{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T12:44:05Z","timestamp":1759063445726},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T00:00:00Z","timestamp":1451347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11424-015-4110-4","type":"journal-article","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:45:41Z","timestamp":1451375141000},"page":"259-271","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dembowski-Ostrom polynomials from reversed Dickson polynomials"],"prefix":"10.1007","volume":"29","author":[{"given":"Xiaoming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"4110_CR1","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/BF01111042","volume":"103","author":"P Dembowski","year":"1968","unstructured":"Dembowski P and Ostrom T G, Planes of order n with collineation groups of order n 2, Math Z, 1968, 103: 239\u2013258.","journal-title":"Math Z"},{"key":"4110_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-62012-6","volume-title":"Finite Geometries","author":"P Dembowski","year":"1968","unstructured":"Dembowski P, Finite Geometries, Springer-Verlag, New York, Heidelberg, Berlin, 1968."},{"key":"4110_CR3","volume-title":"Advances in Cryptology \u2014 Eurocrypt","author":"J Patarin","year":"1996","unstructured":"Patarin J, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms, Advances in Cryptology \u2014 Eurocrypt 1996, Ed. by Maurer U, Saragossa, 1996."},{"key":"4110_CR4","volume-title":"Dickson Polynomials","author":"R Lidl","year":"1993","unstructured":"Lidl R, Mullen G L, and Turnwald G, Dickson Polynomials, Longman Scientific and Technical, Essex, United Kingdom, 1993."},{"key":"4110_CR5","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.ffa.2009.06.004","volume":"15","author":"X D Hou","year":"2009","unstructured":"Hou X D, Mullen G L, and Turnwald G, Reversed Dickson polynomial over finite fiels, Finite Fields Appl., 2009, 15: 748\u2013773.","journal-title":"Finite Fields Appl."},{"key":"4110_CR6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT","author":"K Nyberg","year":"1993","unstructured":"Nyberg K, Differentially uniform mapping for cryptography, Advances in Cryptology \u2014 EUROCRYPT 1993, Springer-Verlag, New York, 1993."},{"issue":"4","key":"4110_CR7","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1137\/120882275","volume":"27","author":"C S Ding","year":"2013","unstructured":"Ding C S, Cyclic codes from some monomials and trinomials, SIAM J. Discr. Math., 2013, 27(4): 1977\u20131994.","journal-title":"SIAM J. Discr. Math."},{"key":"4110_CR8","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.ffa.2010.06.002","volume":"16","author":"R S Coulter","year":"2010","unstructured":"Coulter R S and Matthews R W, Dembowski-Ostrom polynomial from Dickson polynomials, Finite Fields Appl., 2010, 16: 369\u2013379.","journal-title":"Finite Fields Appl."},{"key":"4110_CR9","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R and Niederreiter H, Finite Fields, 2nd Edition, Cambirdge University Press, Cambridge, 1997.","edition":"2"},{"key":"4110_CR10","volume-title":"Doctor\u2019s Degree Thesis","author":"B F Wu","year":"2013","unstructured":"Wu B F, Linearized and linearized derived permutation polynomials over finite fields and their compositional inverses, Doctor\u2019s Degree Thesis, University of Chinese Academy of Sciences, Beijing, 2013."},{"key":"4110_CR11","volume-title":"The Theory of Error-Correcting Codes","author":"F J MacWilliams","year":"1997","unstructured":"MacWilliams F J and Sloane N, The Theory of Error-Correcting Codes, North Holland Publishing Co., Amsterdam, 1997."},{"issue":"1","key":"4110_CR12","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold R, Maximal recursive sequences with 3-valued recursive crosscorrelation functions, IEEE Trans. Inform Theory, 1968, 14(1): 377\u2013385.","journal-title":"IEEE Trans. Inform Theory"},{"issue":"9","key":"4110_CR13","doi-asserted-by":"crossref","first-page":"4160","DOI":"10.1109\/TIT.2006.880036","volume":"52","author":"T P Berger","year":"2006","unstructured":"Berger T P, Canteaut A, Charpin P, and Laigle-Chapuy Y, On almost perfect nonlinear functons over F2, IEEE Trans. Inform Theory, 2006, 52(9): 4160\u20134170.","journal-title":"IEEE Trans. Inform Theory"},{"issue":"4","key":"4110_CR14","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1007\/s11424-014-2132-y","volume":"27","author":"B F Wu","year":"2014","unstructured":"Wu B F, Liu Z J, Jin Q F, and Zhang X M, A note on two classes of Boolean functions with optimal algebraic immunity, Journal of Systems Science and Complexity, 2014, 27(4): 785\u2013794.","journal-title":"Journal of Systems Science and Complexity"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-4110-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-015-4110-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-4110-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:54:10Z","timestamp":1559400850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-015-4110-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,29]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["4110"],"URL":"https:\/\/doi.org\/10.1007\/s11424-015-4110-4","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,29]]}}}