{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T07:11:00Z","timestamp":1724656260801},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12095-024-00721-2","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T03:36:52Z","timestamp":1715830612000},"page":"1151-1162","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Generalized Nega-Hadamard Transform and Nega-crosscorrelation"],"prefix":"10.1007","volume":"16","author":[{"given":"Deepmala","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Mayasar","family":"Ahmad Dar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,16]]},"reference":[{"key":"721_CR1","doi-asserted-by":"crossref","unstructured":"Chaturvedi, A., Gangopadhyay, A.K.: On Generalized Nega-Hadamard Transform. In: Singh K., Awasthi A.K., Mishra R. (eds.) QSHINE 2013, LNICST, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 771\u2013777, (2013)","DOI":"10.1007\/978-3-642-37949-9_67"},{"issue":"40","key":"721_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"1","author":"PV Kumar","year":"1985","unstructured":"Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Combinatirial Theory 1(40), 90\u2013107 (1985)","journal-title":"J. Combinatirial Theory"},{"key":"721_CR3","unstructured":"Parker, M.G.: Constabent properties of Golay-Davis-Jedwab sequences: In: Proc. IEEE Int. Symp. Inform. Theory, Sorrento, Italy, pp. 302, (2000)"},{"key":"721_CR4","doi-asserted-by":"crossref","unstructured":"Parker, M.G., Pott, A.: On Boolean functions which are bent and negabent. In: Golomb, S.W., Gong, G., Helleseth, T., Song, HY. (eds.) SSC 2007, vol. 4893, pp. 9\u201323. LNCS, Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77404-4_2"},{"key":"721_CR5","unstructured":"Paul, A. : Some cryptographic criteria of Boolean functions and their generalizations, A Ph.D. Thesis, (2018)"},{"key":"721_CR6","doi-asserted-by":"crossref","unstructured":"Riera, C., Parker, M.G.: One and two-variable interlace polynomials: A spectral interpretation. In: Ytrehus, \u00d8. (ed.) WCC 2005, vol. 3969, pp. 397\u2013411. LNCS, Springer, Heidelberg (2006)","DOI":"10.1007\/11779360_31"},{"issue":"9","key":"721_CR7","doi-asserted-by":"publisher","first-page":"4142","DOI":"10.1109\/TIT.2006.880069","volume":"52","author":"C Riera","year":"2006","unstructured":"Riera, C., Parker, M.G.: Generalized bent criteria for Boolean functions. IEEE Trans. Inform. Theory 52(9), 4142\u20134159 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"721_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s00224-001-1019-1","volume":"35","author":"P Sarkar","year":"2002","unstructured":"Sarkar, P., Maitra, S.: Cross-correlation analysis of cryptographically useful Boolean functions. Theory Comput. Syst. 35, 39\u201357 (2002)","journal-title":"Theory Comput. Syst."},{"key":"721_CR9","doi-asserted-by":"crossref","unstructured":"Schmidt K. U.: Quaternary Constant-Amplitude Codes for Multicode CDMA. In: IEEE International Symposium on Information Theory, pp. 2781\u20132785, (2007). arxiv.cs.IT\/0611162","DOI":"10.1109\/ISIT.2007.4557639"},{"issue":"4","key":"721_CR10","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1109\/TIT.2009.2013041","volume":"55","author":"KU Schmidt","year":"2009","unstructured":"Schmidt, K.U.: Quaternary constant-amplitude codes for multicode CDMA. IEEE Trans. Inf. Theory 55(4), 1824\u20131832 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"721_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"9","key":"721_CR12","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1080\/00207160.2013.766330","volume":"90","author":"D Singh","year":"2013","unstructured":"Singh, D., Bhaintwal, M., Singh, B.K.: Some results on q-ary bent functions. Int. J. Comput. Math. 90(9), 1761\u20131773 (2013)","journal-title":"Int. J. Comput. Math."},{"issue":"5","key":"721_CR13","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776\u2013780 (1984)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"721_CR14","unstructured":"Sole, P., Tokareva, N.: Connections between Quaternary and Binary Bent Functions (2009). http:\/\/eprint.iacr.org\/2009\/544.pdf"},{"key":"721_CR15","doi-asserted-by":"crossref","unstructured":"Stanica, P., Gangopadhyay, S., Chaturvedi, A., Gangopadhyay, A.K., Maitra, S.: Nega-Hadamard transform, bent and negabent functions. In: Carlet, C., Pott, A. (eds.) SETA 2010, vol. 6338, pp. 359\u2013372. LNCS, Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-15874-2_31"},{"issue":"6","key":"721_CR16","doi-asserted-by":"publisher","first-page":"4064","DOI":"10.1109\/TIT.2012.2186785","volume":"58","author":"P Stanica","year":"2012","unstructured":"Stanica, P., Gangopadhyay, S., Chaturvedi, A., Gangopadhyay, A.K., Maitra, S.: Investigations on bent and negabent functions via the nega-Hadamard transform. IEEE Trans. Inf. Theory 58(6), 4064\u20134072 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"721_CR17","unstructured":"Stanica, P., Gangopadhyay, S., Singh, B.K.: Some Results concerning generalized bent functions (2011). http:\/\/eprint.iacr.org\/2011\/290.pdf"},{"key":"721_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-012-9622-5","volume":"69","author":"P Stanica","year":"2013","unstructured":"Stanica, P., Martinsen, T., Gangopadhyay, S., Singh, B.K.: Bent and generalized bent Boolean functions. Des. Codes Crypt. 69, 77\u201394 (2013)","journal-title":"Des. Codes Crypt."},{"key":"721_CR19","unstructured":"Zhou, Y., Dong, X., Zhang, W., Zeng, B.: New bounds on the sum-of-squares indicator. In: International Conference on Communications and Networking, Kunming, China, pp. 173\u2013178, (2012)"},{"issue":"5","key":"721_CR20","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-80350-5_30","volume":"1","author":"XM Zhang","year":"1996","unstructured":"Zhang, X.M., Zheng, Y.: GAC-The criterion for global acalanche criteria of cryptographic functions. J. Univ. Comput. Sci. 1(5), 320\u2013337 (1996)","journal-title":"J. Univ. Comput. Sci."},{"issue":"2","key":"721_CR21","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.ins.2009.09.012","volume":"180","author":"Y Zhou","year":"2010","unstructured":"Zhou, Y., Xie, M., Xiao, G.: On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. Inf. Sci. 180(2), 256\u2013265 (2010)","journal-title":"Inf. Sci."},{"issue":"16","key":"721_CR22","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1080\/00207160.2012.712689","volume":"89","author":"Y Zhou","year":"2012","unstructured":"Zhou, Y., Zhang, W., Zhu, S., Xiao, G.: The global avalanche characteristics of two Boolean functions and algebraic immunity. Int. J. Comput. Math. 89(16), 2165\u20132179 (2012)","journal-title":"Int. J. Comput. Math."},{"issue":"10","key":"721_CR23","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1080\/00207160.2010.539367","volume":"88","author":"Z Zhuo","year":"2011","unstructured":"Zhuo, Z.: On cross-correlation properties of Boolean functions. Int. J. Comput. Math. 88(10), 2035\u20132041 (2011)","journal-title":"Int. J. Comput. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00721-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00721-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00721-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T06:09:37Z","timestamp":1724652577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00721-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,16]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["721"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00721-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,5,16]]},"assertion":[{"value":"22 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}