{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:59:41Z","timestamp":1778065181411,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540576006","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_6","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"55-64","source":"Crossref","is-referenced-by-count":473,"title":["Differentially uniform mappings for cryptography"],"prefix":"10.1007","author":[{"given":"Kaisa","family":"Nyberg","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, J. Cryptology 4 (1991).","DOI":"10.1007\/BF00630563"},{"key":"6_CR2","unstructured":"C. Carlet, Codes de Reed-Muller, codes de Kerdock et de Preparata, thesis, Publication of LITP, Institut Blaise Pascal, Univereit\u00e9 Paris 6, 90.59 (1990)."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1215\/S0012-7094-57-02406-7","volume":"24","author":"L. Carlitz","year":"1957","unstructured":"L. Carlitz and S. Uchiyama, Bounds for exponential sums, Duke Math. J. 24 (1957), 37\u201341.","journal-title":"Duke Math. J."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Eurocrypt\u2019 91","author":"X. Lai","year":"1992","unstructured":"X. Lai, J. L. Massey and S. Murphy, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology-Eurocrypt\u2019 91. Lecture Notes in Computer Science 547, Springer-Verlag (1992)."},{"key":"6_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_39","volume-title":"Advances in Cryptology-Eurocrypt\u2019 88","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai, Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. Advances in Cryptology-Eurocrypt\u2019 88. Lecture Notes in Computer Science 330, Springer-Verlag (1988)."},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advances in Cryptology-Eurocrypt\u2019 92","author":"K. Nyberg","year":"1993","unstructured":"K. Nyberg, On the construction of highly nonlinear permutations, Advances in Cryptology-Eurocrypt\u2019 92. Lecture Notes in Computer Science 658, Springer-Verlag (1993)."},{"key":"6_CR7","unstructured":"K. Nyberg and L. R. Knudsen, Provable Security Against Differential Cryptanalysis, Proceedings of Crypto\u2019 92 (to appear)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:36Z","timestamp":1619571036000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_6","relation":{},"subject":[]}}