{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T22:47:06Z","timestamp":1777416426148,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_32","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"378-386","source":"Crossref","is-referenced-by-count":256,"title":["Perfect nonlinear S-boxes"],"prefix":"10.1007","author":[{"given":"Kaisa","family":"Nyberg","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"C. M. Adams and S. E. Tavares, The use of bent sequences to achieve higher-order strict avalanche criterion in S-box design, IEE Proceedings (to appear)."},{"key":"32_CR2","unstructured":"E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Proceedings of Crypto\u2019 90 (to appear)."},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"D. Chaum and J. H. Evertse, Cryptanalysis of DES with a reduced number of rounds, Advances in Cryptology, Proceedings of Crypto\u2019 85, Springer-Verlag 1986, 192\u2013211.","DOI":"10.1007\/3-540-39799-X_16"},{"key":"32_CR4","unstructured":"M. H. Dawson and S. E. Tavares, An expanded set of s-box design criteria based on information theory and its relation to differential-like attacks, These Proceedings."},{"key":"32_CR5","volume-title":"Latin squares and their applications","author":"J. Denes","year":"1974","unstructured":"J. Denes and A. D. Keedwell, \u201cLatin squares and their applications,\u201d The English Universities Press Ltd, London, 1974."},{"key":"32_CR6","unstructured":"J. F. Dillon, Elementary Hadamard difference sets, Proceedings of the Sixth Southeastern Conference on Combinatorics, Graph Theory and Computing, Boca Raton, Florida (1975), 237\u2013249; Congressus Numerantium No. XIV, Utilitas Math., Winnipeg, Manitoba (1975)."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"P. V. Kumar","year":"1985","unstructured":"P. V. Kumar, R. A. Scholtz and L. R. Welch, Generalized bent functions and their properties, J. Combinatorial Theory, Ser. A 40 (1985), 90\u2013107.","journal-title":"J. Combinatorial Theory"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TIT.1982.1056590","volume":"IT-28","author":"A. Lempel","year":"1982","unstructured":"A. Lempel and M. Cohn, Maximal families of bent sequences, IEEE Trans. Inform. Theory IT-28 (1982), 865\u2013868.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"32_CR9","volume-title":"Finite fields. Encyclopedia of Mathematics and its applications, Vol. 20","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter, \u201cFinite fields. Encyclopedia of Mathematics and its applications, Vol. 20,\u201d Addison-Wesley, Reading, Massachusetts, 1983."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1214\/aoms\/1177731539","volume":"13","author":"H. B. Mann","year":"1942","unstructured":"H. B. Mann, The construction of orthogonal Latin squares, Ann. Math. Statist. 13 (1942), 418\u2013423.","journal-title":"Ann. Math. Statist."},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0097-3165(73)90031-9","volume":"15","author":"R. L. McFarland","year":"1973","unstructured":"R. L. McFarland, A family of difference sets in non-cyclic groups, J. Combinatorial Theory, Ser. A 15 (1973), 1\u201310.","journal-title":"J. Combinatorial Theory"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach, Nonlinearity criteria for cryptographic functions, Proceedings of Eurocrypt\u2019 89, Springer 1990, 549\u2013562.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"K. Nyberg, Constructions of bent functions and difference sets, Proceedings of Eurocrypt\u2019 90, Springer-Verlag 1991, 151\u2013160.","DOI":"10.1007\/3-540-46877-3_13"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"B. Preneel et al., Propagation characteristics of Boolean bent functions, Proceedings of Eurocrypt\u2019 90, Springer-Verlag 1991, 161\u2013173.","DOI":"10.1007\/3-540-46877-3_14"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus, On \u201cbent\u201d functions, J. Combinatorial Theory, Ser. A 20 (1976), 300\u2013305.","journal-title":"J. Combinatorial Theory"},{"key":"32_CR16","unstructured":"R. A. Rueppel, Stream Ciphers, in \u201cContemporary Cryptology: The Science of Information Integrity,\u201d edited by Gustavus Simmons, IEEE Press (to appear)."},{"key":"32_CR17","first-page":"112","volume":"136","author":"R. Yarlagadda","year":"1989","unstructured":"R. Yarlagadda and J. E. Hershey, Analysis and synthesis of bent sequences, IEE Proceedings 136 (1989), 112\u2013123.","journal-title":"IEE Proceedings"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:28Z","timestamp":1605647488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_32","relation":{},"subject":[]}}