{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:08:26Z","timestamp":1744434506805},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000452","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"413-418","source":"Crossref","is-referenced-by-count":4,"title":["Some cryptographic properties of exponential functions"],"prefix":"10.1007","author":[{"given":"Xingong","family":"Chang","sequence":"first","affiliation":[]},{"given":"Zong -Duo","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/0012-365X(76)90100-X","volume":"16","author":"T. Helleseth","year":"1976","unstructured":"Tor Helleseth, Some Results about the Cross-Correlation Function between Two Maximal Linear Sequences, Discrete Mathematics, Vol. 16, 1976, pp. 209\u2013232.","journal-title":"Discrete Mathematics"},{"key":"33_CR2","volume-title":"Ph.D. Dissertation","author":"Y. Niho","year":"1972","unstructured":"Y.Niho, Multi-values Cross-Correlation Function between Two Maximal Linear Recursive Sequences, Ph.D. Dissertation, Univ. of Southern California, Los Angeles, CA(1972)."},{"key":"33_CR3","unstructured":"K.Nyberg, Differentially Uniform Mappings for Cryptography, Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT'93, 1993."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Josef P.Pieprzyk, Non-Linearity of Exponent Permutations, Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT'89, pp.80\u201392, 1989.","DOI":"10.1007\/3-540-46885-4_11"},{"key":"33_CR5","unstructured":"J.Seberry, X.M.Zhang, and Y.Zheng, Structure of cryptographic functions with strong avalanche characteristics, Pre-proceedings of AISACRYPT'94, pp.96\u2013106."},{"key":"33_CR6","unstructured":"M.K.Simmon, J.K.Omura, R.A.Scholtz, B.K.Levitt, Spread Spectrum Communication, Vol.I, Computer Science Press, Inc., 1985, Chapter 5."},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"A.F.Webster and S.E.Tavares, On the design of S-boxes, Lecture Notes in Computer Science 219, Advances in Cryptology, Proceedings of CRYPTO'85, pp.523\u2013534, 1986.","DOI":"10.1007\/3-540-39799-X_41"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:08Z","timestamp":1586499488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/bfb0000452","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}