{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:09Z","timestamp":1773231129104,"version":"3.50.1"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,1,12]],"date-time":"2008-01-12T00:00:00Z","timestamp":1200096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s10623-007-9157-3","type":"journal-article","created":{"date-parts":[[2008,1,11]],"date-time":"2008-01-11T20:32:45Z","timestamp":1200083565000},"page":"269-301","source":"Crossref","is-referenced-by-count":17,"title":["Crooked binomials"],"prefix":"10.1007","volume":"46","author":[{"given":"J\u00fcrgen","family":"Bierbrauer","sequence":"first","affiliation":[]},{"given":"Gohar M.","family":"Kyureghyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,12]]},"reference":[{"issue":"1","key":"9157_CR1","doi-asserted-by":"crossref","first-page":"R34","DOI":"10.37236\/1372","volume":"5","author":"T.D. Bending","year":"1998","unstructured":"Bending T.D., Fon-Der-Flaass D.: Crooked functions, bent functions, and distance regular graphs. Electron. J. Comb. 5(1), R34 (1998)","journal-title":"Electron. J. Comb."},{"key":"9157_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/9781482296372","volume-title":"Introduction to Coding Theory","author":"J. Bierbrauer","year":"2004","unstructured":"Bierbrauer J.: Introduction to Coding Theory. CRC Press, Chapman and Hall (2004)"},{"key":"9157_CR3","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF01388407","volume":"3","author":"A.E. Brouwer","year":"1993","unstructured":"Brouwer A.E., Tolhuizen L.: A sharpening of the Johnson bound for binary linear codes and the nonexistence of linear codes with Preparata parameters. Des. Codes Cryptogr. 3, 95\u201398 (1993)","journal-title":"Des. Codes Cryptogr."},{"key":"9157_CR4","doi-asserted-by":"crossref","unstructured":"Budaghyan L., Carlet C., Felke P., Leander G.: An infinite class of quadratic APN functions which are not equivalent to power mappings. In: Proceedings of ISIT 2006, Seattle, USA, July 2006.","DOI":"10.1109\/ISIT.2006.262131"},{"key":"9157_CR5","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C. Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15, 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"9157_CR6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/S0195-6698(02)00116-6","volume":"24","author":"E.R. Dam van","year":"2003","unstructured":"van Dam E.R., Fon-Der-Flaass D.: Codes, graphs, and schemes from nonlinear functions. Eur. J. Combin. 24, 85\u201398 (2003)","journal-title":"Eur. J. Combin."},{"issue":"2","key":"9157_CR7","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIT.2005.862128","volume":"52","author":"Y. Edel","year":"2006","unstructured":"Edel Y., Kyureghyan G., Pott A.: A new APN function which is not equivalent to a power mapping. IEEE Trans. Inform. Theory 52(2), 744\u2013747 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"9157_CR8","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.ffa.2006.03.003","volume":"13","author":"G. Kyureghyan","year":"2007","unstructured":"Kyureghyan G.: Crooked maps in $${\\mathbb{F}_{2^{n}}}$$ . Finite Fields Their Appl. 13(3), 713\u2013726 (2007)","journal-title":"Finite Fields Their Appl."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9157-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9157-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9157-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T17:42:59Z","timestamp":1588268579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9157-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,12]]},"references-count":8,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["9157"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9157-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,12]]}}}