{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T18:06:46Z","timestamp":1708538806911},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100013066","name":"Key Scientific Research Project of Colleges and Universities in Henan Province","doi-asserted-by":"publisher","award":["21A413003"],"id":[{"id":"10.13039\/501100013066","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502147"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10623-022-01169-2","type":"journal-article","created":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T14:04:42Z","timestamp":1672149882000},"page":"1559-1580","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus\u2019s bent function"],"prefix":"10.1007","volume":"91","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1410-6984","authenticated-orcid":false,"given":"Sihong","family":"Su","sequence":"first","affiliation":[]},{"given":"Xiaoqi","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,27]]},"reference":[{"issue":"8","key":"1169_CR1","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A Canteaut","year":"2003","unstructured":"Canteaut A., Charpin P.: Decomposing bent functions. IEEE Trans. Inf. Theory 49(8), 2004\u20132019 (2003).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1169_CR2","first-page":"77","volume-title":"Advances in CryptologyEUROCRYPT (Lecture Notes in Computer Science)","author":"C Carlet","year":"1994","unstructured":"Carlet C.: Two new classes of bent functions. In: Helleseth T. (ed.) Advances in CryptologyEUROCRYPT (Lecture Notes in Computer Science), vol. 765, pp. 77\u2013101. Springer, Berlin (1994)."},{"key":"1169_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-0348-7865-4_1","volume-title":"Proceedings of Workshop in Coding, Cryptography Combinatorics","author":"C Carlet","year":"2004","unstructured":"Carlet C.: On the secondary constructions of resilient and bent functions. In: Feng K., Niederreiter H., Xing C. (eds.) Proceedings of Workshop in Coding, Cryptography Combinatorics, pp. 3\u201328. Birkhauser, Basel (2004)."},{"key":"1169_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. In: Crama Y., Hammer P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)."},{"issue":"1","key":"1169_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet C., Mesnager S.: Four decades of research on bent functions. Des. Codes Cryptogr. 78(1), 5\u201350 (2016).","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"1169_CR6","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1504\/IJICOT.2010.032864","volume":"1","author":"C Carlet","year":"2010","unstructured":"Carlet C., Danielsen L.E., Parker M.G., Sol\u00e9 P.: Self-dual bent functions. Int. J. Inform. Coding Theory 1(4), 384\u2013399 (2010).","journal-title":"Int. J. Inform. Coding Theory"},{"key":"1169_CR7","unstructured":"Carlet, C., Helleseth, T., Kholosha, A., Mesnager, S.: On the dual of bent functions with $$2^r$$ Niho exponents. In: Proceedings of IEEE ISIT, Aug (2011), pp. 703\u2013707."},{"issue":"3","key":"1169_CR8","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3934\/amc.2012.6.305","volume":"6","author":"C Carlet","year":"2012","unstructured":"Carlet C., Zhang F., Hu Y.: Secondary constructions of bent functions and their enforcement. Adv. Math. Commun. 6(3), 305\u2013314 (2012).","journal-title":"Adv. Math. Commun."},{"key":"1169_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-642-10868-6_25","volume-title":"Cryptography and Coding","author":"L Danielsen","year":"2009","unstructured":"Danielsen L., Parker M., Sol\u00e9 P.: The Rayleigh quotient of bent functions. In: Cryptography and Coding, vol. 5921, pp. 418\u2013432. Lecture Notes in Computer Science. Springer, Berlin (2009)."},{"key":"1169_CR10","unstructured":"Dillon J.: Elementary Hadamard difference sets, Ph.D. dissertation, Department of Mathematics, University of Maryland, College Park, MD, USA (1974)."},{"key":"1169_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-60590-8_5","volume-title":"Fast Software Encryption","author":"H Dobbertin","year":"1994","unstructured":"Dobbertin H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Fast Software Encryption, vol. 1008, pp. 61\u201374. Lecture Notes in Computer Science. Springer, Berlin (1994)."