{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T21:10:19Z","timestamp":1716153019352},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11704-021-0550-2","type":"journal-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T14:02:45Z","timestamp":1658930565000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Further study on indecomposable cryptographic functions"],"prefix":"10.1007","volume":"17","author":[{"given":"Zhongqiu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shixiong","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Fengrong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"issue":"2","key":"550_CR1","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11704-013-2013-x","volume":"7","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Zhang W, Li J, Dong X, Xiao G. The autocorrelation distribution of balanced Boolean function. Frontiers of Computer Science, 2013, 7(2): 272\u2013278","journal-title":"Frontiers of Computer Science"},{"issue":"3","key":"550_CR2","doi-asserted-by":"publisher","first-page":"163805","DOI":"10.1007\/s11704-020-0182-y","volume":"16","author":"H Zhao","year":"2022","unstructured":"Zhao H, Wei Y. New construction of highly nonlinear resilient S-boxes via linear codes. Frontiers of Computer Science, 2022, 16(3): 163805","journal-title":"Frontiers of Computer Science"},{"key":"550_CR3","unstructured":"Dillon J F. Elementary hadamard difference sets. University of Maryland, Dissertation, 1974"},{"issue":"4","key":"550_CR4","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1109\/TIT.2018.2795608","volume":"64","author":"F Zhang","year":"2018","unstructured":"Zhang F, Wei Y, Pasalic E, Xia S. Large sets of disjoint spectra plateaued functions inequivalent to partially linear functions. IEEE Transactions on Information Theory, 2018, 64(4): 2987\u20132999","journal-title":"IEEE Transactions on Information Theory"},{"key":"550_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2016.10.001","volume":"376","author":"W Zhang","year":"2017","unstructured":"Zhang W, Pasalic E. Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria. Information Sciences, 2017, 376: 21\u201330","journal-title":"Information Sciences"},{"issue":"1","key":"550_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3\u201372","journal-title":"Journal of Cryptology"},{"key":"550_CR7","unstructured":"Zheng Y, Zhang X M. Non-separable cryptographic functions. In: Proceedings of the 2000 International Symposium on Information Theory and its Application. 2000, 51\u201358"},{"key":"550_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-0348-7865-4_1","volume-title":"Coding, Cryptography and Combinatorics","author":"C Carlet","year":"2004","unstructured":"Carlet C. On the secondary constructions of resilient and bent functions. In: Feng K, Niederreiter H, Xing C, eds. Coding, Cryptography and Combinatorics. Basel: Birkh\u00e4user. 2004: 3\u201328"},{"key":"550_CR9","volume-title":"The Theory of Error-Correcting Codes","author":"F J MacWilliams","year":"1977","unstructured":"MacWilliams F J, Sloane N J A. The Theory of Error-Correcting Codes. Amsterdam: North-Holland Publishing Company, 1977"},{"issue":"3","key":"550_CR10","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O S Rothaus","year":"1976","unstructured":"Rothaus O S. On \u201cbent\u201d functions. Journal of Combinatorial Theory, Series A, 1976, 20(3): 300\u2013305","journal-title":"Journal of Combinatorial Theory, Series A"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0550-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-021-0550-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0550-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T20:34:14Z","timestamp":1716150854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-021-0550-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["550"],"URL":"https:\/\/doi.org\/10.1007\/s11704-021-0550-2","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,27]]},"assertion":[{"value":"18 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Incorrect cover date was used, instead of 2022 it should be 2023.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"172803"}}