{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:59:41Z","timestamp":1778065181772,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1998,11]]},"DOI":"10.1023\/a:1008344232130","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"125-156","source":"Crossref","is-referenced-by-count":498,"title":["Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems"],"prefix":"10.1007","volume":"15","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]},{"given":"Pascale","family":"Charpin","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Zinoviev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"181760_CR1","first-page":"9","volume":"10","author":"L.A. Bassalygo","year":"1974","unstructured":"L.A. Bassalygo, G.V. Zaitsev, and V.A. Zinoviev, Uniformly packed codes, Problems of Information Transmission, Vol. 10, No1 (1974) pp. 9\u201314.","journal-title":"Problems of Information Transmission"},{"issue":"3","key":"181760_CR2","first-page":"22","volume":"13","author":"L.A. Bassalygo","year":"1977","unstructured":"L.A. Bassalygo and V.A. Zinoviev, Remark on uniformly packed codes, Problems of Information Transmission, Vol. 13, No3 (1977) pp. 22\u201325.","journal-title":"Problems of Information Transmission"},{"issue":"1","key":"181760_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No.1 (1991) pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"181760_CR4","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF01388407","volume":"3","author":"A.E. Brouwer","year":"1993","unstructured":"A.E. Brouwer and L.M.G.M. Tolhuizen, A Sharpening of the Johnson Bound for Binary Linear Codes, Designs, Codes and Cryptography, Vol. 3, No.1 (1993) pp. 95\u201398.","journal-title":"Designs, Codes and Cryptography"},{"key":"181760_CR5","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/18.490561","volume":"42","author":"A.R. Calderbank","year":"1996","unstructured":"A.R. Calderbank, G. McGuire, B. Poonen and M. Rubinstein, On a conjecture of Helleseth regarding pairs of binary m-sequences, IEEE Transactions on Information Theory, Vol. 42 (1996) pp. 988\u2013990.","journal-title":"IEEE Transactions on Information Theory"},{"key":"181760_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/3-540-68339-9_25","volume-title":"Advances in Cryptology, EUROCRYPT'96","author":"P. Camion","year":"1996","unstructured":"P. Camion and A. Canteaut, Construction of t-resilient functions over a finite alphabet, Advances in Cryptology, EUROCRYPT'96, Lecture Notes in Computer Science, Springer-Verlag, New York, 1070 (1996) pp 283\u2013293."},{"key":"181760_CR7","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C. Carlet","year":"1993","unstructured":"C. Carlet, Partially-bent functions, Designs Codes and Cryptography, Vol. 3 (1993) pp. 135\u2013145.","journal-title":"Designs Codes and Cryptography"},{"key":"181760_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-48285-7_8","volume-title":"Advances in Cryptology, EUROCRYPT'93","author":"C. Carlet","year":"1994","unstructured":"C. Carlet, Two new classes of bent functions, Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 77\u2013101."},{"key":"181760_CR9","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/18.508848","volume":"42","author":"T. Cusick","year":"1996","unstructured":"T. Cusick and H. Dobbertin, Some new 3-valued crosscorrelation functions of binary m-sequences, IEEE Transactions on Information Theory, Vol. 42 (1996) pp. 1238\u20131240.","journal-title":"IEEE Transactions on Information Theory"},{"key":"181760_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology, EUROCRYPT'94","author":"F. Chabaud","year":"1995","unstructured":"F. Chabaud and S. Vaudenay, Links between differential and linear cryptanalysis, Advances in Cryptology, EUROCRYPT'94, Lecture Notes in Computer Science, Springer-Verlag, NewYork, 950 (1995) pp. 356\u2013365."},{"key":"181760_CR11","unstructured":"P. Charpin, A. Tiet\u00e4v\u00e4inen and V. Zinoviev, On binary cyclic codes with d = 3, Problems of Information Transmission, Vol. 33, No.3 (1997)."},{"key":"181760_CR12","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/S0019-9958(73)80007-5","volume":"23","author":"P. Delsarte","year":"1973","unstructured":"P. Delsarte, Four Fundamental parameters of a code and their combinatorial significance, Inf. and Contr. Vol. 23 (1973) pp. 407\u2013438.","journal-title":"Inf. and Contr."},{"key":"181760_CR13","unstructured":"J.F. Dillon, Elementary Hadamard Difference Sets, Ph. D. Thesis, Univ. of Maryland (1974)."},{"key":"181760_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-60590-8_5","volume-title":"Fast Software Encryption: Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms","author":"H. Dobbertin","year":"1995","unstructured":"H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity, Fast Software Encryption: Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms, Lecture Notes in Computer Science, Springer-Verlag, New York, 1008 (1995) pp. 61\u201374."},{"key":"181760_CR15","unstructured":"H. Dobbertin, One to one highly nonlinear power functions on GF(2n), preprint."},{"key":"181760_CR16","unstructured":"H. Dobbertin, Almost perfect nonlinear power functions on GF(2n), preprint."},{"key":"181760_CR17","unstructured":"H. Dobbertin, Another proof of Kasami's theorem, preprint."},{"key":"181760_CR18","unstructured":"S.M. Dodunekov and V.A. Zinoviev, V.A. A note on Preparata Codes, Proceedings of Sixth Intern. Symp. on Information Theory, Moscow-Tashkent Part 2 (1984) pp. 78\u201380."