{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:15:18Z","timestamp":1770063318523,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:00:00Z","timestamp":1557532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s12095-019-00360-y","type":"journal-article","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T12:41:22Z","timestamp":1557578482000},"page":"77-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A new lower bound on the second-order nonlinearity of a class of monomial bent functions"],"prefix":"10.1007","volume":"12","author":[{"given":"Deng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Haode","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhengchun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,11]]},"reference":[{"key":"360_CR1","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, A., Kopparty, S., Schoenebeck, G., Sudan, M., Zuckerman, D.: Optimal testing of Reed-Muller codes. In: 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 488\u2013497, IEEE (2010)","DOI":"10.1109\/FOCS.2010.54"},{"issue":"1","key":"360_CR2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ffa.2007.02.004","volume":"14","author":"A Canteaut","year":"2008","unstructured":"Canteaut, A., Charpin, P., Kyureghyan, G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221\u2013241 (2008)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"360_CR3","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1109\/TIT.2007.915704","volume":"54","author":"C Carlet","year":"2008","unstructured":"Carlet, C.: Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. IEEE Trans. Inf. Theory 54(3), 1262\u20131272 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"06","key":"360_CR4","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S0129054111008696","volume":"22","author":"C Carlet","year":"2011","unstructured":"Carlet, C.: More vectorial Boolean functions with unbounded nonlinearity profile. Int. J. Found. Comput. Sci. 22(06), 1259\u20131269 (2011)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"360_CR5","volume-title":"Covering Codes, vol. 54","author":"G Cohen","year":"1997","unstructured":"Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes, vol. 54. Elsevier, Amsterdam (1997)"},{"key":"360_CR6","unstructured":"Dillon, J.F.: Elementary hadamard difference sets. Ph.D. thesis. Univ. of Maryland (1974)"},{"issue":"6","key":"360_CR7","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C Ding","year":"2015","unstructured":"Ding, C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015). \nhttps:\/\/doi.org\/10.1109\/TIT.2015.2420118","journal-title":"IEEE Trans. Inf. Theory"},{"key":"360_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers, vol. 561","author":"C Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers, vol. 561. Springer, Berlin (1991)"},{"key":"360_CR9","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Fast Software Encryption, pp. 61\u201374. Springer (1995)","DOI":"10.1007\/3-540-60590-8_5"},{"issue":"2","key":"360_CR10","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.ins.2009.09.006","volume":"180","author":"S Gangopadhyay","year":"2010","unstructured":"Gangopadhyay, S., Sarkar, S., Telang, R.: On the lower bounds of the second order nonlinearities of some Boolean functions. Inf. Sci. 180(2), 266\u2013273 (2010)","journal-title":"Inf. Sci."},{"key":"360_CR11","first-page":"255","volume":"136","author":"L Gong","year":"2018","unstructured":"Gong, L., Fang, G.: The lower bound of second-order nonlinearity of cubic functions. Ars Combin. 136, 255\u2013261 (2018)","journal-title":"Ars Combin."},{"key":"360_CR12","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Robshaw, M.J.: Non-linear approximations in linear cryptanalysis. In: Advances in Cryptology\u2013EUROCRYPT 1996, pp. 224\u2013236. Springer (1996)","DOI":"10.1007\/3-540-68339-9_20"},{"issue":"06","key":"360_CR13","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1142\/S012905411100874X","volume":"22","author":"X Li","year":"2011","unstructured":"Li, X., Hu, Y., Gao, J.: Lower bounds on the second order nonlinearity of Boolean functions. Int. J. Found. Comput. Sci. 22(06), 1331\u20131349 (2011)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"360_CR14","volume-title":"Finite Fields. With a Foreword by P. M. Cohn","author":"R Lidl","year":"1983","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. With a Foreword by P. M. Cohn. Addison-Wesley Publishing Company, Reading (1983)"},{"key":"360_CR15","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes, vol. 16. Elsevier (1977)"},{"key":"360_CR16","doi-asserted-by":"crossref","unstructured":"Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology\u2013EUROCRYPT 1988, pp. 301\u2013314. Springer (1988)","DOI":"10.1007\/3-540-45961-8_28"},{"issue":"3","key":"360_CR17","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On \u201cbent\u201d functions. J. Combin. Theory Ser. A 20(3), 300\u2013305 (1976)","journal-title":"J. Combin. Theory Ser. A"},{"key":"360_CR18","unstructured":"Sarkar, S., Gangopadhyay, S.: On the second order nonlinearity of a cubic Maiorana-Mcfarland bent function. Finite Fields and their Applications 2009 (2009)"},{"issue":"3","key":"360_CR19","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.ins.2008.10.002","volume":"179","author":"G Sun","year":"2009","unstructured":"Sun, G., Wu, C.: The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity. Inf. Sci. 179(3), 267\u2013278 (2009)","journal-title":"Inf. Sci."},{"key":"360_CR20","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.ins.2012.08.024","volume":"223","author":"D Tang","year":"2013","unstructured":"Tang, D., Carlet, C., Tang, X.: On the second-order nonlinearities of some bent functions. Inf. Sci. 223, 322\u2013330 (2013)","journal-title":"Inf. Sci."},{"issue":"1","key":"360_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu, Z., Deng, Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Des. Codes Cryptogr. 60(1), 1\u201314 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"360_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Q., Johansson, T.: A note on fast algebraic attacks and higher order nonlinearities. In: Information Security and Cryptology, pp. 404\u2013414. Springer (2010)","DOI":"10.1007\/978-3-642-21518-6_28"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-019-00360-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-019-00360-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-019-00360-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,9]],"date-time":"2020-05-09T23:06:34Z","timestamp":1589065594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-019-00360-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,11]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s12095-019-00360-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,11]]},"assertion":[{"value":"17 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}