{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:34Z","timestamp":1773231154419,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540859116","type":"print"},{"value":"9783540859123","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85912-3_32","type":"book-chapter","created":{"date-parts":[[2008,9,11]],"date-time":"2008-09-11T09:34:32Z","timestamp":1221125672000},"page":"368-376","source":"Crossref","is-referenced-by-count":18,"title":["On a Class of Permutation Polynomials over $\\mathbb{F}_{2^n}$"],"prefix":"10.1007","author":[{"given":"Pascale","family":"Charpin","sequence":"first","affiliation":[]},{"given":"Gohar M.","family":"Kyureghyan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-007-9157-3","volume":"46","author":"J. Bierbrauer","year":"2008","unstructured":"Bierbrauer, J., Kyureghyan, G.: Crooked binomials. Des. Codes Cryptogr.\u00a046, 269\u2013301 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1008399109102","volume":"22","author":"S. Dubuc","year":"2001","unstructured":"Dubuc, S.: Characterization of linear structures. Des. Codes Cryptogr.\u00a022, 33\u201345 (2001)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.ffa.2004.06.005","volume":"11","author":"H.D.L. Hollmann","year":"2005","unstructured":"Hollmann, H.D.L., Xing, Q.: A class of permutation polynomials of \n                    \n                      \n                    \n                    $\\mathbb{F}_{2^n}$\n                   related to Dickson polynomials. Finite Fields Appl.\u00a011(1), 111\u2013122 (2005)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"32_CR4","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.ffa.2006.03.003","volume":"13","author":"G. Kyureghyan","year":"2007","unstructured":"Kyureghyan, G.: Crooked maps in \n                    \n                      \n                    \n                    $\\mathbb{F}_{2^n}$\n                  . Finite Fields Appl.\u00a013(3), 713\u2013726 (2007)","journal-title":"Finite Fields Appl."},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/3-540-60590-8_6","volume-title":"Fast Software Encryption","author":"X. Lai","year":"1995","unstructured":"Lai, X.: Additive and linear structures of cryptographic functions. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 75\u201385. Springer, Heidelberg (1995)"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-77224-8_17","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"Y. Laigle-Chapuy","year":"2007","unstructured":"Laigle-Chapuy, Y.: A note on a class of quadratic permutations over \n                    \n                      \n                    \n                    ${F}_{2^n}$\n                  . In: Bozta\u015f, S., Lu, H.-F(F.) (eds.) AAECC 2007. LNCS, vol.\u00a04851, pp. 130\u2013137. Springer, Heidelberg (2007)"},{"key":"32_CR7","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications 20"},{"issue":"1","key":"32_CR8","first-page":"62","volume":"33","author":"V.V. Yashchenko","year":"1997","unstructured":"Yashchenko, V.V.: On the propagation criterion for Boolean functions and bent functions. Problems of Information Transmission\u00a033(1), 62\u201371 (1997)","journal-title":"Problems of Information Transmission"},{"issue":"2","key":"32_CR9","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.ffa.2007.05.003","volume":"14","author":"J. Yuan","year":"2008","unstructured":"Yuan, J., Ding, C., Wang, H., Pieprzyk, J.: Permutation polynomials of the form (x\n                  \n                    p\n                  \u2009\u2212\u2009x\u2009+\u2009\u03b4)\n                    s\n                  \u2009+\u2009L(x). Finite Fields Appl.\u00a014(2), 482\u2013493 (2008)","journal-title":"Finite Fields Appl."}],"container-title":["Lecture Notes in Computer Science","Sequences and Their Applications - SETA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85912-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:44:14Z","timestamp":1558266254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85912-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859116","9783540859123"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85912-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}