{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:23Z","timestamp":1775054423318,"version":"3.50.1"},"reference-count":21,"publisher":"Pleiades Publishing Ltd","issue":"1","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Probl Inf Transm"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1134\/s003294600801002x","type":"journal-article","created":{"date-parts":[[2008,5,3]],"date-time":"2008-05-03T21:43:47Z","timestamp":1209851027000},"page":"12-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Bent and hyper-bent functions over a field of 2\u2113 elements"],"prefix":"10.1134","volume":"44","author":[{"given":"A. S.","family":"Kuz\u2019min","sequence":"first","affiliation":[]},{"given":"V. T.","family":"Markov","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Nechaev","sequence":"additional","affiliation":[]},{"given":"V. A.","family":"Shishkin","sequence":"additional","affiliation":[]},{"given":"A. B.","family":"Shishkov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2008,5,4]]},"reference":[{"key":"1002_CR1","series-title":"Lect. Notes Comp. Sci.","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/3-540-44987-6_25","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u20192001. Proc. 20th Int. Ann. Conf. on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria","author":"A.M. Youssef","year":"2001","unstructured":"Youssef, A.M. and Gong, G., Hyper-Bent Functions, Advances in Cryptology\u2014EUROCRYPT\u20192001. Proc. 20th Int. Ann. Conf. on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, B. Pfitzmann, Ed., Lect. Notes Comp. Sci., vol. 2045, Berlin: Springer, 2001, pp. 406\u2013419."},{"issue":"1","key":"1002_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.4213\/dm234","volume":"14","author":"V.I. Solodovnikov","year":"2002","unstructured":"Solodovnikov, V.I., Bent Functions from a Finite Abelian Group to a Finite Abelian Group, Diskret. Mat., 2002, vol. 14, no. 1, pp. 99\u2013113 [Discrete Math. Appl. (Engl. Transl.), 2002, vol. 12, no. 2, pp. 111\u2013126].","journal-title":"Diskret. Mat."},{"key":"1002_CR3","unstructured":"Dillon, J.F., A Survey of Bent Functions, NSA Tech. J. (Special issue), 1972, pp. 191\u2013215."},{"issue":"3","key":"1002_CR4","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus, O.S., On \u201cBent\u201d Functions, J. Combin. Theory, Ser. A, 1976, vol. 20, no. 3, pp. 300\u2013305.","journal-title":"J. Combin. Theory, Ser. A"},{"issue":"1","key":"1002_CR5","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4213\/dm29","volume":"18","author":"A.S. Kuz\u2019min","year":"2006","unstructured":"Kuz\u2019min, A.S., Markov, V.T., Nechaev, A.A., and Shishkov, A.B., Approximation of Boolean Functions by Monomial Ones, Diskret. Mat., 2006, vol. 18, no. 1, pp. 9\u201329 [Discrete Math. Appl. (Engl. Transl.), 2006, vol. 16, no. 1, pp. 7\u201328].","journal-title":"Diskret. Mat."},{"key":"1002_CR6","unstructured":"Dillon, J.F., Elementary Hadamard Difference Sets, PhD Thesis, Univ. of Maryland, 1974."},{"key":"1002_CR7","series-title":"Lect. Notes Comp. Sci.","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-48285-7_8","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201993. Proc. Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway","author":"C. Carlet","year":"1994","unstructured":"Carlet, C., Two New Classes of Bent Functions, Advances in Cryptology\u2014EUROCRYPT\u201993. Proc. Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, Helleseth, T., Ed., Lect. Notes Comp. Sci., vol. 765, Berlin: Springer, 1994, pp. 77\u2013101."},{"issue":"5","key":"1002_CR8","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/18.412693","volume":"41","author":"C. Carlet","year":"1995","unstructured":"Carlet, C., Generalized Partial Spreads, IEEE Trans. Inform. Theory, 1995, vol. 41, no. 5, pp. 1482\u20131487.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"1002_CR9","unstructured":"Carlet, C., A Construction of Bent Functions, in Proc. 7th Joint Swedish-Russian Int. Workshop on Information Theory, St. Petersburg, Russia, 1995, pp. 57\u201359."},{"issue":"1","key":"1002_CR10","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"P.V. Kumar","year":"1985","unstructured":"Kumar, P.V., Sholtz, R.A., and Welch, L.R., Generalized Bent Functions and Their Properties, J. Combin. Theory, Ser. A, 1985, vol. 40, no. 1, pp. 90\u2013107.","journal-title":"J. Combin. Theory, Ser. A"},{"issue":"1","key":"1002_CR11","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/18.42198","volume":"35","author":"H. Chung","year":"1989","unstructured":"Chung, H. and Kumar, P.V., A New General Construction for Generalized Bent Functions, IEEE Trans. Inform. Theory, 1989, vol. 35, no. 1, pp. 206\u2013209.