{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T08:44:49Z","timestamp":1648975489212},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,8,1]],"date-time":"2005-08-01T00:00:00Z","timestamp":1122854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2005,8]]},"DOI":"10.1007\/s10623-004-1700-x","type":"journal-article","created":{"date-parts":[[2005,6,13]],"date-time":"2005-06-13T12:41:12Z","timestamp":1118666472000},"page":"131-146","source":"Crossref","is-referenced-by-count":2,"title":["Nonlinearity of Some Invariant Boolean Functions"],"prefix":"10.1007","volume":"36","author":[{"given":"P.","family":"Langevin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.-P.","family":"Zanotti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1700_CR1","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1006\/eujc.1994.1044","volume":"15","author":"P. Savick\u00fd","year":"1994","journal-title":"Euro. J. Combinatorics."},{"key":"1700_CR2","unstructured":"Canteaut A., Daum M., Dobbertin H., Leander G. (2003). Workshop on coding and cryptography 2003 INRIA\/ENSTA normal and non normal bent functions 91\u2013100"},{"issue":"4","key":"1700_CR3","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/18.761276","volume":"45","author":"C. Fontaine","year":"1999","journal-title":"IEEE Trans Inform Theory."},{"key":"1700_CR4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-60590-8_5","volume":"1008","author":"H. Dobbertin","year":"1995","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"1700_CR5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-16776-5_710","volume":"229","author":"J. Constantin","year":"1986","journal-title":"Numerical experiments related to the covering radius of some Reed\u2013Muller codes Algebraic Algorithms and Error-Correcting Codes"},{"issue":"1","key":"1700_CR6","first-page":"1","volume":"119","author":"J. Seberry","year":"1995","journal-title":"Comput."},{"key":"1700_CR7","unstructured":"Zanotti J.-P. (1995). Codes \u00e0 Distribution de Poids \u00c9quilibr\u00e9e Universit\u00e9 de Toulon-Var"},{"issue":"3","key":"1700_CR8","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TIT.1980.1056187","volume":"26","author":"J.J. Mykkelveit","year":"1980","journal-title":"Inform. Theory."},{"key":"1700_CR9","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TIT.1983.1056679","volume":"29","author":"N.J. Patterson","year":"1983","journal-title":"IEEE Trans Inform Theory."},{"key":"1700_CR10","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","journal-title":"Combinatorial Theory (A)."},{"key":"1700_CR11","unstructured":"Lidl R., Niederreiter H. (1983). Finite fields Addison\u2013Wesley Encyclopedia of Mathematics and its Applications 20"},{"issue":"9","key":"1700_CR12","doi-asserted-by":"crossref","first-page":"2626","DOI":"10.1109\/TIT.2002.801482","volume":"48","author":"S. Maitra","year":"2002","journal-title":"IEEE Trans Inform Theory."},{"issue":"5","key":"1700_CR13","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","journal-title":"IEEE Trans Inform Theory."},{"key":"1700_CR14","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1002\/j.1538-7305.1958.tb03887.x","volume":"37","author":"T. Gilbert","year":"1958","journal-title":"Bell Syst Tech."},{"key":"1700_CR15","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/BFb0053732","volume":"1438","author":"W. Millan","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"1700_CR16","unstructured":"MacWilliams F. J., Sloane N. J. A. (1977). The Theory of Error-Correcting Codes, North-Holland. Mathematical Library. 16,"},{"key":"1700_CR17","volume-title":"Permutation Groups","author":"S. Passman D.","year":"1968"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-1700-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-004-1700-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-1700-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:03Z","timestamp":1559245803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-004-1700-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,8]]}},"alternative-id":["1700"],"URL":"https:\/\/doi.org\/10.1007\/s10623-004-1700-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8]]}}}