{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:07:43Z","timestamp":1750219663032,"version":"3.41.0"},"reference-count":30,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2017,1]]},"abstract":"<jats:p>Inspired by a recent work of Mesnager, we present several infinite families of quadratic ternary bent, near-bent and 2-plateaued functions from some known quadratic ternary bent functions. Meanwhile, the distributions of the Walsh spectrum of two classes of 2-plateaued functions obtained in this paper are completely determined.<\/jats:p>","DOI":"10.1142\/s0129054117500010","type":"journal-article","created":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T06:21:41Z","timestamp":1490163701000},"page":"1-18","source":"Crossref","is-referenced-by-count":6,"title":["Several Classes of Quadratic Ternary Bent, Near-Bent and 2-Plateaued Functions"],"prefix":"10.1142","volume":"28","author":[{"given":"Guangkui","family":"Xu","sequence":"first","affiliation":[{"name":"Department of Mathematics, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P. R. China"},{"name":"Department of Applied Mathematics, Huainan Normal University, Huainan 232038, P. R. China"}]},{"given":"Xiwang","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P. R. China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, P. R. China"}]},{"given":"Shanding","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P. R. China"},{"name":"Department of Mathematics and Physics, Nanjing Institute of Technology, Nanjing 211167, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2017,3,21]]},"reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054115500306"},{"key":"p_2","first-page":"1","author":"Carlet C.","year":"2006","journal-title":"Springer"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_6"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcta.2011.06.005"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0145-8"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2013.06.001"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcta.2011.10.002"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858929"},{"key":"p_10","first-page":"105","author":"Chee S.","year":"1995","journal-title":"Springer"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1017\/S0004972700020578"},{"key":"p_13","first-page":"1","volume":"2004","author":"Dobbertin H.","year":"2005","journal-title":"Sequences and Their Applications-SETA"},{"key":"p_14","first-page":"49","author":"Helleseth T.","year":"1999","journal-title":"Springer"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872854"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2055130"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2199736"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6345-x"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(85)90049-4"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2229782"},{"key":"p_21","doi-asserted-by":"publisher","DOI":"10.1007\/s10440-007-9181-3"},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1109\/18.144728"},{"key":"p_23","first-page":"386","author":"Matsui M.","year":"1994","journal-title":"Advances in Cryptology-EUROCRYPT93, Springer"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9460-2"},{"key":"p_25","first-page":"243","author":"Mesnager S.","year":"2013","journal-title":"Springer"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2320974"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2013.03.003"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0145-6"},{"key":"p_34","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-013-0202-3"},{"issue":"4","key":"p_35","doi-asserted-by":"crossref","first-page":"767","DOI":"10.23919\/CJE.2014.10851988","volume":"23","author":"Zheng D.","year":"2014","journal-title":"Chinese J. Electron."},{"key":"p_37","first-page":"60","volume":"24","author":"Zheng Y.","year":"1999","journal-title":"Lecture Notes in Computer Science"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054117500010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T15:34:09Z","timestamp":1750174449000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054117500010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":30,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2017,3,21]]},"published-print":{"date-parts":[[2017,1]]}},"alternative-id":["10.1142\/S0129054117500010"],"URL":"https:\/\/doi.org\/10.1142\/s0129054117500010","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}