{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:52:48Z","timestamp":1705186368065},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Russian Foundation for Basic Research","award":["18-07-01394"]},{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["18-31-00374"],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003443","name":"Ministry of Education and Science of the Russian Federation","doi-asserted-by":"publisher","award":["1.12875.2018\/12.1"],"id":[{"id":"10.13039\/501100003443","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003182","name":"Siberian Branch, Russian Academy of Sciences","doi-asserted-by":"publisher","award":["0314-2016-0017"],"id":[{"id":"10.13039\/501100003182","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s10623-019-00678-x","type":"journal-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T19:15:05Z","timestamp":1569525305000},"page":"201-222","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Metrical properties of self-dual bent functions"],"prefix":"10.1007","volume":"88","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5006-1248","authenticated-orcid":false,"given":"Aleksandr","family":"Kutsenko","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,26]]},"reference":[{"issue":"8","key":"678_CR1","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A Canteaut","year":"2003","unstructured":"Canteaut A., Charpin P.: Decomposing bent functions. IEEE Trans. Inf. Theory 49(8), 2004\u20132019 (2003).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"678_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting code. In: Crama Y., Hammer P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)."},{"key":"678_CR3","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1504\/IJICOT.2010.032864","volume":"1","author":"C Carlet","year":"2010","unstructured":"Carlet C., Danielson L.E., Parker M.G., Sol\u00e9 P.: Self-dual bent functions. Int. J. Inform. Coding Theory 1, 384\u2013399 (2010).","journal-title":"Int. J. Inform. Coding Theory"},{"issue":"1","key":"678_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet C., Mesnager S.: Four decades of research on bent functions. J. Des. Codes Cryptogr. 78(1), 5\u201350 (2016).","journal-title":"J. Des. Codes Cryptogr."},{"key":"678_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/701298","volume":"2014","author":"Joan-Josep Climent","year":"2014","unstructured":"Climent J.-J., Garcia F.J., Requena V.: A construction of bent functions of $$n+2$$ variables from a bent function of $$n$$ variables and its cyclic shifts. Algebra. \nhttps:\/\/doi.org\/10.1155\/2014\/701298\n\n (2014).","journal-title":"Algebra"},{"key":"678_CR6","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick T.W., St\u0103nic\u0103 P.: Cryptographic Boolean Functions and Applications. Academic Press, London (2017)."},{"key":"678_CR7","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-642-10868-6_25","volume-title":"Cryptography and Coding","author":"Lars Eirik Danielsen","year":"2009","unstructured":"Danielsen L.E., Parker M.G., Sol\u00e9 P.: The Rayleigh Quotient of Bent Functions. Springer Lecture Notes in Computer Science, vol. 5921, pp. 418\u2013432. Springer, Berlin (2009)."},{"key":"678_CR8","unstructured":"Dillon J.: Elementary Hadamard difference sets. PhD. dissertation, Univ. Maryland, College Park (1974)."},{"issue":"1","key":"678_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s10623-012-9740-0","volume":"68","author":"T Feulner","year":"2013","unstructured":"Feulner T., Sok L., Sol\u00e9 P., Wassermann A.: Towards the classification of self-dual bent functions in eight variables. Des. Codes Cryptogr. 68(1), 395\u2013406 (2013).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"678_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10623-011-9544-7","volume":"63","author":"X-D Hou","year":"2012","unstructured":"Hou X.-D.: Classification of self dual quadratic bent functions. Des. Codes Cryptogr. 63(2), 183\u2013198 (2012).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"678_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10623-011-9554-5","volume":"63","author":"JY Hyun","year":"2012","unstructured":"Hyun J.Y., Lee H., Lee Y.: MacWilliams duality and Gleason-type theorem on self-dual bent functions. Des. Codes Cryptogr. 63(3), 295\u2013304 (2012).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"678_CR12","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.ffa.2006.05.001","volume":"13","author":"GJ Janusz","year":"2007","unstructured":"Janusz G.J.: Parametrization of self-dual codes by orthogonal matrices. Finite Fields Appl. 13(3), 450\u2013491 (2007).","journal-title":"Finite Fields Appl."},{"issue":"3","key":"678_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-016-0306-4","volume":"85","author":"NA Kolomeec","year":"2017","unstructured":"Kolomeec N.A.: The graph of minimal distances of bent functions and its properties. Des. Codes Cryptogr. 85(3), 1\u201316 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"678_CR14","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1134\/S1990478918010106","volume":"12","author":"AV Kutsenko","year":"2018","unstructured":"Kutsenko A.V.: The Hamming distance spectrum between self-dual Maiorana\u2013McFarland bent functions. J. Appl. Ind. Math. 12(1), 112\u2013125 (2018).","journal-title":"J. Appl. Ind. Math."