{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:07:04Z","timestamp":1774022824260,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:00:00Z","timestamp":1630022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:00:00Z","timestamp":1630022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Mathematical Center in Akademgorodok"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s12095-021-00528-5","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T10:03:13Z","timestamp":1630058593000},"page":"909-926","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Some general properties of modified bent functions through addition of indicator functions"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4367-3507","authenticated-orcid":false,"given":"Nikolay","family":"Kolomeec","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,27]]},"reference":[{"key":"528_CR1","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Perrin, L., Tian, S.: Anomalies and vector space search: tools for S-Box analysis. In: Galbraith, S., Moriai, S (eds.) Advances in Cryptology \u2013 ASIACRYPT 2019. ASIACRYPT 2019. Lecture Notes in Computer Science, 11921, pp 196\u2013223. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-34578-5_8"},{"issue":"8","key":"528_CR2","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A Canteaut","year":"2003","unstructured":"Canteaut, A., Charpin, P.: Decomposing bent functions. IEEE Trans. Inform. Theory 49(8), 2004\u20132019 (2003)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"528_CR3","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.dam.2005.03.027","volume":"154","author":"A Canteaut","year":"2006","unstructured":"Canteaut, A., Daum, M., Dobbertin, H., Leander, G.: Finding nonnormal bent functions. Discrete Appl. Math. 154(2), 202\u2013218 (2006)","journal-title":"Discrete Appl. Math."},{"key":"528_CR4","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Two new classes of bent functions. In: Helleseth, T (ed.) Advances in Cryptology \u2014 EUROCRYPT \u201993. EUROCRYPT 1993. Lecture Notes in Computer Science, 765, pp 77\u2013101. Springer, Berlin, Heidelberg (1994)","DOI":"10.1007\/3-540-48285-7_8"},{"key":"528_CR5","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.jco.2003.08.013","volume":"20","author":"C Carlet","year":"2004","unstructured":"Carlet, C: On the confusion and diffusion properties of Maiorana\u2013McFarland\u2019s and extended Maiorana\u2013McFarland\u2019s functions, Special Issue \u201cComplexity Issues in Coding Theory and Cryptography\u201d dedicated to Prof. Harald Niederreiter on the occasion of his 60th birthday. J. Complexity 20, 182\u2013204 (2004)","journal-title":"J. Complexity"},{"key":"528_CR6","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting code. In: Crama, Y., Hammer, P. L. (eds.) Boolean models and methods in mathematics, computer science, and engineering, pp 257\u2013397. Cambridge University Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511780448.011"},{"key":"528_CR7","volume-title":"Boolean functions for cryptography and coding theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean functions for cryptography and coding theory. Cambridge University Press, Cambridge (2021)"},{"issue":"11","key":"528_CR8","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.1109\/TIT.2004.836681","volume":"50","author":"C Carlet","year":"2004","unstructured":"Carlet, C., Dobbertin, H., Leander, G.: Normal extensions of bent functions. IEEE Trans. Inform. Theory 50(11), 2880\u20132885 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"528_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet, C., Mesnager, S.: Four decades of research on bent functions. Des. Codes Cryptogr. 78(1), 5\u201350 (2016)","journal-title":"Des. Codes Cryptogr."},{"key":"528_CR10","volume-title":"Cryptographic Boolean functions and applications","author":"TW Cusick","year":"2009","unstructured":"Cusick, T.W., Stanica, P.: Cryptographic Boolean functions and applications, 2nd. Acad. Press. Elsevier, Amsterdam (2009)","edition":"2nd"},{"key":"528_CR11","unstructured":"Dillon, J.: Elementary Hadamard Difference Sets, PhD. dissertation. College Park, Univ Maryland (1974)"},{"key":"528_CR12","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.ffa.2003.09.003","volume":"10","author":"JF Dillon","year":"2004","unstructured":"Dillon, J.F., Dobbertin, H.: New cyclic difference sets with singer parameters. Finite Fields Their Appl. 10, 342\u2013389 (2004)","journal-title":"Finite Fields Their Appl."},{"key":"528_CR13","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Preneel, B (ed.) