{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:42:19Z","timestamp":1726497739296},"reference-count":16,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":1461,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61070215","60803156"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"open research fund of State Key Laboratory of Information Security","award":["01-07)"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Mathematical and Computer Modelling"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1016\/j.mcm.2011.02.008","type":"journal-article","created":{"date-parts":[[2011,2,19]],"date-time":"2011-02-19T09:52:32Z","timestamp":1298109152000},"page":"142-150","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the number of rotation symmetric functions over G<\/mml:mi>F<\/mml:mi>(<\/mml:mo>p<\/mml:mi>)<\/mml:mo><\/mml:mrow><\/mml:math>"],"prefix":"10.1016","volume":"55","author":[{"given":"Shaojing","family":"Fu","sequence":"first","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Deshuai","family":"Dong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.mcm.2011.02.008_br000005","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/S0012-365X(02)00354-0","article-title":"Fast evaluation, weights and nonlinearity of rotation-symmetric functions","volume":"258","author":"Cusick","year":"2002","journal-title":"Discrete Mathematics"},{"key":"10.1016\/j.mcm.2011.02.008_br000010","first-page":"2398","article-title":"Results on rotation symmetric bent functions","volume":"309","author":"Dalai","year":"2009","journal-title":"Discrete Applied Mathematics"},{"key":"10.1016\/j.mcm.2011.02.008_br000015","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.dam.2008.06.022","article-title":"On the weight and nonlinearity of homogeneous rotation symmetric Boolean functions of degree 2","volume":"157","author":"Kim","year":"2008","journal-title":"Discrete Applied Mathematics"},{"key":"10.1016\/j.mcm.2011.02.008_br000020","unstructured":"A. Maximov, M. Hell, S. Maitra, Plateaued rotation symmetric boolean functions on odd number of variables, in: First Workshop on Boolean Functions BFCA 05, 2005, pp. 83\u2013104."},{"key":"10.1016\/j.mcm.2011.02.008_br000025","series-title":"Fast Software Encryption Workshop FSE 2004","first-page":"161","article-title":"Results on rotation symmetric bent and correlation immune Boolean functions","volume":"vol. 3017","author":"Stanica","year":"2004"},{"key":"10.1016\/j.mcm.2011.02.008_br000030","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1016\/j.dam.2007.04.029","article-title":"Rotation symmetric Boolean functions-count and cryptographic properties","volume":"156","author":"Stanica","year":"2008","journal-title":"Discrete Applied Mathematics"},{"issue":"3","key":"10.1016\/j.mcm.2011.02.008_br000035","first-page":"267","article-title":"Construction of rotation symmetric Boolean functions with optimal algebraic immunity","volume":"12","author":"Sarkar","year":"2009","journal-title":"Computation Systems"},{"key":"10.1016\/j.mcm.2011.02.008_br000040","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TIT.2003.814489","article-title":"Resilient functions over finite fields","volume":"49","author":"Hu","year":"2003","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.mcm.2011.02.008_br000045","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/18.669323","article-title":"Correlation-immune functions over finite fields","volume":"44","author":"Liu","year":"1998","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.mcm.2011.02.008_br000050","doi-asserted-by":"crossref","first-page":"3066","DOI":"10.1109\/TIT.2003.818388","article-title":"New results on the nonexistence of generalized bent functions","volume":"49","author":"Feng","year":"2003","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.mcm.2011.02.008_br000055","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1515\/JMC.2007.005","article-title":"Strict avalanche criterion over finite fields","volume":"1","author":"Li","year":"2007","journal-title":"Journal of Mathematical Cryptology"},{"key":"10.1016\/j.mcm.2011.02.008_br000060","series-title":"INDOCRYPT 2004","first-page":"84","article-title":"Algebraic Attacks over GF(q)","volume":"vol. 3348","author":"Batten","year":"2004"},{"key":"10.1016\/j.mcm.2011.02.008_br000065","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/TIT.2007.915920","article-title":"Balanced symmetric functions over GF(p)","volume":"54","author":"Cusick","year":"2008","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"10.1016\/j.mcm.2011.02.008_br000070","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1016\/j.ins.2008.10.003","article-title":"Improve lower bound on the number of balanced symmetric functions over GF(p)","volume":"179","author":"Ke","year":"2009","journal-title":"Information Sciences"},{"key":"10.1016\/j.mcm.2011.02.008_br000075","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.ins.2007.03.031","article-title":"Results on rotation symmetric polynomials over GF(p)","volume":"1178","author":"Li","year":"2008","journal-title":"Information Sciences"},{"key":"10.1016\/j.mcm.2011.02.008_br000080","series-title":"Cryptology And Network Security CANS 2008","first-page":"278","article-title":"Enumeration of homogeneous rotation symmetric functions over GF(p)","volume":"vol. 5339","author":"Fu","year":"2008"}],"container-title":["Mathematical and Computer Modelling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0895717711000987?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0895717711000987?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T11:43:09Z","timestamp":1660304589000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0895717711000987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["S0895717711000987"],"URL":"https:\/\/doi.org\/10.1016\/j.mcm.2011.02.008","relation":{},"ISSN":["0895-7177"],"issn-type":[{"type":"print","value":"0895-7177"}],"subject":[],"published":{"date-parts":[[2012,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the number of rotation symmetric functions over","name":"articletitle","label":"Article Title"},{"value":"Mathematical and Computer Modelling","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.mcm.2011.02.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2011 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}