{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:07:07Z","timestamp":1772806027623,"version":"3.50.1"},"reference-count":12,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017026","type":"journal-article","created":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T16:14:39Z","timestamp":1494346479000},"page":"339-345","source":"Crossref","is-referenced-by-count":17,"title":["On constructions of bent, semi-bent and five valued spectrum functions from old bent functions"],"prefix":"10.3934","volume":"11","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"given":"Fengrong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, Jiangsu 221116, China"},{"name":"Department of Mathematics, University of Paris \u2167 and Paris \u2169\u2162, LAGA, UMR 7539, CNRS, Sorbonne Paris Cit\u00e9"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017026-1","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, A construction of bent functions, in <i>Finite Fields and Applications<\/i>, London Math. Soc. , 1996, 47-58.<\/p>","DOI":"10.1017\/CBO9780511525988.006"},{"key":"key-10.3934\/amc.2017026-2","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, On the secondary constructions of resilient and bent functions, in <i>Proc. WorkshopCoding Crypt. Combin. 2003<\/i>, Birkh\u00e4user Verlag, 2004, 3-28.<\/p>","DOI":"10.1007\/978-3-0348-7865-4_1"},{"key":"key-10.3934\/amc.2017026-3","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, On bent and highly nonlinear balanced\/resilient functions and their algebraic immunities, in <i>Proc. AAECC 16<\/i>, 2006, 1-28.<\/p>","DOI":"10.1007\/11617983_1"},{"key":"key-10.3934\/amc.2017026-4","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, Boolean functions for cryptography and error correcting codes, in <i>Boolean Modelsand Methods in Mathematics, Computer Science, and Engineering<\/i> (eds. Y. Crama and P. Hammer), 2010,257-397.<\/p>","DOI":"10.1017\/CBO9780511780448.011"},{"key":"key-10.3934\/amc.2017026-5","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0145-8"},{"key":"key-10.3934\/amc.2017026-6","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2012.6.305"},{"key":"key-10.3934\/amc.2017026-7","unstructured":"<p>J. Dillon,  <i>Elementary Hadamard Difference Sets<\/i>, Ph. D thesis, Univ. Maryland, College Park, 1974.<\/p>"},{"key":"key-10.3934\/amc.2017026-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2420118"},{"key":"key-10.3934\/amc.2017026-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2320974"},{"key":"key-10.3934\/amc.2017026-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8"},{"key":"key-10.3934\/amc.2017026-11"},{"key":"key-10.3934\/amc.2017026-12","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-016-0287-6"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_2_339.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:59:13Z","timestamp":1772791153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017026","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}