{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:20Z","timestamp":1725488780565},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_35","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"383-396","source":"Crossref","is-referenced-by-count":11,"title":["Pitfalls in Designing Substitution Boxes"],"prefix":"10.1007","author":[{"given":"Jennifer","family":"Seberry","sequence":"first","affiliation":[]},{"given":"Xian-Mo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0020-0190(92)90258-W","volume":"41","author":"C. M. Adams","year":"1992","unstructured":"Adams, C. M.: On immunity against Biham and Shamir\u2019s \u201cdifferential cryptanalysis\u201d. Information Processing Letters 41 (1992) 77\u201380","journal-title":"Information Processing Letters"},{"key":"35_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-48285-7_7","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"T. Beth","year":"1994","unstructured":"Beth, T., Ding, C.: On permutations against differential cryptanalysis. In Advances in Cryptology-EUROCRYPT\u201993 (1994) vol. 765, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 65\u201376"},{"issue":"1","key":"35_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology Vol. 4, No. 1 (1991) 3\u201372","journal-title":"Journal of Cryptology"},{"key":"35_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag New York, Heidelberg, Tokyo 1993"},{"key":"35_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-57332-1_3","volume-title":"Advances in Cryptology-ASIACRYPT\u201991","author":"L. Brown","year":"1993","unstructured":"Brown, L., Kwan, M., Pieprzyk, J., Seberry, J.: Improving resistance to differential cryptanalysis and the redesign of LOKI. In Advances in Cryptology-ASIACRYPT\u201991 (1993) vol. 739, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 36\u201350"},{"key":"35_CR6","unstructured":"Dillon, J. F.: A survey of bent functions. The NSA Technical Journal (1972) 191\u2013215"},{"key":"35_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In Advances in Cryptology-EUROCRYPT\u201993 (1994) vol. 765, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 386\u2013397"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher (II). In Proceedings of 1994 Symposium on Cryptography and Information Security (Japan, 1994)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"35_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology-EUROCRYPT\u201991","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect nonlinear S-boxes. In Advances in Cryptology-EUROCRYPT\u201991 (1991) vol. 547, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 378\u2013386"},{"key":"35_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advances in Cryptology-EUROCRYPT\u201992","author":"K. Nyberg","year":"1993","unstructured":"Nyberg, K.: On the construction of highly nonlinear permutations. In Advances in Cryptology-EUROCRYPT\u201992 (1993) vol. 658, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 92\u201398"},{"key":"35_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In Advances in Cryptology-EUROCRYPT\u201993 (1994) vol. 765, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 55\u201365"},{"key":"35_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/3-540-48071-4_41","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"K. Nyberg","year":"1993","unstructured":"Nyberg, K., Knudsen, L. R.: Provable security against differential cryptanalysis. In Advances in Cryptology-CRYPTO\u201992 (1993) vol. 740, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 566\u2013574"},{"key":"35_CR13","unstructured":"Pieprzyk, J.: Bent permutations. In Proceeding of the International Conference on Finite Fields, Coding Theory, and Advances in Communications and Computing (Las Vegas, 1991)"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"Rothaus, O. S.: On \u201cbent\u201d functions. Journal of Combinatorial Theory Ser. A, 20 (1976) 300\u2013305","journal-title":"Journal of Combinatorial Theory Ser. A"},{"key":"35_CR15","first-page":"172","volume-title":"Proceedings of the first ACM Conference on Computer and Communications Security","author":"J. Seberry","year":"1993","unstructured":"Seberry, J., Zhang, X. M., Zheng, Y.: Systematic generation of cryptographically robust S-boxes. In Proceedings of the first ACM Conference on Computer and Communications Security (1993) The Association for Computing Machinery, New York pp. 172\u2013182"},{"key":"35_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-48329-2_5","volume-title":"Advances in Cryptology-CRYPTO\u201993","author":"J. Seberry","year":"1994","unstructured":"Seberry, J., Zhang, X. M., Zheng, Y.: Nonlinearly balanced boolean functions and their propagation characteristics. In Advances in Cryptology-CRYPTO\u201993 (1994) vol. 773, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York pp. 49\u201360"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Seberry, J., Zhang, X. M., Zheng, Y.: Relationships among nonlinearity criteria. Presented at EUROCRYPT\u201994, 1994","DOI":"10.1007\/BFb0053452"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T18:56:46Z","timestamp":1684004206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_35","relation":{},"subject":[]}}