{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:27Z","timestamp":1740148947104,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T00:00:00Z","timestamp":1708732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T00:00:00Z","timestamp":1708732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172319"],"award-info":[{"award-number":["62172319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFA000503"],"award-info":[{"award-number":["2021YFA000503"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12095-024-00701-6","type":"journal-article","created":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T08:02:06Z","timestamp":1708761726000},"page":"843-855","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Boolean functions of binary Type-II and Type-III\/II complementary array pairs"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5364-3278","authenticated-orcid":false,"given":"Erzhong","family":"Xue","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1525-3356","authenticated-orcid":false,"given":"Zilong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1980-8064","authenticated-orcid":false,"given":"Jinjin","family":"Chai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,24]]},"reference":[{"key":"701_CR1","unstructured":"Bj\u00f8rstad, T.E., Parker, M.G.: Equivalence between certain complementary pairs of Types I and III. Invited, NATO Series - D: Information and Communication Security, vol. 23, pp. 203\u2013221 (2009)"},{"key":"701_CR2","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1007\/s10623-021-00938-9","volume":"89","author":"J Chai","year":"2021","unstructured":"Chai, J., Wang, Z., Xue, E.: Walsh spectrum and Nega spectrum of complementary arrays. Design Code Cryptogr. 89, 2663\u20132677 (2021)","journal-title":"Design Code Cryptogr."},{"issue":"7","key":"701_CR3","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/18.796380","volume":"45","author":"JA Davis","year":"1999","unstructured":"Davis, J.A., Jedwab, J.: Peak-to-mean power control in OFDM, Golay complementary sequences, and Reed-Muller codes. IEEE Trans. Inf. Theory 45(7), 2397\u20132417 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"701_CR4","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.jcta.2007.10.001","volume":"115","author":"F Fiedler","year":"2008","unstructured":"Fiedler, F., Jedwab, J., Parker, M.G.: A multi-dimensional approach to the construction and enumeration of Golay complementary sequences. J. Combin. Theory (A) 115(5), 753\u2013776 (2008)","journal-title":"J. Combin. Theory (A)"},{"issue":"7","key":"701_CR5","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1364\/JOSA.41.000468","volume":"41","author":"MJE Golay","year":"1951","unstructured":"Golay, M.J.E.: Static multislit spectrometry and its application to the panoramic display of infrared spectra. J. Opt. Soc. Amer. 41(7), 468\u2013472 (1951)","journal-title":"J. Opt. Soc. Amer."},{"issue":"7","key":"701_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10623-007-9088-z","volume":"44","author":"J Jedwab","year":"2007","unstructured":"Jedwab, J., Parker, M.G.: Golay complementary array pairs. Design Code Cryptogr. 44(7), 209\u2013216 (2007)","journal-title":"Design Code Cryptogr."},{"key":"701_CR7","doi-asserted-by":"crossref","unstructured":"Li, C., Li, N., Parker, M.G.: Complementary sequence pairs of types II and III. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E95-A, no. 11, pp. 1819\u20131826 (2012)","DOI":"10.1587\/transfun.E95.A.1819"},{"key":"701_CR8","unstructured":"Parker, M.G.: Close encounters with Boolean functions of three different kinds. Invited, Lecture Notes in Computer Science, vol. 5228, pp. 15\u201319 (2008)"},{"key":"701_CR9","unstructured":"Parker, M.G.: Polynomial residue systems via unitary transforms. Invited. Post proc. of Contact Forum Coding Theory and Cryptography III, Brussels (2009)"},{"key":"701_CR10","doi-asserted-by":"crossref","unstructured":"Parker, M.G., Riera, C.: Generalised complementary arrays. In: Lecture Notes in Computer Science, LNCS 7089, Springer (2011)","DOI":"10.1007\/978-3-642-25516-8_4"},{"key":"701_CR11","doi-asserted-by":"crossref","unstructured":"Riera, C., Parker, M.G.: Boolean functions whose restrictions are highly nonlinear. Invited, ITW 2010 Dublin - IEEE Inform. Theory Workshop (2010)","DOI":"10.1109\/CIG.2010.5592908"},{"key":"701_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/0097-3165(74)90056-9","volume":"16","author":"R Turyn","year":"1974","unstructured":"Turyn, R.: Hadamard matrices, Baumert-Hall units, four-symbol sequences, pulse compression, and surface wave encodings. J. Combin. Theory (A) 16, 313\u2013333 (1974)","journal-title":"J. Combin. Theory (A)"},{"issue":"8","key":"701_CR13","doi-asserted-by":"publisher","first-page":"2769","DOI":"10.1007\/s10623-023-01230-8","volume":"91","author":"E Xue","year":"2023","unstructured":"Xue, E., Wang, Z.: The $$q$$-ary Golay complementary arrays of size $$\\varvec {2}^{(m)}$$ are standard. Design Code Cryptogr. 91(8), 2769\u20132778 (2023)","journal-title":"Design Code Cryptogr."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00701-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00701-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00701-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:54:04Z","timestamp":1731437644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00701-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,24]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["701"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00701-6","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,2,24]]},"assertion":[{"value":"1 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they consent to their participation in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"The authors declare that they consent to the publication of the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}