{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:02Z","timestamp":1740122582022,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:00:00Z","timestamp":1558569600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:00:00Z","timestamp":1558569600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004429","name":"University of Crete","doi-asserted-by":"crossref","award":["10316"],"award-info":[{"award-number":["10316"]}],"id":[{"id":"10.13039\/501100004429","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s10623-019-00643-8","type":"journal-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T06:02:51Z","timestamp":1558591371000},"page":"2639-2654","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Further Results on the Morgan\u2013Mullen Conjecture"],"prefix":"10.1007","volume":"87","author":[{"given":"Theodoulos","family":"Garefalakis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3488-038X","authenticated-orcid":false,"given":"Giorgos","family":"Kapetanakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,23]]},"reference":[{"issue":"1","key":"643_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0021-8693(86)90174-2","volume":"103","author":"D Blessenohl","year":"1986","unstructured":"Blessenohl D., Johnsen K.: Eine versch\u00e4rfung des satzes von der normalbasis. J. Algebra 103(1), 141\u2013159 (1986).","journal-title":"J. Algebra"},{"issue":"5","key":"643_CR2","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s002000050112","volume":"9","author":"SD Cohen","year":"1999","unstructured":"Cohen S.D., Hachenberger D.: Primitive normal bases with prescribed trace. Appl. Algebra Eng. Commun. Comput. 9(5), 383\u2013403 (1999).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"1","key":"643_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1112\/S0024610702003782","volume":"67","author":"SD Cohen","year":"2003","unstructured":"Cohen S.D., Huczynska S.: The primitive normal basis theorem\u2014without a computer. J. London Math. Soc. 67(1), 41\u201356 (2003).","journal-title":"J. London Math. Soc."},{"issue":"4","key":"643_CR4","doi-asserted-by":"publisher","first-page":"299","DOI":"10.4064\/aa143-4-1","volume":"143","author":"SD Cohen","year":"2010","unstructured":"Cohen S.D., Huczynska S.: The strong primitive normal basis theorem. Acta Arith. 143(4), 299\u2013332 (2010).","journal-title":"Acta Arith."},{"issue":"6","key":"643_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W., Hellman M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"643_CR6","unstructured":"Gao, S.: Normal Basis over Finite Fields. PhD thesis, University of Waterloo (1993)"},{"issue":"3","key":"643_CR7","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.jpaa.2018.05.005","volume":"223","author":"T Garefalakis","year":"2019","unstructured":"Garefalakis T., Kapetanakis G.: On the existence of primitive completely normal bases of finite fields. J. Pure Appl. Algebra 223(3), 909\u2013921 (2019).","journal-title":"J. Pure Appl. Algebra"},{"key":"643_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6269-6","volume-title":"Finite Fields: Normal Bases and Completely Free Elements, Kluwer International Series in Engineering and Computer Science","author":"D Hachenberger","year":"1997","unstructured":"Hachenberger D.: Finite Fields: Normal Bases and Completely Free Elements, Kluwer International Series in Engineering and Computer Science, vol. 390. Kluwer Academic Publishers, Boston, MA (1997)."},{"issue":"22","key":"643_CR9","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1016\/j.disc.2010.02.016","volume":"310","author":"D Hachenberger","year":"2010","unstructured":"Hachenberger D.: Primitive complete normal bases: existence in certain 2-power extensions and lower bounds. Discret. Math. 310(22), 3246\u20133250 (2010).","journal-title":"Discret. Math."},{"key":"643_CR10","first-page":"128","volume-title":"Handbook of Finite Fields","author":"D Hachenberger","year":"2013","unstructured":"Hachenberger D.: Completely normal bases. In: Mullen G.L., Panario D. (eds.) Handbook of Finite Fields, pp. 128\u2013138. CRC Press, Boca Raton (2013)."},{"issue":"3","key":"643_CR11","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s10623-015-0119-x","volume":"80","author":"D Hachenberger","year":"2016","unstructured":"Hachenberger D.: Asymptotic existence results for primitive completely normal elements in extensions of Galois fields. Des. Codes Cryptogr. 80(3), 577\u2013586 (2016).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"643_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jnt.2010.05.011","volume":"131","author":"C Hsu","year":"2011","unstructured":"Hsu C., Nan T.: A generalization of the primitive normal basis theorem. J. Number Theory 131(1), 146\u2013157 (2011).","journal-title":"J. Number Theory"},{"issue":"5","key":"643_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s00200-014-0230-7","volume":"25","author":"G Kapetanakis","year":"2014","unstructured":"Kapetanakis G.: An extension of the (strong) primitive normal basis theorem. Appl. Algebra Eng. Commun. Comput. 25(5), 311\u2013337 (2014).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"643_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ffa.2013.12.002","volume":"26","author":"G Kapetanakis","year":"2014","unstructured":"Kapetanakis G.: Normal bases and primitive elements over finite fields. Finite Fields Appl. 26, 123\u2013143 (2014).","journal-title":"Finite Fields Appl."},{"issue":"177","key":"643_CR15","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1090\/S0025-5718-1987-0866111-3","volume":"48","author":"HW Lenstra Jr","year":"1987","unstructured":"Lenstra Jr. H.W., Schoof R.J.: Primitive normal bases for finite fields. Math. Comput. 48(177), 217\u2013231 (1987).","journal-title":"Math. Comput."},{"key":"643_CR16","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997).","edition":"2"},{"key":"643_CR17","first-page":"21","volume":"49","author":"IH Morgan","year":"1996","unstructured":"Morgan I.H., Mullen G.L.: Completely normal primitive basis generators of finite fields. Util. Math. 49, 21\u201343 (1996).","journal-title":"Util. Math."},{"issue":"2","key":"643_CR18","first-page":"187","volume":"63","author":"G Robin","year":"1984","unstructured":"Robin G.: Grandes valeurs de la fonction somme des diviseurs et hypoth\u00e8se de Riemann. J. Math. Pures Appl. 63(2), 187\u2013213 (1984).","journal-title":"J. Math. Pures Appl."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00643-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-019-00643-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00643-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T23:32:26Z","timestamp":1590103946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-019-00643-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,23]]},"references-count":18,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["643"],"URL":"https:\/\/doi.org\/10.1007\/s10623-019-00643-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2019,5,23]]},"assertion":[{"value":"27 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}