{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:34:34Z","timestamp":1761676474531,"version":"3.37.3"},"reference-count":11,"publisher":"Informa UK Limited","issue":"1","funder":[{"DOI":"10.13039\/501100003511","name":"IIT Roorkee","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003511","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"published-print":{"date-parts":[[2017,1,2]]},"DOI":"10.1080\/23799927.2017.1304453","type":"journal-article","created":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T07:43:33Z","timestamp":1489391013000},"page":"14-27","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Cubic Maiorana\u2013McFarland bent functions with no affine derivative"],"prefix":"10.1080","volume":"2","author":[{"given":"Bimal","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Sugata","family":"Gangopadhyay","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.814476"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915704"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2133690"},{"key":"CIT0007","first-page":"171","volume":"28","author":"Coulter R.S.","year":"1999","journal-title":"New Zealand J. Math"},{"volume-title":"Cryptographic Boolean Functions and Applications","year":"2009","author":"Cusick T.W.","key":"CIT0008"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.09.006"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2012.11.017"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(98)00008-9"},{"volume-title":"The Theory of Error\u2013Correcting Codes","year":"1977","author":"MacWilliams F.J.","key":"CIT0014"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"}],"container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23799927.2017.1304453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T02:54:43Z","timestamp":1495162483000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23799927.2017.1304453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,2]]},"references-count":11,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,5,12]]},"published-print":{"date-parts":[[2017,1,2]]}},"alternative-id":["10.1080\/23799927.2017.1304453"],"URL":"https:\/\/doi.org\/10.1080\/23799927.2017.1304453","relation":{},"ISSN":["2379-9927","2379-9935"],"issn-type":[{"type":"print","value":"2379-9927"},{"type":"electronic","value":"2379-9935"}],"subject":[],"published":{"date-parts":[[2017,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}