{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:37:46Z","timestamp":1761061066464,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672355"],"award-info":[{"award-number":["61672355"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s10623-020-00770-7","type":"journal-article","created":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T17:03:37Z","timestamp":1592499817000},"page":"2171-2186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["On constructions and properties of (n,\u00a0m)-functions with maximal number of bent components"],"prefix":"10.1007","volume":"88","author":[{"given":"Lijing","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0704-3789","authenticated-orcid":false,"given":"Jie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Yanjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"issue":"9","key":"770_CR1","doi-asserted-by":"publisher","first-page":"4160","DOI":"10.1109\/TIT.2006.880036","volume":"52","author":"TP Berger","year":"2006","unstructured":"Berger T.P., Canteaut A., Charpin P., Laigle-Chapuy Y.: On almost perfect nonlinear functions over $$F_{2^n}$$. IEEE Trans. Inf. Theory 52(9), 4160\u20134170 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"770_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. In: Crama Y., Hammer P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)."},{"key":"770_CR3","doi-asserted-by":"crossref","unstructured":"Carlet C.: Vectorial Boolean functions for cryptography. In: Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 398\u2013471. Cambridge University Press, Cambridge (2010).","DOI":"10.1017\/CBO9780511780448.012"},{"issue":"11","key":"770_CR4","doi-asserted-by":"publisher","first-page":"6272","DOI":"10.1109\/TIT.2015.2481384","volume":"61","author":"C Carlet","year":"2015","unstructured":"Carlet C.: Boolean and vectorial plateaued functions and APN functions. IEEE Trans. Inf. Theory 61(11), 6272\u20136289 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"770_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet C., Mesnager S.: Four decades of research on bent functions. Des. Codes Cryptogr. 78(1), 5\u201350 (2016).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"770_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"770_CR7","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.ffa.2018.12.001","volume":"56","author":"P Charpin","year":"2019","unstructured":"Charpin P., Peng J.: New links between nonlinearity and differential uniformity. Finite Fields Appl. 56, 188\u2013208 (2019).","journal-title":"Finite Fields Appl."},{"issue":"7","key":"770_CR8","doi-asserted-by":"publisher","first-page":"3305","DOI":"10.1109\/TIT.2009.2021312","volume":"55","author":"T Helleseth","year":"2009","unstructured":"Helleseth T., Hu L., Kholosha A., Zeng X., Li N., Jiang W.: Period-different $$m$$-sequences with at most four-valued cross correlation. IEEE Trans. Inf. Theory 55(7), 3305\u20133311 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"770_CR9","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/TIT.2005.862121","volume":"52","author":"NG Leander","year":"2006","unstructured":"Leander N.G.: Monomial bent functions. IEEE Trans. Inf. Theory 52(2), 738\u2013743 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"770_CR10","doi-asserted-by":"publisher","first-page":"5529","DOI":"10.1109\/TIT.2006.885464","volume":"52","author":"G Leander","year":"2006","unstructured":"Leander G., Kholosha A.: Bent functions with $$2^r$$ Niho exponents. IEEE Trans. Inf. Theory 52(12), 5529\u20135532 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"770_CR11","doi-asserted-by":"publisher","first-page":"4662","DOI":"10.1109\/TIT.2013.2252053","volume":"59","author":"N Li","year":"2013","unstructured":"Li N., Helleseth T., Kholosha A., Tang X.: On the Walsh transform of a class of functions from Niho exponents. IEEE Trans. Inf. Theory 59(7), 4662\u20134667 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"770_CR12","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and Its Applications, vol 20, 2nd edn. Cambridge University Press, Cambridge (1997)."},{"key":"770_CR13","doi-asserted-by":"crossref","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology\u2014EUROCRYPT. Lecture Notes in Computer Science, vol. 765, pp. 386\u2013397. Springer, Berlin (1993).","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"1","key":"770_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0097-3165(73)90031-9","volume":"15","author":"RL McFarland","year":"1973","unstructured":"McFarland R.L.: A family of difference sets in non-cyclic groups. J. Comb. Theory A 15(1), 1\u201310 (1973).","journal-title":"J. Comb. Theory A"},{"key":"770_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager S.: Bent Functions: Fundamentals and Results, pp. 1\u2013544. Springer, Cham (2016)."},{"issue":"11","key":"770_CR16","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1007\/s10623-019-00639-4","volume":"87","author":"S Mesnager","year":"2019","unstructured":"Mesnager S., Zhang F.R., Tang C.M., Zhou Y.: Further study on the maximal number of bent components of vectorial functions. Des. Codes Cryptogr. 87(11), 2597\u20132610 (2019).","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"770_CR17","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1109\/TIT.2006.871049","volume":"52","author":"GJ Ness","year":"2006","unstructured":"Ness G.J., Helleseth T.: Cross correlation of m-sequences of different lengths. IEEE Trans. Inf. Theory 52(4), 1637\u20131648 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"770_CR18","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Perfect nonlinear S-boxes. In: Advances in Cryptology\u2014EUROCRYPT. Lecture Notes in Computer Science, vol. 547, pp. 378\u2013385. Springer, Berlin (1991).","DOI":"10.1007\/3-540-46416-6_32"},{"key":"770_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.ffa.2016.03.003","volume":"40","author":"J Peng","year":"2016","unstructured":"Peng J., Tan C.H.: New explicit constructions of differentially 4-uniform permutations via special partitions of $$\\mathbb{F}_{2^{2k}}$$. Finite Fields Appl. 40, 73\u201389 (2016).","journal-title":"Finite Fields Appl."},{"issue":"1","key":"770_CR20","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TIT.2017.2749421","volume":"64","author":"A Pott","year":"2018","unstructured":"Pott A., Pasalic E., Muratovi\u0107-Ribi\u0107 A., Bajri\u0107 S.: On the maximal number of bent components of vectorial functions. IEEE Trans. Inf. Theory 64(1), 403\u2013411 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"770_CR21","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u201cbent\u201d functions. J. Comb. Theory A 20(3), 300\u2013305 (1976).","journal-title":"J. Comb. Theory A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00770-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-020-00770-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00770-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T23:48:49Z","timestamp":1623973729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-020-00770-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,18]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["770"],"URL":"https:\/\/doi.org\/10.1007\/s10623-020-00770-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2020,6,18]]},"assertion":[{"value":"22 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors have read and approve this version of the article, and due care has been taken to ensure the integrity of the work. No part of this paper has published or submitted elsewhere. No conflict of interest exits in the submission of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}