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, 1008, pp 61\u201374. Springer, Berlin, Heidelberg (1995)","DOI":"10.1007\/3-540-60590-8_5"},{"key":"528_CR14","doi-asserted-by":"crossref","unstructured":"Helleseth, T., Kholosha, A.: Bent functions and their connections to combinatorics. In: Blackburn, S., Gerke, S., Wildon, M. (eds.) Surveys in Combinatorics 2013 (London Mathematical Society Lecture Note Series), pp 91\u2013126. Cambridge University Press, Cambridge (2013)","DOI":"10.1017\/CBO9781139506748.004"},{"key":"528_CR15","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1134\/S1990478913020051","volume":"7","author":"A Frolova","year":"2013","unstructured":"Frolova, A.: The essential dependence of Kasami bent functions on the products of variables. J. Appl. Ind. Math. 7, 166\u2013176 (2013)","journal-title":"J. Appl. Ind. Math."},{"issue":"3","key":"528_CR16","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s10623-016-0306-4","volume":"85","author":"N Kolomeec","year":"2017","unstructured":"Kolomeec, N: The graph of minimal distances of bent functions and its properties. Des Codes Cryptogr 85(3), 395\u2013410 (2017)","journal-title":"Des Codes Cryptogr"},{"key":"528_CR17","doi-asserted-by":"crossref","unstructured":"Kolomeec, N.A., Pavlov, A.V.: Bent functions on the minimal distance. In: 2010 IEEE Region 8 international conference on computational technologies in electrical and electronics engineering (SIBIRCON), pp. 145\u2013149 (2010)","DOI":"10.1109\/SIBIRCON.2010.5555328"},{"issue":"5","key":"528_CR18","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/s12095-020-00438-y","volume":"12","author":"A Kutsenko","year":"2020","unstructured":"Kutsenko, A: The group of automorphisms of the set of self-dual bent functions. Cryptogr. Commun. 12(5), 881\u2013898 (2020)","journal-title":"Cryptogr. Commun."},{"key":"528_CR19","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.ffa.2007.12.001","volume":"14","author":"P Langevin","year":"2008","unstructured":"Langevin, P., Leander, G.: Monomial bent function and Stickelberger\u2019s theorem. Finite Fields Their Appl. 14, 727\u2013742 (2008)","journal-title":"Finite Fields Their Appl."},{"issue":"4","key":"528_CR20","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1016\/j.jcta.2008.12.004","volume":"116","author":"G Leander","year":"2009","unstructured":"Leander, G., McGuire, G.: Construction of bent functions from near-bent functions. J. Combin. Theory. Ser. A 116(4), 960\u2013970 (2009)","journal-title":"J. Combin. Theory. Ser. A"},{"key":"528_CR21","doi-asserted-by":"crossref","unstructured":"Logachev, O.A., Salnikov, A.A., Yashchenko, V.V.: Boolean functions in coding theory and cryptography american mathematical society (2012)","DOI":"10.1090\/mmono\/241"},{"key":"528_CR22","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3233\/FI-2016-1386","volume":"146","author":"B Mandal","year":"2016","unstructured":"Mandal, B., Stanica, P., Gangopadhyay, S., Pasalic, E.: An analysis of the $\\mathcal {C}$ class of bent functions. Fundamenta Informaticae 146, 271\u2013292 (2016)","journal-title":"Fundamenta Informaticae"},{"key":"528_CR23","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T (ed.) Advances in cryptology \u2013 EUROCRYPT \u201993. EUROCRYPT 1993. lecture notes in computer science, 765, pp 386\u2013397. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"528_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0097-3165(73)90031-9","volume":"15","author":"RL McFarland","year":"1973","unstructured":"McFarland, R.L.: A family of difference sets in non-cyclic groups. J. Combin. Theory. Ser. A 15, 1\u201310 (1973)","journal-title":"J. Combin. Theory. Ser. A"},{"key":"528_CR25","volume-title":"Fundamentals and results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S., functions, Bent: Fundamentals and results. Springer, Berlin (2016)"},{"issue":"3","key":"528_CR26","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O Rothaus","year":"1976","unstructured":"Rothaus, O: On bent functions. J. Combin. Theory. Ser. A 20(3), 300\u2013305 (1976)","journal-title":"J. Combin. Theory. Ser. A"},{"key":"528_CR27","unstructured":"Sharma, D., Gangopadhyay, D.: On Kasami bent function, Cryptology ePrint Archive, Report 2008\/426. http:\/\/eprint.iacr.org\/2008\/426.pdf (2008)"},{"key":"528_CR28","volume-title":"Bent Functions, Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva, N.: Bent Functions, Results and Applications to Cryptography. Acad. Press. Elsevier, Amsterdam (2015)"},{"issue":"1","key":"528_CR29","first-page":"75","volume":"33","author":"V Yashchenko","year":"1997","unstructured":"Yashchenko, V.: On the propagation criterion for Boolean functions and on bent functions. Probl. Peredachi Inf. 33(1), 75\u201386 (1997). (in Russian)","journal-title":"Probl. Peredachi Inf."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00528-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00528-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00528-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T15:12:11Z","timestamp":1637680331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00528-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,27]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["528"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00528-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,27]]},"assertion":[{"value":"21 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}