{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T19:40:42Z","timestamp":1689795642725},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Appl. Math. Comput."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12190-023-01887-3","type":"journal-article","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T08:02:08Z","timestamp":1686988928000},"page":"3337-3357","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Stability of the Walsh\u2013Hadamard spectrum of cryptographic Boolean functions with biased inputs"],"prefix":"10.1007","volume":"69","author":[{"given":"Aditi Kar","family":"Gangopadhyay","sequence":"first","affiliation":[]},{"given":"Vikas","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]},{"given":"Sugata","family":"Gangopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"1887_CR1","volume-title":"Mathematical Methods for Physicists","author":"GB Arfken","year":"2012","unstructured":"Arfken, G.B., Weber, H.J., Harris, F.E.: Mathematical Methods for Physicists. Elsevier, Amsterdam (2012)"},{"key":"1887_CR2","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"key":"1887_CR3","volume-title":"Cryptographic Boolean Functions and Applications","author":"T Cusick","year":"2017","unstructured":"Cusick, T., St\u0103nic\u0103, P.: Cryptographic Boolean Functions and Applications, 2nd edn. Elsevier, Amsterdam (2017)","edition":"2"},{"key":"1887_CR4","doi-asserted-by":"publisher","first-page":"192","DOI":"10.13154\/tosc.v2017.i3.192-227","volume":"3","author":"C Carlet","year":"2017","unstructured":"Carlet, C., M\u00e9aux, P., Rotella, Y.: Boolean functions with restricted input and their robustness; application to the FLIP cipher. IACR Trans. Symmetric Cryptol. 3, 192\u2013227 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i3.192-227","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"2","key":"1887_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12095-015-0174-1","volume":"9","author":"S Gangopadhyay","year":"2017","unstructured":"Gangopadhyay, S., Gangopadhyay, A.K., Pollatos, S., St\u0103nic\u0103, P.: Cryptographic Boolean functions with biased inputs. Cryptogr. Commun. 9(2), 301\u2013314 (2017). https:\/\/doi.org\/10.1007\/s12095-015-0174-1","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"1887_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3934\/amc.2018007","volume":"12","author":"S Gangopadhyay","year":"2018","unstructured":"Gangopadhyay, S., Paul, G., Sinha, N., St\u0103nic\u0103, P.: Generalized nonlinearity of $$S$$-boxes. Adv. Math. Commun. 12(1), 115\u2013122 (2018). https:\/\/doi.org\/10.3934\/amc.2018007","journal-title":"Adv. Math. Commun."},{"issue":"2","key":"1887_CR7","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TIT.2019.2932739","volume":"66","author":"S Maitra","year":"2020","unstructured":"Maitra, S., Mandal, B., Martinsen, T., Roy, D., St\u0103nic\u0103, P.: Analysis on Boolean function in a restricted (biased) domain. IEEE Trans. Inf. Theory 66(2), 1219\u20131231 (2020). https:\/\/doi.org\/10.1109\/TIT.2019.2932739","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"1887_CR8","doi-asserted-by":"publisher","first-page":"2626","DOI":"10.1109\/TIT.2002.801482","volume":"48","author":"S Maitra","year":"2002","unstructured":"Maitra, S., Sarkar, P.: Maximum nonlinearity of symmetric Boolean functions on odd number of variables. IEEE Trans. Inf. Theory 48(9), 2626\u20132630 (2002). https:\/\/doi.org\/10.1109\/TIT.2002.801482","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1887_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139814782","volume-title":"Analysis of Boolean Functions","author":"R O\u2019Donnell","year":"2014","unstructured":"O\u2019Donnell, R.: Analysis of Boolean Functions. Cambridge University Press, Cambridge (2014)"},{"issue":"4","key":"1887_CR10","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1006\/eujc.1994.1044","volume":"15","author":"P Savick\u00fd","year":"1994","unstructured":"Savick\u00fd, P.: On the bent Boolean functions that are symmetric. Eur. J. Comb. 15(4), 407\u2013410 (1994). https:\/\/doi.org\/10.1006\/eujc.1994.1044","journal-title":"Eur. J. Comb."}],"container-title":["Journal of Applied Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12190-023-01887-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12190-023-01887-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12190-023-01887-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T19:26:21Z","timestamp":1689794781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12190-023-01887-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1887"],"URL":"https:\/\/doi.org\/10.1007\/s12190-023-01887-3","relation":{},"ISSN":["1598-5865","1865-2085"],"issn-type":[{"value":"1598-5865","type":"print"},{"value":"1865-2085","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}