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"1002_CR12","series-title":"Lect. Notes Comp. Sci.","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/3-540-46877-3_13","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201990. Proc. Workshop on the Theory and Application of Cryptographic Techniques, Aarhus, Denmark","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K., Construction of Bent Functions and Difference Sets, Advances in Cryptology\u2014EUROCRYPT\u201990. Proc. Workshop on the Theory and Application of Cryptographic Techniques, Aarhus, Denmark, Damg\u00e5rd, I.B., Ed., Lect. Notes Comp. Sci., vol. 473, Berlin: Springer, 1991, pp. 151\u2013160."},{"issue":"3","key":"1002_CR13","first-page":"50","volume":"6","author":"A.S. Ambrosimov","year":"1994","unstructured":"Ambrosimov, A.S., Properties of Bent Functions of q-Valued Logic over Finite Fields, Diskret. Mat., 1994, vol. 6, no. 3, pp. 50\u201360 [Discrete Math. Appl. (Engl. Transl.), 1994, vol. 4, no. 4, pp. 341\u2013350].","journal-title":"Diskret. Mat."},{"issue":"4","key":"1002_CR14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.4213\/dm498","volume":"9","author":"O.S. Logachev","year":"1997","unstructured":"Logachev, O.S., Sal\u2019nikov, A.A., and Yashchenko, V.V., Bent Functions on a Finite Abelian Group, Diskret. Mat., 1997, vol. 9, no. 4, pp. 3\u201320 [Discrete Math. Appl. (Engl. Transl.), 1997, vol. 7, no. 6, pp. 547\u2013564].","journal-title":"Diskret. Mat."},{"key":"1002_CR15","first-page":"145","volume-title":"Proc. PRAGOCRYPT\u201996","author":"C. Carlet","year":"1996","unstructured":"Carlet, C., Hyper-bent Functions, in Proc. PRAGOCRYPT\u201996, Prague: Czech Tech. Univ. Publ., 1996, pp. 145\u2013155."},{"issue":"3","key":"1002_CR16","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.jcta.2005.04.008","volume":"113","author":"C. Carlet","year":"2006","unstructured":"Carlet, C. and Gaborit, P., Hyper-bent Functions and Cyclic Codes, J. Combin. Theory, Ser. A, 2006, vol. 113, no. 3, pp. 466\u2013482.","journal-title":"J. Combin. Theory, Ser. A"},{"key":"1002_CR17","first-page":"86","volume":"10","author":"A.S. Kuzmin","year":"2007","unstructured":"Kuzmin, A.S., Nechaev, A.A., and Shishkin, V.A., Bent and Hyper-bent Functions over a Field with 2\u2113 Elements, Tr. Diskretn. Mat., 2007, vol. 10, pp. 86\u2013111.","journal-title":"Tr. Diskretn. Mat."},{"key":"1002_CR18","unstructured":"The Cunningham Project, http:\/\/homes.cerias.purdue.edu\/:_ssw\/cun\/index.html."},{"key":"1002_CR19","series-title":"Encyclopedia of Mathematics and Its Applications","volume-title":"Finite Fields","author":"R. Lidl","year":"1983","unstructured":"Lidl, R. and Niederreiter, H., Finite Fields, Encyclopedia of Mathematics and Its Applications, vol. 20, Reading: Addison-Wesley, 1983. Translated under the title Konechnye polya, 2 vols., Moscow: Mir, 1988."},{"key":"1002_CR20","volume-title":"Algebra","author":"M.M. Glukhov","year":"2003","unstructured":"Glukhov, M.M., Elizarov, V.P., and Nechaev A.A., Algebra, Moscow: Gelios ARV, 2003, Part 2."},{"key":"1002_CR21","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J. and Sloane, N.J.A., The Theory of Error-Correcting Codes, Amsterdam: North-Holland, 1977. Translated under the title Teoriya kodov, ispravlyayushchikh oshibki, Moscow: Svyaz\u2019, 1979."}],"container-title":["Problems of Information Transmission"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S003294600801002X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S003294600801002X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S003294600801002X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S003294600801002X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:02:04Z","timestamp":1775008924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S003294600801002X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["1002"],"URL":"https:\/\/doi.org\/10.1134\/s003294600801002x","relation":{},"ISSN":["0032-9460","1608-3253"],"issn-type":[{"value":"0032-9460","type":"print"},{"value":"1608-3253","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"18 June 2007","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2007","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2008","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}