{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:35:05Z","timestamp":1753886105246},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540631637"},{"type":"electronic","value":"9783540691938"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63163-1_25","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T18:10:21Z","timestamp":1330279821000},"page":"321-328","source":"Crossref","is-referenced-by-count":1,"title":["Some results on regular mappings"],"prefix":"10.1007","author":[{"given":"H.","family":"Tapia-Recillas","sequence":"first","affiliation":[]},{"given":"G.","family":"Vega","sequence":"additional","affiliation":[]},{"given":"E.","family":"Daltabuit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,8]]},"reference":[{"key":"25_CR1","volume-title":"Advances in Cryptology \u2014 EUROCRYPT'93","author":"T. Beth","year":"1993","unstructured":"Beth, T., and Ding, C. On permutations against differential cryptanalysis. In Advances in Cryptology \u2014 EUROCRYPT'93, Springer-Verlag, New York (1993)."},{"key":"25_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., and Shamir, A. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York (1993)."},{"issue":"No.1","key":"25_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1993","unstructured":"Biham, E., and Shamir, A. Differential Cryptanalysis of DES-like cryptosystems. Journal of Cryptology Vol. 4, No. 1 (1993) 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"25_CR4","volume-title":"Advances in Cryptology \u2014 AUSCRYPT'92","author":"J. Detombe","year":"1993","unstructured":"Detombe, J. and Tavares, S. Constructing large cryptographically strong S-boxes. Advances in Cryptology \u2014 AUSCRYPT'92, Springer-Verlag, New York (1993)."},{"key":"25_CR5","unstructured":"Lidl, R., and Niederreiter, H. Finite Fiels, Encyclopedia of Mathematics and Its Applications, Cambridge University Press, (1983)."},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Matsui, M. Linear cryptanalysis method for DES cipher. Abstracts of EUROCRYP-T'93, May (1993).","DOI":"10.1007\/3-540-48285-7_33"},{"key":"25_CR7","first-page":"172","volume-title":"Systematic generation of cryptographically robust S-boxes","author":"J. Seberry","year":"1993","unstructured":"Seberry, J., Zhang, X. M., and Zheng, Y. Systematic generation of cryptographically robust S-boxes. In Proceedings of the firts ACM Conference on Computer and Communications Security, The Association for Computing Machinery, New York (1993) 172\u2013182."},{"key":"25_CR8","unstructured":"Seberry, J., Zhang, X. M., and Zheng, Y. Pitfalls in Designing Sustitution Boxes. Preprint (1994)."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Seberry, J., Zhang, X. M., and Zheng, Y. Relationships among nonlinearity criteria. Submitted to EUROCRYPT'94, (1994).","DOI":"10.1007\/BFb0053452"},{"key":"25_CR10","unstructured":"Seberry, J., Zhang, X. M., and Zheng, Y. Remarks on S-boxes based on permutation polynomials. In Advances in Cryptology \u2014 Crypto'94 (1994)."},{"key":"25_CR11","first-page":"523","volume-title":"Advances in Cryptology \u2014 Crypto'85, vol. 219, Lecture Notes in Computer Science","author":"A. F. Webster","year":"1986","unstructured":"Webster, A. F., and Tavares, S. E. On the designs of S-boxes. In Advances in Cryptology \u2014 Crypto'85, vol. 219, Lecture Notes in Computer Science, Springer-Verlag, New York, (1986) 523\u2013534."},{"key":"25_CR12","unstructured":"Zhang, X. M., and Zheng, Y. Relationships Between Differential and Other Cryptographic Characteristics of an S-box, Preprint, May (1996)."}],"container-title":["Lecture Notes in Computer Science","Applied Algebra, Algebraic Algorithms and Error-Correcting Codes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63163-1_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:16:16Z","timestamp":1605629776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63163-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540631637","9783540691938"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-63163-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}