{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T04:07:04Z","timestamp":1742270824645,"version":"3.40.1"},"reference-count":23,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2024046","type":"journal-article","created":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T13:37:27Z","timestamp":1731937047000},"page":"1137-1161","source":"Crossref","is-referenced-by-count":0,"title":["Coset leaders of the first-order Reed-Muller codes in four new classes of Boolean functions"],"prefix":"10.3934","volume":"19","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]},{"given":"Serge","family":"Feukoua","sequence":"additional","affiliation":[{"name":"University of Loughborough, UK"}]},{"given":"Ana","family":"S\u0103l\u0103gean","sequence":"additional","affiliation":[{"name":"University of Loughborough, UK"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2024046-1","unstructured":"<p>A. Barg, Complexity issues in coding theory, in <i>Handbook of Coding Theory<\/i>, North Holland, Amsterdam, (1998), 649-724.<\/p>"},{"key":"key-10.3934\/amc.2024046-2"},{"key":"key-10.3934\/amc.2024046-3","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet and K. Feng, An infinite class of balanced functions with optimumalgebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, <i>Proceedings of ASIACRYPT 2008<\/i>, Lecture Notes in Computer Science, <b>5350<\/b> (2008), 425-440.<\/p>","DOI":"10.1007\/978-3-540-89255-7_26"},{"key":"key-10.3934\/amc.2024046-4","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2020036"},{"key":"key-10.3934\/amc.2024046-5","doi-asserted-by":"publisher","DOI":"10.1007\/s10472-023-09842-5"},{"key":"key-10.3934\/amc.2024046-6","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, S. Feukoua and A. S\u0103l\u0103gean, Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and threshold functions, in: <i>Quaglia, E.A. (eds) Cryptography and Coding. IMACC 2023<\/i>, Lecture Notes in Computer Science, Springer, Cham, <b>14421<\/b> (2024), 17-33.<\/p>","DOI":"10.1007\/978-3-031-47818-5_2"},{"key":"key-10.3934\/amc.2024046-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3139804"},{"key":"key-10.3934\/amc.2024046-8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0145-8"},{"key":"key-10.3934\/amc.2024046-9","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(02)00354-0"},{"key":"key-10.3934\/amc.2024046-10","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6300-x"},{"key":"key-10.3934\/amc.2024046-11","doi-asserted-by":"crossref","unstructured":"<p>H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity, <i>Fast Software Encryption<\/i>, Lecture Notes in Comput. Sci., <b>1008<\/b>, Springer, Berlin, (1995), 61-74.<\/p>","DOI":"10.1007\/3-540-60590-8_5"},{"key":"key-10.3934\/amc.2024046-12","doi-asserted-by":"publisher","DOI":"10.1109\/18.641548"},{"key":"key-10.3934\/amc.2024046-13","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-021-00484-0"},{"key":"key-10.3934\/amc.2024046-14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1970.1054545"},{"key":"key-10.3934\/amc.2024046-15","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/225\/03211"},{"key":"key-10.3934\/amc.2024046-16","unstructured":"<p>F. J. MacWilliams and N. J. Sloane, <i>The Theory of Error-Correcting Codes<\/i>, North Holland, 1983.<\/p>"},{"key":"key-10.3934\/amc.2024046-17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_28"},{"key":"key-10.3934\/amc.2024046-18","unstructured":"<p>Y. Niho, <i>Multi-Valued Cross-Correlation Functions Between Two Maximal Linear Recursive Sequences<\/i>, PhD. dissertation, Univ. Southern Calif., Los Angeles, 1972.<\/p>"},{"key":"key-10.3934\/amc.2024046-19","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"key-10.3934\/amc.2024046-20","doi-asserted-by":"publisher","DOI":"10.1006\/eujc.1994.1044"},{"key":"key-10.3934\/amc.2024046-21","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-014-2224-8"},{"key":"key-10.3934\/amc.2024046-22","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-011-0155-3"},{"key":"key-10.3934\/amc.2024046-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2011.03.012"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T08:24:36Z","timestamp":1742199876000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2024046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2024046","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"type":"print","value":"1930-5346"},{"type":"electronic","value":"1930-5338"}],"subject":[],"published":{"date-parts":[[2025]]}}}