{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:40:03Z","timestamp":1762623603264,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319162768"},{"type":"electronic","value":"9783319162775"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16277-5_8","type":"book-chapter","created":{"date-parts":[[2015,2,21]],"date-time":"2015-02-21T06:36:06Z","timestamp":1424500566000},"page":"137-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions"],"prefix":"10.1007","author":[{"given":"Ferruh","family":"\u00d6zbudak","sequence":"first","affiliation":[]},{"given":"Ahmet","family":"S\u0131nak","sequence":"additional","affiliation":[]},{"given":"O\u011fuz","family":"Yayla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,22]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-39200-9_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"A Biryukov","year":"2003","unstructured":"Biryukov, A., De Canniere, C., Braeken, A., Preneel, B.: A tool-box for cryptanalysis: linear and affine equivalence algorithms. In: Biham, E. (ed.) Advances in Cryptology \u2014 EUROCRYPT 2003. LNCS, vol. 2656, pp. 33\u201350. Springer, Heidelberg (2003)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system, I. The user language. J. Symb. Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symb. Comput."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-31662-3_8","volume-title":"Arithmetic of Finite Fields","author":"L Budaghyan","year":"2012","unstructured":"Budaghyan, L., Kazymyrov, O.: Verification of restricted EA-equivalence for vectorial Boolean functions. In: \u00d6zbudak, F., Rodr\u00edguez-Henr\u00edquez, F. (eds.) WAIFI 2012. LNCS, vol. 7369, pp. 108\u2013118. Springer, Heidelberg (2012)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inform. Theory 52, 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Crypt."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1017\/CBO9780511780448.012","volume":"134","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial Boolean functions for cryptography. Boolean Model. Methods Math. Comput. Sci. Eng. 134, 398\u2013469 (2010)","journal-title":"Boolean Model. Methods Math. Comput. Sci. Eng."},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 1993","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"8_CR9","unstructured":"S\u0131nak, A.: On verification of restricted extended affine equivalence of vectorial Boolean functions. Master\u2019s thesis, Middle East Technical University (2012)"},{"key":"8_CR10","unstructured":"Williams, V.V.: Breaking the Coppersmith-Winograd barrier, November 2011"}],"container-title":["Lecture Notes in Computer Science","Arithmetic of Finite Fields"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16277-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T12:39:26Z","timestamp":1676637566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16277-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162768","9783319162775"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16277-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}