-5_31","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"1 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}