{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:09Z","timestamp":1772283549833,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T00:00:00Z","timestamp":1450310400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s12095-015-0174-1","type":"journal-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T05:12:36Z","timestamp":1450329156000},"page":"301-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cryptographic Boolean functions with biased inputs"],"prefix":"10.1007","volume":"9","author":[{"given":"Sugata","family":"Gangopadhyay","sequence":"first","affiliation":[]},{"given":"Aditi Kar","family":"Gangopadhyay","sequence":"additional","affiliation":[]},{"given":"Spyridon","family":"Pollatos","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,17]]},"reference":[{"key":"174_CR1","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean functions and applications. Elsevier\u2013Academic Press (2009)","DOI":"10.1016\/B978-0-12-374890-4.00009-4"},{"key":"174_CR2","first-page":"17","volume":"5","author":"P Erdo\u030bs","year":"1960","unstructured":"Erdo\u030bs, P., R\u00e9nyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hungar. Acad. Sci. 5, 17\u201361 (1960)","journal-title":"Publ. Math. Inst. Hungar. Acad. Sci."},{"issue":"10","key":"174_CR3","doi-asserted-by":"crossref","first-page":"2293","DOI":"10.1090\/S0002-9939-96-03732-X","volume":"124","author":"E Friedgut","year":"1996","unstructured":"Friedgut, E., Kalai, G.: Every monotone graph property has a sharp threshold. Proc. AMS. 124(10), 2293\u20133002 (1996)","journal-title":"Proc. AMS."},{"issue":"22","key":"174_CR4","doi-asserted-by":"crossref","first-page":"3364","DOI":"10.1016\/j.disc.2012.07.031","volume":"312","author":"N Keller","year":"2012","unstructured":"Keller, N., Mossel, E., Schlank, T.: A note on the entropy\/influence conjecture. Discrete Math. 312(22), 3364\u20133372 (2012)","journal-title":"Discrete Math."},{"issue":"2011","key":"174_CR5","first-page":"16","volume":"6829","author":"Y Lu","year":"2010","unstructured":"Lu, Y., Desmedt, Y.: Bias analysis of a certain problem with applications to E0 and Shannon ciper. ICISC LNCS 6829(2011), 16\u201328 (2010)","journal-title":"ICISC LNCS"},{"key":"174_CR6","doi-asserted-by":"crossref","unstructured":"Montanaro, A., Osborne, T.J.: Quantum Boolean functions, Chicago J. Theor. Comput. Sci. Article 1, pages 1\u201345,. http:\/\/cjtcs.cs.uchicago.edu\/ , arXiv: 0810.2435v5 (2010)","DOI":"10.4086\/cjtcs.2010.001"},{"key":"174_CR7","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2000)"},{"key":"174_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019Donnell, R.: Analysis of Boolean functions. Cambridge University Press (2014)","DOI":"10.1017\/CBO9781139814782"},{"key":"174_CR9","doi-asserted-by":"crossref","unstructured":"O\u2019Donnell, R., Tan, L-Y.: A composition theorem for the Fourier entropy-influence conjecture, ICALP (1) 2013 780\u2013791. arXiv: 1304.1347v1 (2013)","DOI":"10.1007\/978-3-642-39206-1_66"},{"key":"174_CR10","unstructured":"Parker, M.G.: Generalised S-box nonlinearity, NESSIE Public Document, 11.02.03: NES\/DOC\/UIB\/WP5\/020\/A"},{"key":"174_CR11","doi-asserted-by":"crossref","unstructured":"Parker, M.G., Pott, A.: On Boolean functions which are bent and negabent. In: Proc. Int. Conf. Sequences, Subsequences, Consequences, vol. 4893, pp 9\u201323 (2007)","DOI":"10.1007\/978-3-540-77404-4_2"},{"key":"174_CR12","unstructured":"Riera, C.: Spectral Properties of Boolean functions, Graphs and Graph States. PhD. thesis University of Bergen (2005)"},{"issue":"9","key":"174_CR13","doi-asserted-by":"crossref","first-page":"4142","DOI":"10.1109\/TIT.2006.880069","volume":"52","author":"C Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: Generalized bent criteria for Boolean functions. IEEE Trans. Inf. Theory 52(9), 4142\u20134159 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"174_CR14","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. J. Combin. Theory, Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Combin. Theory, Ser. A"},{"key":"174_CR15","doi-asserted-by":"crossref","unstructured":"Schmidt, K.U., Parker, M.G., Pott, A.: Negabent functions in the Maiorana\u2013McFarland class. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) . SETA 2008, LNCS 5203, pp 390\u2013402. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-85912-3_34"},{"issue":"6","key":"174_CR16","doi-asserted-by":"crossref","first-page":"4064","DOI":"10.1109\/TIT.2012.2186785","volume":"58","author":"P St\u0103nic\u0103","year":"2012","unstructured":"St\u0103nic\u0103, P., Gangopadhyay, S., Chaturvedi, A., Gangopadhyay, A.K., Maitra, S.: Investigations on bent and negabent functions via the nega\u2013Hadamard transform. IEEE Trans. Inf. Theory 58(6), 4064\u20134072 (2012)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0174-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0174-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0174-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0174-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T16:24:44Z","timestamp":1567441484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0174-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,17]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["174"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0174-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,17]]}}}