},{"key":"678_CR15","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1090\/conm\/461\/08993","volume":"461","author":"P Langevin","year":"2008","unstructured":"Langevin P., Leander G., McGuire G.: Kasami bent function are not equivalent to their duals. Finite Fields Appl. 461, 187\u2013197 (2008).","journal-title":"Finite Fields Appl."},{"issue":"6","key":"678_CR16","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1007\/s12095-019-00371-9","volume":"11","author":"Gaojun Luo","year":"2019","unstructured":"Luo G., Cao X., Mesnager S.: Several new classes of self-dual bent functions derived from involutions. Cryptogr. Commun. \nhttps:\/\/doi.org\/10.1007\/s12095-019-00371-9\n\n (2019).","journal-title":"Cryptography and Communications"},{"issue":"7","key":"678_CR17","doi-asserted-by":"publisher","first-page":"4397","DOI":"10.1109\/TIT.2014.2320974","volume":"60","author":"S Mesnager","year":"2014","unstructured":"Mesnager S.: Several new infinite families of bent functions and their duals. IEEE Trans. Inf. Theory 60(7), 4397\u20134407 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"678_CR18","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager S.: Bent Functions: Fundamentals and Results, p. 544. Springer, Berlin (2016)."},{"issue":"3","key":"678_CR19","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1134\/S1990478916030108","volume":"10","author":"AK Oblaukhov","year":"2016","unstructured":"Oblaukhov A.K.: Metric complements to subspaces in the Boolean cube. J. Appl. Ind. Math. 10(3), 397\u2013403 (2016).","journal-title":"J. Appl. Ind. Math."},{"issue":"4","key":"678_CR20","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s12095-018-0326-1","volume":"11","author":"AK Oblaukhov","year":"2019","unstructured":"Oblaukhov A.K.: A lower bound on the size of the largest metrically regular subset of the Boolean cube. Cryptogr. Commun. 11(4), 777\u2013791 (2019).","journal-title":"Cryptogr. Commun."},{"key":"678_CR21","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-46877-3_14","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201990","author":"Bart Preneel","year":"1991","unstructured":"Preneel B., Van Leekwijck W., Van Linden L., Govaerts R., Vandewalle J.: Propagation characteristics of Boolean functions. In: Advances in Cryptology-EUROCRYPT. Lecture Notes in Computer Science, vol. 473, pp. 161\u2013173. Springer, Berlin (1990)."},{"issue":"3","key":"678_CR22","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On bent functions. J. Comb. Theory Ser. A 20(3), 300\u2013305 (1976).","journal-title":"J. Comb. Theory Ser. A"},{"issue":"2","key":"678_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s12095-017-0216-y","volume":"10","author":"L Sok","year":"2017","unstructured":"Sok L., Shi M., Sol\u00e9 P.: Classification and construction of quaternary self-dual bent functions. Cryptogr. Commun. 10(2), 277\u2013289 (2017).","journal-title":"Cryptogr. Commun."},{"key":"678_CR24","first-page":"181","volume":"107","author":"P St\u0103nic\u0103","year":"2018","unstructured":"St\u0103nic\u0103 P., Sasao T., Butler J.T.: Distance duality on some classes of Boolean functions. J. Comb. Math. Comb. Comput. 107, 181\u2013198 (2018).","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"678_CR25","volume-title":"Bent Functions, Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva N.: Bent Functions, Results and Applications to Cryptography. Academic Press, London (2015)."},{"issue":"5","key":"678_CR26","first-page":"655","volume":"20","author":"NN Tokareva","year":"2010","unstructured":"Tokareva N.N.: The group of automorphisms of the set of bent functions. Discret. Math. Appl. 20(5), 655\u2013664 (2010).","journal-title":"Discret. Math. Appl."},{"issue":"4","key":"678_CR27","doi-asserted-by":"publisher","first-page":"609","DOI":"10.3934\/amc.2011.5.609","volume":"5","author":"NN Tokareva","year":"2011","unstructured":"Tokareva N.N.: On the number of bent functions from iterative constructions: lower bounds and hypotheses. Adv. Math. Commun. 5(4), 609\u2013621 (2011).","journal-title":"Adv. Math. Commun."},{"key":"678_CR28","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.disc.2011.06.017","volume":"312","author":"N Tokareva","year":"2012","unstructured":"Tokareva N.: Duality between bent functions and affine functions. Discret. Math. 312, 666\u2013670 (2012).","journal-title":"Discret. Math."},{"key":"678_CR29","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-642-21518-6_28","volume-title":"Information Security and Cryptology","author":"Qichun Wang","year":"2011","unstructured":"Wang Q., Johansson T.: A note on fast algebraic attacks and higher order nonlinearities. In: International Conference on Information Security and Cryptology, Inscrypt 2010, pp. 404\u2013414 (2010)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00678-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-019-00678-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00678-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T23:29:26Z","timestamp":1600990166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-019-00678-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["678"],"URL":"https:\/\/doi.org\/10.1007\/s10623-019-00678-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,26]]},"assertion":[{"value":"8 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}