{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:22Z","timestamp":1772283502704,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540576006","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_7","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"65-76","source":"Crossref","is-referenced-by-count":81,"title":["On Almost Perfect Nonlinear Permutations"],"prefix":"10.1007","author":[{"given":"T.","family":"Beth","sequence":"first","affiliation":[]},{"given":"C.","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"E. Biham, A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Advances in Cryptology, Proceedings of Crypt\u201990, Springer-Verlag, 1990."},{"key":"7_CR2","series-title":"Lect Notes Comput Sci","first-page":"156","volume-title":"Crypto\u201991","author":"E. Biham","year":"1991","unstructured":"E. Biham, A. Shamir. Differential Cryptanalysis of Snefru, Khafre, Redoc-II, Lokl and Lucifer. Crypto\u201991, LNCS Vol.576, Springer-Verlag, 1991, pp.156\u2013171."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"D. Chaum, J.H. Evertse. Cryptanalysis of DES with a reduced number of rounds. Advances in Cryptology, Proceedings of Crypto\u201985, Springer-Verlag, 1986, pp.192\u2013211.","DOI":"10.1007\/3-540-39799-X_16"},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology, Eurocrypto\u201991","author":"X. Lai","year":"1991","unstructured":"X. Lai, J.L. Massey, S. Murphy. Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology, Eurocrypto\u201991, LNCS Vol.547, Springer-Verlag, 1991, pp.17\u201338."},{"key":"7_CR5","unstructured":"K. Nyberg, L.R. Knudsen. Provable Security against Differential Cryptanalysis. Advances in Cryptology, Crypto\u201992."},{"key":"7_CR6","unstructured":"J. Pieprzyk. Nonlinearity of Exponent Permutations, Advances in Cryptology, Proc. Eurocrypt\u201989, Springer-Verlag, 1990."},{"key":"7_CR7","unstructured":"K. Nyberg. Differentially uniform mappings for cryptography, Eurocrypt\u201993, this proceedings."},{"key":"7_CR8","unstructured":"C. Carlet. Codes de Reed-Muller, Codes de kerdock et de Preparata, thesis, Publication of LITP, Institut Blaise Pascal, Universit\u00e9 Paris 6, 90.59 (1990)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:37Z","timestamp":1619571037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_7","relation":{},"subject":[]}}