{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T10:19:44Z","timestamp":1649067584508},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[2012,5,31]],"date-time":"2012-05-31T00:00:00Z","timestamp":1338422400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s10623-012-9687-1","type":"journal-article","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:18:50Z","timestamp":1338347930000},"page":"243-256","source":"Crossref","is-referenced-by-count":8,"title":["A new construction of bent functions based on $${\\mathbb{Z}}$$ -bent functions"],"prefix":"10.1007","volume":"66","author":[{"given":"Sugata","family":"Gangopadhyay","sequence":"first","affiliation":[]},{"given":"Anand","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"given":"Rajendra Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,31]]},"reference":[{"issue":"8","key":"9687_CR1","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A. Canteaut","year":"2003","unstructured":"Canteaut A., Charpin P.: Decomposing bent functions. IEEE Trans. Inf. Theory 49(8), 2004\u20132019 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9687_CR2","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/18.412693","volume":"41","author":"C. Carlet","year":"1995","unstructured":"Carlet C.: Generalized partial spreads. IEEE Trans. Inf. Theory 41, 1482\u20131487 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9687_CR3","doi-asserted-by":"crossref","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. Chapter of the monograph. In: Crama Y., Hammer P. (eds.) Boolean Models and Methods in Mathematics, Computer Science and Engineering, pp. 257\u2013397. Cambridge Univ. Press (2010).","DOI":"10.1017\/CBO9780511780448.011"},{"key":"9687_CR4","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1006\/jcta.1996.0110","volume":"76","author":"C. Carlet","year":"1996","unstructured":"Carlet C., Guillot P.: A characterization of binary bent functions. J. Comb. Theory, Ser. A 76, 328\u2013335 (1996)","journal-title":"J. Comb. Theory, Ser. A"},{"key":"9687_CR5","unstructured":"Dillon J.F.: Elementary Hadamard difference sets. Proceedings of Sixth S.E. Conference of Combinatorics, Graph Theory, and Computing, pp. 237\u2013249. Utility Mathematics, Winnipeg (1975)."},{"key":"9687_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10623-008-9189-3","volume":"49","author":"H. Dobbertin","year":"2008","unstructured":"Dobbertin H., Leander G.: Bent functions embedded into the recursive framework of $${\\mathbb{Z}}$$ -bent functions. Des. Codes Cryptogr. 49, 3\u201322 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"9687_CR7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s00607-009-0041-z","volume":"85","author":"S. Gangopadhyay","year":"2009","unstructured":"Gangopadhyay S., Sharma D., Sarkar S., Maitra S.: On affine (non)equivalence of Boolean functions. Computing 85, 37\u201355 (2009)","journal-title":"Computing"},{"issue":"4","key":"9687_CR8","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.1109\/TIT.2011.2112230","volume":"57","author":"P. Langevin","year":"2011","unstructured":"Langevin P., Hou X.-D.: Counting Partial Spread Functions in Eight Variables. IEEE Trans. Inf. Theory 57(4), 2263\u20132269 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9687_CR9","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"9687_CR10","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus O.S.: On bent functions. J. Comb. Theory Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Comb. Theory Ser. A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9687-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9687-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9687-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:33Z","timestamp":1559246313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9687-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,31]]},"references-count":10,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["9687"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9687-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,31]]}}}