{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:37:25Z","timestamp":1725683845827},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11432-016-0624-x","type":"journal-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T07:37:36Z","timestamp":1504251456000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Three new infinite families of bent functions"],"prefix":"10.1007","volume":"61","author":[{"given":"Libo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"624_CR1","doi-asserted-by":"crossref","first-page":"119103","DOI":"10.1007\/s11432-015-0863-3","volume":"59","author":"L Li","year":"2016","unstructured":"Li L, Zhang W. Constructions of vectorial Boolean functions with good cryptographic properties. Sci China Inf Sci, 2016, 59: 119103","journal-title":"Sci China Inf Sci"},{"key":"624_CR2","first-page":"386","volume-title":"Advances in Cryptology\u2014Eurocrypt\u201993","author":"M Matsui","year":"1994","unstructured":"Matsui M. Linear cryptanalysis of DES cipher. In: Advances in Cryptology\u2014Eurocrypt\u201993. Berlin: Springer, 1994. 386\u2013397"},{"key":"624_CR3","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"K Nyberg","year":"1991","unstructured":"Nyberg K. Perfect nonlinear S-boxes. In: Advances in Cryptology\u2014EUROCRYPT. Berlin: Springer, 1991. 547: 378\u2013386"},{"key":"624_CR4","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T Siegenthaler","year":"1984","unstructured":"Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans Inform Theory, 1984, 30: 776\u2013780","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR5","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O S Rothaus","year":"1976","unstructured":"Rothaus O S. On bent functions. J Comb Theory Ser A, 1976, 20: 300\u2013305","journal-title":"J Comb Theory Ser A"},{"key":"624_CR6","volume-title":"Elementary hadamard difference sets","author":"J F Dillon","year":"1974","unstructured":"Dillon J F. Elementary hadamard difference sets. Dissertation for Ph.D. Degree. Washington: University of Maryland, 1974"},{"key":"624_CR7","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/18.923730","volume":"47","author":"A Canteaut","year":"2001","unstructured":"Canteaut A, Carlet C, Charpin P, et al. On cryptographic properties of the cosets of R(1; m). IEEE Trans Inform Theory, 2001, 47: 1494\u20131513","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR8","volume-title":"The Theory of Error-Correcting Codes","author":"F J MacWilliams","year":"1977","unstructured":"MacWilliams F J, Sloane N J. The Theory of Error-Correcting Codes. Amsterdam: North Holland, 1977"},{"key":"624_CR9","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume":"2","author":"C Carlet","year":"2010","unstructured":"Carlet C. Boolean functions for cryptography and error correcting codes. Boolean Models Meth Math Comput Sci Eng, 2010, 2: 257\u2013397","journal-title":"Boolean Models Meth Math Comput Sci Eng"},{"key":"624_CR10","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/TIT.1982.1056589","volume":"28","author":"J Olsen","year":"1982","unstructured":"Olsen J, Scholtz R, Welch L. Bent-function sequences. IEEE Trans Inform Theory, 1982, 28: 858\u2013864","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR11","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/12.954512","volume":"50","author":"A Bernasconi","year":"2001","unstructured":"Bernasconi A, Codenottl B, Vanderkam J M. A characterization of bent functions in terms of strongly regular graphs. IEEE Trans Comput, 2001, 50: 984\u2013985","journal-title":"IEEE Trans Comput"},{"key":"624_CR12","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1016\/j.jcta.2009.05.003","volume":"117","author":"Y Tan","year":"2010","unstructured":"Tan Y, Pott A, Feng T. Strongly regular graphs associated with ternary bent functions. J Comb Theory Ser A, 2010, 117: 668\u2013682","journal-title":"J Comb Theory Ser A"},{"key":"624_CR13","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1109\/TIT.2016.2530083","volume":"62","author":"L Budaghyan","year":"2016","unstructured":"Budaghyan L, Kholosha A, Carlet C, et al. Univariate Niho bent functions from o-polynomials. IEEE Trans Inform Theory, 2016, 62: 2254\u20132265","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR14","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1016\/j.jcta.2011.06.005","volume":"118","author":"C Carlet","year":"2011","unstructured":"Carlet C, Mesnager S. On Dillons class H of bent functions, Niho bent functions and o-polynomials. J Combin Theory Ser A, 2011, 118: 2392\u20132410","journal-title":"J Combin Theory Ser A"},{"key":"624_CR15","doi-asserted-by":"crossref","first-page":"6054","DOI":"10.1109\/TIT.2012.2199736","volume":"58","author":"W Jia","year":"2012","unstructured":"Jia W, Zeng X, Helleseth T, et al. A class of binomial bent functions over the finite fields of odd characteristic. IEEE Trans Inform Theory, 2012, 58: 6054\u20136063","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR16","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-319-27239-9_13","volume-title":"Cryptography and Coding","author":"N Kocak","year":"2015","unstructured":"Kocak N, Mesnager S, Ozbudak F. Bent and semi-bent functions via linear translators. In: Cryptography and Coding. Berlin: Springer, 2015. 