{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:07Z","timestamp":1740148927583,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s12095-020-00440-4","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T08:02:41Z","timestamp":1592812961000},"page":"1035-1049","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Root-Hadamard transforms and complementary sequences"],"prefix":"10.1007","volume":"12","author":[{"given":"Luis A.","family":"Medina","sequence":"first","affiliation":[]},{"given":"Matthew G.","family":"Parker","sequence":"additional","affiliation":[]},{"given":"Constanza","family":"Riera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8622-7120","authenticated-orcid":false,"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,22]]},"reference":[{"key":"440_CR1","doi-asserted-by":"crossref","unstructured":"Anbar, N., Ka\u015fikci, C., Meidl, W., Topuzog\u030clu, A.: Shifted plateaued functions and their differential properties. Cryptogr. Commun. (2020)","DOI":"10.1007\/s12095-020-00426-2"},{"key":"440_CR2","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes, chapter of the volume. In: Crama, Y., Hammer, P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp 257\u2013397. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511780448.011"},{"key":"440_CR3","volume-title":"Cryptographic Boolean functions and applications","author":"TW Cusick","year":"2017","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean functions and applications. Elsevier\u2013Academic Press, Cambridge (2017)"},{"key":"440_CR4","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/18.796380","volume":"45","author":"JA Davis","year":"1999","unstructured":"Davis, J.A., Jedwab, J.: Peak-to-mean power control in OFDM, Golay complementary sequences, and Reed-Muller codes. IEEE Trans. Inf. Theory 45, 2397\u20132417 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR5","doi-asserted-by":"publisher","first-page":"3114","DOI":"10.1109\/TIT.2008.924667","volume":"54","author":"F Fiedler","year":"2008","unstructured":"Fiedler, F., Jedwab, J., Parker, M.G.: A framework for the construction of Golay sequences. IEEE Trans. Inf. Theory 54, 3114\u20133129 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR6","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1364\/JOSA.39.000437","volume":"39","author":"MJE Golay","year":"1949","unstructured":"Golay, M.J.E.: Multislit spectrometry. J. Optical Soc. Amer. 39, 437\u2013444 (1949)","journal-title":"J. Optical Soc. Amer."},{"key":"440_CR7","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1364\/JOSA.41.000468","volume":"41","author":"MJE Golay","year":"1951","unstructured":"Golay, M.J.E.: Static multislit spectrometry its application to the panoramic display of infrared spectra. J Optical Soc. Amer. 41, 468\u2013472 (1951)","journal-title":"J Optical Soc. Amer."},{"key":"440_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10623-007-9088-z","volume":"44","author":"J Jedwab","year":"2007","unstructured":"Jedwab, J., Parker, M.: Golay complementary array pairs. Des Codes Cryptogr 44, 209\u2013216 (2007)","journal-title":"Des Codes Cryptogr"},{"key":"440_CR9","volume-title":"The Theory of Error Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"440_CR10","doi-asserted-by":"publisher","first-page":"7804","DOI":"10.1109\/TIT.2017.2754498","volume":"63","author":"T Martinsen","year":"2017","unstructured":"Martinsen, T., Meidl, W., Mesnager, S., St\u0103nic\u0103, P.: Decomposing generalized bent and hyperbent functions. IEEE Trans. Inf. Theory 63, 7804\u20137812 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR11","unstructured":"Parker, M.G.: The constabent properties of Golay-Davis-Jedwab sequences. Int. Symp. Inf. Theory, Sorrento, p. 302 (2000)"},{"key":"440_CR12","doi-asserted-by":"crossref","unstructured":"Parker, M.G., Pott, A.: On Boolean functions which are bent and negabent. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.Y. (eds.) Sequences, Subsequences, and Consequences, SSC 2007 LNCS, vol. 4893, pp 9\u201323 (2007)","DOI":"10.1007\/978-3-540-77404-4_2"},{"issue":"9","key":"440_CR13","doi-asserted-by":"publisher","first-page":"4142","DOI":"10.1109\/TIT.2006.880069","volume":"52","author":"C Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: Generalized bent criteria for Boolean functions. IEEE Trans. Inf. Theory 52(9), 4142\u20134159 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"440_CR14","doi-asserted-by":"publisher","first-page":"613","DOI":"10.3934\/amc.2019038","volume":"13","author":"C Riera","year":"2019","unstructured":"Riera, C., St\u0103nic\u0103, P.: Landscape Boolean functions. Adv. Math. Communication 13(4), 613\u2013627 (2019)","journal-title":"Adv. Math. Communication"},{"key":"440_CR15","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. J. Combin. Theory\u2013Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Combin. Theory\u2013Ser. A"},{"key":"440_CR16","unstructured":"Schmidt, K.-U.: On Spectrally Bounded Codes for Multicarrier Communications, Techn. Univ Dresden, Dr. Diss. (2007)"},{"issue":"5","key":"440_CR17","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1109\/TIT.2016.2539971","volume":"62","author":"P St\u0103nic\u0103","year":"2016","unstructured":"St\u0103nic\u0103, P.: Weak and strong 2k-bent functions. IEEE Trans. Inf. Theory 62(5), 2827\u20132835 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-012-9622-5","volume":"69","author":"P St\u0103nic\u0103","year":"2013","unstructured":"St\u0103nic\u0103, P., Martinsen, T., Gangopadhyay, S., Singh, B.K.: Bent and generalized bent Boolean functions. Designs Codes Cryptogr. 69, 77\u201394 (2013)","journal-title":"Designs Codes Cryptogr."},{"issue":"6","key":"440_CR19","doi-asserted-by":"publisher","first-page":"4064","DOI":"10.1109\/TIT.2012.2186785","volume":"58","author":"P St\u0103nic\u0103","year":"2012","unstructured":"St\u0103nic\u0103, P., Gangopadhyay, S., Chaturvedi , A., Gangopadhyay, A.K., Maitra, S.: Investigations on bent and negabent functions via the nega-Hadamard transform. IEEE Trans. Inf. Theory 58(6), 4064\u20134072 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR20","doi-asserted-by":"publisher","first-page":"4668","DOI":"10.1109\/TIT.2017.2686987","volume":"63","author":"C Tang","year":"2017","unstructured":"Tang, C., Xiang, C., Qi, Y., Feng, K.: Complete characterization of generalized bent and 2k-bent Boolean functions. IEEE Trans. Inf. Theory 63, 4668\u20134674 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"440_CR21","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1972.1054860","volume":"18","author":"C Tseng","year":"1972","unstructured":"Tseng, C., Liu, C.: Complementary sets of sequences. IEEE Trans. Inf. Theory 18, 644\u2013665 (1972)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-020-00440-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T23:18:34Z","timestamp":1624317514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-020-00440-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["440"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00440-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2020,6,22]]},"assertion":[{"value":"22 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}