},{"key":"1169_CR12","doi-asserted-by":"crossref","unstructured":"Hodz\u0306\u0107 S., Pasalic E., Wei Y.: A general framework for secondary constructions of bent and plateaued functions, Des. Codes Cryptogr. 88, 2007\u20132035 (2020).","DOI":"10.1007\/s10623-020-00760-9"},{"issue":"6","key":"1169_CR13","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1007\/s12095-021-00528-5","volume":"13","author":"N Kolomeec","year":"2021","unstructured":"Kolomeec N.: Some general properties of modified bent functions through addition of indicator functions. Cryptogr. Commun. 13(6), 909\u2013926 (2021).","journal-title":"Cryptogr. Commun."},{"issue":"4","key":"1169_CR14","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1016\/j.jcta.2008.12.004","volume":"116","author":"G Leander","year":"2009","unstructured":"Leander G., Mcguire G.: Construction of bent functions from near-bent functions. J. Comb. Theory A 116(4), 960\u2013970 (2009).","journal-title":"J. Comb. Theory A"},{"key":"1169_CR15","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)."},{"issue":"7","key":"1169_CR16","doi-asserted-by":"publisher","first-page":"4397","DOI":"10.1109\/TIT.2014.2320974","volume":"60","author":"S Mesnager","year":"2014","unstructured":"Mesnager S.: Several new infinite families of bent functions and their duals. IEEE Trans. Inf. Theory 60(7), 4397\u20134407 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1169_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s12095-015-0144-7","volume":"8","author":"S Mesnager","year":"2016","unstructured":"Mesnager S.: Further constructions of infinite families of bent functions from new permutations and their duals. Cryptogr. Commun. 8(2), 229\u2013246 (2016).","journal-title":"Cryptogr. Commun."},{"issue":"2","key":"1169_CR18","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3934\/amc.2017027","volume":"11","author":"S Mesnager","year":"2017","unstructured":"Mesnager S., Zhang F., Yong Z.: On construction of bent functions involving symmetric functions and their duals. Adv. Math. Commun. 11(2), 347\u2013352 (2017).","journal-title":"Adv. Math. Commun."},{"issue":"3","key":"1169_CR19","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u2018bent\u2019 functions. J. Comb. Theory A 20(3), 300\u2013305 (1976).","journal-title":"J. Comb. Theory A"},{"issue":"5","key":"1169_CR20","doi-asserted-by":"publisher","first-page":"3277","DOI":"10.1109\/TIT.2020.2964532","volume":"66","author":"S Su","year":"2020","unstructured":"Su S.: Systematic methods of constructing bent functions and 2-rotation symmetric bent functions. IEEE Trans. Inf. Theory 66(5), 3277\u20133291 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"1169_CR21","doi-asserted-by":"publisher","first-page":"4658","DOI":"10.1109\/TIT.2016.2621751","volume":"63","author":"S Su","year":"2017","unstructured":"Su S., Tang X.: Systematic constructions of rotation symmetric bent functions, 2-rotation symmetric bent functions, and bent idempotent functions. IEEE Trans. Inf. Theory 63(7), 4658\u20134667 (2017).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"1169_CR22","doi-asserted-by":"publisher","first-page":"609","DOI":"10.3934\/amc.2011.5.609","volume":"5","author":"N Tokareva","year":"2011","unstructured":"Tokareva N.: On the number of bent functions from iterative constructions: lower bounds and hypotheses. Adv. Math. Commun. 5(4), 609\u2013621 (2011).","journal-title":"Adv. Math. Commun."},{"issue":"8","key":"1169_CR23","doi-asserted-by":"publisher","first-page":"5336","DOI":"10.1109\/TIT.2017.2712598","volume":"63","author":"F Zhang","year":"2017","unstructured":"Zhang F., Pasalic E., Wei Y., Cepak N.: Constructing bent functions outside the Maiorana\u2013McFarland class using a general form of Rothaus. IEEE Trans. Inf. Theory 63(8), 5336\u20135349 (2017).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01169-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01169-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01169-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T07:05:08Z","timestamp":1680678308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01169-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,27]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1169"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01169-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,27]]},"assertion":[{"value":"17 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}