{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T17:25:47Z","timestamp":1692811547556},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,11,4]],"date-time":"2012-11-04T00:00:00Z","timestamp":1351987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s10623-012-9762-7","type":"journal-article","created":{"date-parts":[[2012,11,3]],"date-time":"2012-11-03T02:45:05Z","timestamp":1351910705000},"page":"273-287","source":"Crossref","is-referenced-by-count":3,"title":["Boolean functions with MacWilliams duality"],"prefix":"10.1007","volume":"72","author":[{"given":"Jong Yoon","family":"Hyun","sequence":"first","affiliation":[]},{"given":"Heisook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yoonjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,4]]},"reference":[{"key":"9762_CR1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-48285-7_8","volume":"765","author":"C. Carlet","year":"1994","unstructured":"Carlet C.: Two new classes of bent functions, Advances in cryptology- EUROCRYPT\u201993. Lecture Notes in Computer Science. 765, 77\u2013101 (1994)","journal-title":"Lecture Notes in Computer Science."},{"key":"9762_CR2","volume-title":"Boolean functions for cryptography and error correcting codes in Boolean Methods and Models","author":"C. Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes in Boolean Methods and Models. Cambridge University Press, Cambridge (2010)"},{"key":"9762_CR3","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1504\/IJICOT.2010.032864","volume":"1","author":"C. Carlet","year":"2010","unstructured":"Carlet C., Danielsen L.E., Parker M.G., Sole P.: Self-dual bent functions. Int. J. Inf. Coding Theory. 1, 384\u2013399 (2010)","journal-title":"Int. J. Inf. Coding Theory."},{"issue":"2","key":"9762_CR4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"R. Calderbank","year":"1986","unstructured":"Calderbank R., Kantor W.M.: The geometry of two-weight codes. Bull. London Math. Soc. 18(2), 97\u2013122 (1986)","journal-title":"Bull. London Math. Soc."},{"key":"9762_CR5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"W.G. Huffman","year":"2003","unstructured":"Huffman W.G., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"issue":"3","key":"9762_CR6","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s10623-011-9554-5","volume":"63","author":"J.Y. Hyun","year":"2012","unstructured":"Hyun J.Y., Lee H., Lee Y.: MacWilliams duality and Gleason-type theorem on self-dual bent functions. Des. Codes Cryptogr. 63(3), 295\u2013304 (2012)","journal-title":"Des. Codes Cryptogr."},{"key":"9762_CR7","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s10623-010-9455-z","volume":"59","author":"P. Langevin","year":"2011","unstructured":"Langevin P., Leander G.: Counting all bent functions in dimension eight 9927058926593437030578 5861242880, Des. Codes Cryptogr. 59, 193\u2013205 (2011)","journal-title":"Codes Cryptogr."},{"key":"9762_CR8","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1016\/j.jcta.2008.12.004","volume":"116","author":"G. Leander","year":"2009","unstructured":"Leander G., McGuire G.: Construction of bent functions from near-bent functions. J. Combin. Theory Ser. A 116, 960\u2013970 (2009)","journal-title":"J. Combin. Theory Ser. A"},{"key":"9762_CR9","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1998","unstructured":"MacWilliams F.J., Sloane N.J.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1998)"},{"key":"9762_CR10","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.dam.2006.10.008","volume":"155","author":"Q. Meng","year":"2007","unstructured":"Meng Q., Zhang H., Yang M., Cui J.: On the degree of homogeneous bent functions. Discr. Appl. Math. 155, 665\u2013669 (2007)","journal-title":"Discr. Appl. Math."},{"key":"9762_CR11","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s10623-010-9463-z","volume":"59","author":"A. Pott","year":"2011","unstructured":"Pott A., Tan Y., Feng T., Ling S.: Association schemes arising from bent functions. Des. Codes Cryptogr. 59, 319\u2013331 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"9762_CR12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/S0166-218X(99)00234-6","volume":"102","author":"C. Qu","year":"2000","unstructured":"Qu C., Seberry J., Pieprzyk J.: Homogeneous bent functions. Discr. Appl. Math. 102, 133\u2013139 (2000)","journal-title":"Discr. Appl. Math."},{"key":"9762_CR13","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus O.S.: On bent functions. J. Combin. Theory Ser. A. 20, 300\u2013305 (1976)","journal-title":"J. Combin. Theory Ser. A."},{"key":"9762_CR14","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1016\/j.jcta.2009.05.003","volume":"117","author":"Y. Tan","year":"2010","unstructured":"Tan Y., Pott A., Feng T.: Strongly regular graphs associated with ternary bent functions. J. Combin. Theory Ser. A, 117, 668\u2013682 (2010)","journal-title":"J. Combin. Theory Ser. A"},{"key":"9762_CR15","first-page":"25","volume":"39","author":"J.H. Lint van","year":"1983","unstructured":"van Lint J.H.: Kerdock codes and Preparata codes, Proceedings of the fourteenth Southeastern conference on combinatorics, graph theory and computing (Boca Raton, Fla., 1983). Congr. Numer. 39, 25\u201341 (1983)","journal-title":"Congr. Numer."},{"key":"9762_CR16","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.dam.2004.02.006","volume":"142","author":"T. Xia","year":"2004","unstructured":"Xia T., Seberry J., Pieprzyk J., Charnes C.: Homogeneous bent functions of degree n in 2n variables do not exist for n\u00a0>\u00a03. Discr. Appl. Math. 142, 127\u2013132 (2004)","journal-title":"Discr. Appl. Math."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9762-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9762-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9762-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:35Z","timestamp":1559246315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9762-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,4]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["9762"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9762-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,4]]}}}
  NODES
Association 1
Note 2