{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:18:48Z","timestamp":1725549528828},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540239758"},{"type":"electronic","value":"9783540305392"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_7","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:41:57Z","timestamp":1268401317000},"page":"79-91","source":"Crossref","is-referenced-by-count":5,"title":["On the Generalized Linear Equivalence of Functions Over Finite Fields"],"prefix":"10.1007","author":[{"given":"Luca","family":"Breveglieri","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Cherubini","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Macchetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIT.1972.1054732","volume":"18","author":"E.R. Berlekamp","year":"1972","unstructured":"Berlekamp, E.R., Welch, L.R.: Weight Distributions of the Cosets of the (32,6) Reed-Muller Code. IEEE Transactions on Information Theory\u00a018(1), 203\u2013207 (1972)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-48285-7_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"T. Beth","year":"1994","unstructured":"Beth, T., Ding, C.: On Almost Perfect Nonlinear Permutations. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 65\u201376. Springer, Heidelberg (1994)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BFb0053449","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"E. Biham","year":"1995","unstructured":"Biham, E.: On matsui\u2019s linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 341\u2013355. Springer, Heidelberg (1995)"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Biryukov, A., De Canniere, C., Braeken, A., Preneel, B.: A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. In: Proceedings of EUROCRYPT 2003, pp. 33\u201350 (2003)","DOI":"10.1007\/3-540-39200-9_3"},{"key":"7_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES-The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"issue":"5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TIT.1980.1056233","volume":"26","author":"J.D. Denev","year":"1980","unstructured":"Denev, J.D., Tonchev, V.D.: On the Number of Equivalence Classes of Boolean Functions under a Transformation Group. IEEE Transactions on Information Theory\u00a026(5), 625\u2013626 (1980)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1-3","key":"7_CR8","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/S0012-365X(02)00606-4","volume":"267","author":"H. Dobbertin","year":"2003","unstructured":"Dobbertin, H., Mills, D., Muller, E.N., Pott, A., Willems, W.: APN functions in odd characteristic. Discrete Mathematics\u00a0267(1-3), 95\u2013112 (2003)","journal-title":"Discrete Mathematics"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Fuller, J., Millan, W.: On linear Redundancy in the AES S-Box (2002), Available online on http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-540-39887-5_7"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/321150.321152","volume":"10","author":"M.A. Harrison","year":"1963","unstructured":"Harrison, M.A.: The Number of Classes of Invertible Boolean Functions. Journal of ACM\u00a010, 25\u201328 (1963)","journal-title":"Journal of ACM"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/321312.321325","volume":"13","author":"M.A. Harrison","year":"1966","unstructured":"Harrison, M.A.: On Asymptotic Estimates in Switching and Automata Theory. Journal of ACM\u00a013(1), 151\u2013157 (1966)","journal-title":"Journal of ACM"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/PGEC.1964.263724","volume":"EC-13","author":"C.S. Lorens","year":"1964","unstructured":"Lorens, C.S.: Invertible Boolean Functions. IEEE Transactions on Electronic Computers\u00a0EC-13, 529\u2013541 (1964)","journal-title":"IEEE Transactions on Electronic Computers"},{"issue":"195","key":"7_CR13","doi-asserted-by":"publisher","first-page":"403","DOI":"10.2307\/2938682","volume":"57","author":"J.A. Maiorana","year":"1991","unstructured":"Maiorana, J.A.: A Classification of the Cosets of the Reed-Muller code r(1,6). Mathematics of Computation\u00a057(195), 403\u2013414 (1991)","journal-title":"Mathematics of Computation"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially Uniform Mappings for Cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 1991","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect Nonlinear S-Boxes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 378\u2013386. Springer, Heidelberg (1991)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","first-page":"566","volume-title":"Advances in Cryptology - CRYPTO 1992","author":"K. Nyberg","year":"1992","unstructured":"Nyberg, K., Knudsen, L.R.: Provable security against differential cryptanalysis. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 566\u2013574. Springer, Heidelberg (1992)"},{"key":"7_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"key":"7_CR19","volume-title":"Arithmetics of Finite Fields","author":"C. Small","year":"1991","unstructured":"Small, C.: Arithmetics of Finite Fields. Dekker, New York (1991)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:13Z","timestamp":1605761953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}