{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:38Z","timestamp":1730213738331,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2022J05134,2023J01996"],"award-info":[{"award-number":["2022J05134,2023J01996"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010614","name":"Putian University","doi-asserted-by":"publisher","award":["JXC202306"],"award-info":[{"award-number":["JXC202306"]}],"id":[{"id":"10.13039\/501100010614","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072109"],"award-info":[{"award-number":["62072109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361499","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0515-0522","source":"Crossref","is-referenced-by-count":0,"title":["New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security"],"prefix":"10.1109","author":[{"given":"Qian","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer and Data Science, Fuzhou University,Fuzhou,China"}]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer and Data Science, Fuzhou University,Key Laboratory of Information Security of Network Systems,Fuzhou,China"}]},{"given":"Zhixiong","family":"Chen","sequence":"additional","affiliation":[{"name":"Putian University,Fujian Key Laboratory of Financial Information Processing,Putian,China"}]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer and Data Science, Fuzhou University,Key Laboratory of Information Security of Network Systems,Fuzhou,China"}]},{"given":"Hui","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University,Fuzhou,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0145-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.923730"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2016.11.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-019-00395-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10801-010-0270-4"},{"volume-title":"Elementary Hadamard difference sets","year":"1974","author":"Dillon","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcta.2010.08.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2229782"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/s0924-6509(08)x7030-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2320974"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0144-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55589-8_19"},{"key":"ref16","first-page":"205","article-title":"Bent and Semi-bent functions via linear translators","volume-title":"IMACC 2015. Lecture Notes in Computer Science","volume":"9496","author":"Ne\u015fe","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056589"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2017.2777961"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcta.2009.05.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0624-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-016-0298-3"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361499.pdf?arnumber=10361499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:45:15Z","timestamp":1705092315000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361499","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}