205\u2013224"},{"key":"624_CR17","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/TIT.2012.2229782","volume":"59","author":"N Li","year":"2013","unstructured":"Li N, Helleseth T, Tang X, et al. Several new classes of bent functions from Dillon exponents. IEEE Trans Inform Theory, 2013, 59: 1818\u20131831","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR18","doi-asserted-by":"crossref","first-page":"5760","DOI":"10.1109\/TIT.2014.2339861","volume":"60","author":"N Li","year":"2014","unstructured":"Li N, Tang X, Helleseth T. New constructions of quadratic bent functions in polynomial form. IEEE Trans Inform Theory, 2014, 60: 5760\u20135767","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR19","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/978-3-642-10868-6_24","volume-title":"Cryptography & Coding","author":"S Mesnager","year":"2009","unstructured":"Mesnager S. A new family of hyper-bent Boolean functions in polynomial form. In: Cryptography & Coding. Berlin: Springer, 2009. 402\u2013417"},{"key":"624_CR20","doi-asserted-by":"crossref","first-page":"5996","DOI":"10.1109\/TIT.2011.2124439","volume":"57","author":"S Mesnager","year":"2011","unstructured":"Mesnager S. Bent and hyper-bent functions in polynomial form and their link with some exponential sums and Dickson polynomials. IEEE Trans Inform Theory, 2011, 57: 5996\u20136009","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR21","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/TIT.2013.2238580","volume":"59","author":"S Mesnager","year":"2013","unstructured":"Mesnager S, Flori J P. Hyperbent functions via Dillon-like exponents. IEEE Trans Inf Theory, 2013, 59: 836\u2013840","journal-title":"IEEE Trans Inf Theory"},{"key":"624_CR22","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s12095-015-0144-7","volume":"8","author":"S Mesnager","year":"2016","unstructured":"Mesnager S. Further constructions of infinite families of bent functions from new permutations and their duals. Cryptogr Commun, 2016, 8: 229\u2013246","journal-title":"Cryptogr Commun"},{"key":"624_CR23","doi-asserted-by":"crossref","first-page":"4397","DOI":"10.1109\/TIT.2014.2320974","volume":"60","author":"S Mesnager","year":"2014","unstructured":"Mesnager S. Several new infinite families of bent functions and their duals. IEEE Trans Inform Theory, 2014, 60: 4397\u20134407","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR24","doi-asserted-by":"crossref","first-page":"1868","DOI":"10.1587\/transfun.E94.A.1868","volume":"94","author":"D B Zheng","year":"2011","unstructured":"Zheng D B, Zeng X Y, Hu L. A family of p-ary binomial bent functions. IEICE Trans Fundamentals, 2011, 94: 1868\u20131872","journal-title":"IEICE Trans Fundamentals"},{"key":"624_CR25","first-page":"1","volume-title":"On bent and highly nonlinear balanced\/resilient functions and their algebraic immunities","author":"C Carlet","year":"2006","unstructured":"Carlet C. On bent and highly nonlinear balanced\/resilient functions and their algebraic immunities. In: Proceedings of the 16th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Las Vegas, 2006. 1\u201328"},{"key":"624_CR26","unstructured":"Xu G K, Cao XW, Xu S D. Several new classes of Boolean functions with fewWalsh transform values. arXiv:1506.04886"},{"key":"624_CR27","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1504\/IJICOT.2010.032864","volume":"1","author":"C Carlet","year":"2010","unstructured":"Carlet C, Danielsen L E, Parker M G, et al. Self-dual bent functions. Int J Inf Coding Theory, 2010, 1: 384\u2013399","journal-title":"Int J Inf Coding Theory"},{"key":"624_CR28","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.jcta.2005.07.009","volume":"113","author":"H Dobbertin","year":"2006","unstructured":"Dobbertin H, Leander G, Canteaut A, et al. Construction of bent functions via Niho power functions. J Combin Theory Ser A, 2006, 113: 779\u2013798","journal-title":"J Combin Theory Ser A"},{"key":"624_CR29","doi-asserted-by":"crossref","first-page":"5529","DOI":"10.1109\/TIT.2006.885464","volume":"52","author":"G Leander","year":"2006","unstructured":"Leander G, Kholosha A. Bent functions with 2r Niho exponents. IEEE Trans Inform Theory, 2006, 52: 5529\u20135532","journal-title":"IEEE Trans Inform Theory"},{"key":"624_CR30","doi-asserted-by":"crossref","first-page":"6979","DOI":"10.1109\/TIT.2012.2206557","volume":"58","author":"L Budaghyan","year":"2012","unstructured":"Budaghyan L, Carlet C, Helleseth T, et al. Further results on Niho bent functions. IEEE Trans Inform Theory, 2012, 58: 6979\u20136985","journal-title":"IEEE Trans Inform Theory"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0624-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-0624-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0624-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T01:19:03Z","timestamp":1570065543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-0624-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,25]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["624"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-0624-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,25]]},"article-number":"032104"}}