},{"key":"181760_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/0012-365X(72)90025-8","volume":"3","author":"J.M. Goethals","year":"1972","unstructured":"J.M. Goethals and S.L. Snover, Nearly perfect codes, Discrete Mathematics, Vol. 3 (1972) pp. 64\u201388.","journal-title":"Discrete Mathematics"},{"key":"181760_CR20","first-page":"9","volume":"30","author":"J.M. Goethals","year":"1975","unstructured":"J.M. Goethals and H.C.A. Van Tilborg, Uniformly packed codes, Philips Res. Repts Vol. 30 (1975) pp. 9\u201336.","journal-title":"Philips Res. Repts"},{"key":"181760_CR21","unstructured":"T. Helleseth and P.V. Kumar, Sequences with low correlation, Handbook of coding theory (V. S. Pless and W. C. Huffman, eds., R. A. Brualdi, asst. ed.), to appear."},{"key":"181760_CR22","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1006\/jabr.1995.1372","volume":"178","author":"H. Janwa","year":"1995","unstructured":"H. Janwa, G. McGuire and R.M. Wilson Double-error-correcting codes and absolutely irreductible polynomials over GF(2), Journal of Algebra, Vol. 178 (1995) pp. 665\u2013676.","journal-title":"Journal of Algebra"},{"key":"181760_CR23","volume-title":"Combinatorial Math. and Applications","author":"T. Kasami","year":"1969","unstructured":"T. Kasami, Weight distributions of Bose-Chaudhuri-Hocquenghem Codes, Combinatorial Math. and Applications (R.C. Bose and T.A. Dowlings, eds.), Univ. of North Carolina Press, Chapel Hill, NC (1969)."},{"key":"181760_CR24","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T. Kasami","year":"1971","unstructured":"T. Kasami, The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes, Information and Control Vol. 18 (1971) pp. 369\u2013394.","journal-title":"Information and Control"},{"key":"181760_CR25","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/18.54892","volume":"36","author":"G. Lachaud","year":"1990","unstructured":"G. Lachaud and J. Wolfmann, The weights of the orthogonals of the extended quadratic binary Goppa codes, IEEE Transactions on Information Theory, Vol. 36 (1990) pp. 686\u2013692.","journal-title":"IEEE Transactions on Information Theory"},{"key":"181760_CR26","volume-title":"Finite Fields, Encyclopedia of Mathematics and its Applications","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia of Mathematics and its Applications, Vol. 20, Cambridge University Press, Cambridge (1983)."},{"key":"181760_CR27","unstructured":"Y. Niho, Multi-valued cross-correlation functions between two maximal linear recursive sequences, Ph. D. Thesis, USCEE Rep. 409 (1972)."},{"key":"181760_CR28","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/S0019-9958(63)90189-X","volume":"6","author":"V. Pless","year":"1963","unstructured":"V. Pless, Power moment identities on weight distributions in error-correcting codes, Info. and Control, Vol. 6 (1963) pp. 147\u2013152.","journal-title":"Info. and Control"},{"key":"181760_CR29","volume-title":"The theory of error-correcting codes","author":"F.J. Mac Williams","year":"1977","unstructured":"F.J. Mac Williams and N.J. Sloane, The theory of error-correcting codes, Amsterdam, The Netherlands: North Holland (1977)."},{"key":"181760_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptography, EUROCRYPT'93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptography, EUROCRYPT'93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 386\u2013397."},{"key":"181760_CR31","series-title":"Lecture Notes in Computer Science","first-page":"378","volume-title":"Advances in Cryptology, EUROCRYPT' 91","author":"K. Nyberg","year":"1992","unstructured":"K. Nyberg, Perfect non-linear S-boxes, Advances in Cryptology, EUROCRYPT' 91, Lecture Notes in Computer Science, Springer-Verlag, New York, 547 (1992) pp. 378\u2013386."},{"key":"181760_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptography, EUROCRYPT' 93","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg, Differentially uniform mappings for cryptography, Advances in Cryptography, EUROCRYPT' 93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 55\u201364."},{"key":"181760_CR33","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20A","author":"O.S. Rothaus","year":"1976","unstructured":"O.S. Rothaus, On Bent Functions, J. Comb. Theory, Vol. 20A (1976) pp. 300\u2013305.","journal-title":"J. Comb. Theory"},{"issue":"1","key":"181760_CR34","first-page":"38","volume":"7","author":"N.V. Semakov","year":"1971","unstructured":"N.V. Semakov, V.A. Zinoviev and G.V. Zaitsev, Uniformly packed codes, Problems of Information Transmission, Vol. 7, No1 (1971) pp. 38\u201350.","journal-title":"Problems of Information Transmission"},{"key":"181760_CR35","unstructured":"V.M. Sidel'nikov, On the mutual correlation of sequences, Soviet Math. Dokl., Vol. 12 (1971) pp. 197\u2013201"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008344232130.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008344232130\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008344232130.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:01:02Z","timestamp":1753758062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008344232130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,11]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,11]]}},"alternative-id":["181760"],"URL":"https:\/\/doi.org\/10.1023\/a:1008344232130","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,11]]}}}