{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T22:35:47Z","timestamp":1770071747268,"version":"3.49.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772292"],"award-info":[{"award-number":["61772292"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1420227"],"award-info":[{"award-number":["1420227"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10623-018-0494-1","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T11:55:58Z","timestamp":1526903758000},"page":"163-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the q-bentness of Boolean functions"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4228-0023","authenticated-orcid":false,"given":"Zhixiong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ting","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Klapper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"key":"494_CR1","doi-asserted-by":"crossref","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. In: Crama Y., Hammer P. (eds.) Boolean Methods and Models, pp. 257\u2013397. Cambridge University Press, Cambridge (2010). \n                    http:\/\/www.math.univ-paris13.fr\/~carlet\/pubs.html\n                    \n                  .","DOI":"10.1017\/CBO9780511780448.011"},{"key":"494_CR2","volume-title":"Cryptographic Boolean Functions and Applications","author":"T Cusick","year":"2009","unstructured":"Cusick T., St\u0103nic\u0103 P.: Cryptographic Boolean Functions and Applications. Academic Press, Amsterdam (2009)."},{"key":"494_CR3","volume-title":"Codes from Difference Sets","author":"C Ding","year":"2015","unstructured":"Ding C.: Codes from Difference Sets. World Scientific, Singapore (2015)."},{"issue":"3","key":"494_CR4","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s10623-012-9789-9","volume":"72","author":"C Ding","year":"2014","unstructured":"Ding C., Pott A., Wang Q.: Constructions of almost difference sets from finite fields. Des. Codes Cryptogr. 72(3), 581\u2013592 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"494_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-017-0267-0","author":"T Gu","year":"2017","unstructured":"Gu T., Chen Z., Klapper A.: Correlation immune functions with respect to the $$q$$-transform. Cryptogr. Commun. (2017). \n                    https:\/\/doi.org\/10.1007\/s12095-017-0267-0\n                    \n                  .","journal-title":"Cryptogr. Commun."},{"issue":"5","key":"494_CR6","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1109\/TIT.2016.2536730","volume":"62","author":"A Klapper","year":"2016","unstructured":"Klapper A.: A new transform related to distance from a Boolean function. IEEE Trans. Inf. Theory 62(5), 2798\u20132812 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"494_CR7","doi-asserted-by":"publisher","first-page":"2953","DOI":"10.1109\/TIT.2017.2758788","volume":"64","author":"A Klapper","year":"2018","unstructured":"Klapper A., Chen Z.: On the nonexistence of $$q$$-bent Boolean functions. IEEE Trans. Inf. Theory 64(4), 2953\u20132961 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"494_CR8","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997).","edition":"2"},{"key":"494_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0012-365X(84)90105-5","volume":"52","author":"SL Ma","year":"1984","unstructured":"Ma S.L.: Partial difference sets. Discret. Math. 52, 75\u201389 (1984).","journal-title":"Discret. Math."},{"issue":"3","key":"494_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BF01388454","volume":"4","author":"SL Ma","year":"1994","unstructured":"Ma S.L.: A survey of partial difference sets. Des. Codes Cryptogr. 4(3), 221\u2013261 (1994).","journal-title":"Des. Codes Cryptogr."},{"key":"494_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/S0378-3758(96)00167-X","volume":"62","author":"SL Ma","year":"1997","unstructured":"Ma S.L.: Some necessary conditions on the parameters of partial difference sets. J. Stat. Plan. Inference 62, 47\u201356 (1997).","journal-title":"J. Stat. Plan. Inference"},{"key":"494_CR12","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u201cbent\u201d functions. J. Comb. Theory A 20, 300\u2013305 (1976).","journal-title":"J. Comb. Theory A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0494-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T13:37:14Z","timestamp":1589722634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0494-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["494"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0494-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"9 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}