{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:04:19Z","timestamp":1774983859299,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s00200-021-00520-9","type":"journal-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T16:02:42Z","timestamp":1628265762000},"page":"581-602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields"],"prefix":"10.1007","volume":"34","author":[{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,6]]},"reference":[{"key":"520_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1\u201316, Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-45661-9_1"},{"key":"520_CR2","doi-asserted-by":"crossref","unstructured":"A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-$$192$$ and AES-$$256$$, In: Matsui M. (ed.), Adv. in Crypt. \u2013 ASIACRYPT 2009, LNCS 5912, 2009, pp. 1\u201318, Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-10366-7_1"},{"key":"520_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.46586\/tosc.v2018.i3.290-310","volume":"3","author":"C Boura","year":"2018","unstructured":"Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290\u2013310 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"520_CR4","unstructured":"C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https:\/\/www.lebesgue.fr\/sites\/default\/files\/proceedings\/_20WCC\/WCC\/_2019\/_20paper\/_15.pdf"},{"key":"520_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and analysis of cryptographic functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)"},{"key":"520_CR6","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s12095-020-00439-x","volume":"12","author":"M Calderini","year":"2020","unstructured":"Calderini, M., Villa, I.: On the boomerang uniformity of some permutation polynomials. Cryptogr. Commun. 12, 1161\u20131178 (2020)","journal-title":"Cryptogr. Commun."},{"key":"520_CR7","first-page":"257","volume-title":"Boolean Methods and Models, Cambridge Univ","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 257\u2013397. Press, Cambridge (2010)"},{"key":"520_CR8","first-page":"398","volume-title":"Boolean Methods and Models, Cambridge Univ","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398\u2013472. Press, Cambridge (2010)"},{"issue":"9","key":"520_CR9","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.1109\/TIT.2017.2761392","volume":"64","author":"C Carlet","year":"2018","unstructured":"Carlet, C.: Characterizations of the differential uniformity of vectorial functions by the walsh transform. IEEE Trans. Inf. Theory 64(9), 6443\u20136453 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/mana.19800960125","volume":"96","author":"L Carlitz","year":"1980","unstructured":"Carlitz, L.: Evaluation of some exponential sums over a finite field. Math. Nachr. 96, 319\u2013339 (1980)","journal-title":"Math. Nachr."},{"key":"520_CR11","doi-asserted-by":"crossref","unstructured":"C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, Boomerang Connectivity Table: a new cryptanalysis tool, In: J. B. Nielsen and V. Rijmen (eds.), Adv. in Crypt. \u2013 EUROCRYPT \u201918, pp. 683\u2013714, Cham, 2018. Springer","DOI":"10.1007\/978-3-319-78375-8_22"},{"key":"520_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.4064\/aa-83-3-241-251","volume":"83","author":"RS Coulter","year":"1998","unstructured":"Coulter, R.S.: Explicit evaluations of some Weil sums. Acta Arithmetica 83, 241\u2013251 (1998)","journal-title":"Acta Arithmetica"},{"key":"520_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.4064\/aa-86-3-217-226","volume":"86","author":"RS Coulter","year":"1998","unstructured":"Coulter, R.S.: Further evaluations of Weil sums. Acta Arithmetica 86, 217\u2013226 (1998)","journal-title":"Acta Arithmetica"},{"key":"520_CR14","doi-asserted-by":"crossref","unstructured":"T. W.\u00a0Cusick, P.\u00a0St\u0103nic\u0103, Cryptographic Boolean Functions and Applications (Ed. 2), Academic Press, San Diego, CA, 2017","DOI":"10.1016\/B978-0-12-811129-1.00005-5"},{"key":"520_CR15","doi-asserted-by":"crossref","unstructured":"P. Ellingsen, P. Felke, C. Riera P. St\u0103nic\u0103, A. Tkachenko, $$C$$-differentials, multiplicative uniformity and (almost) perfect $$c$$-nonlinearity, IEEE Trans. Inf. Theory, 2020, 66:9 (2020), 5781\u20135789","DOI":"10.1109\/TIT.2020.2971988"},{"key":"520_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10623-020-00812-0","volume":"89","author":"SU Hasan","year":"2021","unstructured":"Hasan, S.U., Pal, M., Riera, C., St\u0103nic\u0103, P.: On the $$c$$-differential uniformity of certain maps over finite fields, Des. Codes Cryptogr. 89, 221\u2013239 (2021)","journal-title":"Codes Cryptogr."},{"key":"520_CR17","volume-title":"LNCS 1978","author":"J Kelsey","year":"2000","unstructured":"Kelsey, J., Kohno, T., Schneier, B., Amplified boomerang attacks against reduced-round MARS and Serpent, In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds,), Fast Software Encryption, FSE, : LNCS 1978. Springer, Berlin, Heidelberg (2000)"},{"issue":"7","key":"520_CR18","doi-asserted-by":"publisher","first-page":"4948","DOI":"10.1109\/TIT.2012.2191655","volume":"58","author":"J Kim","year":"2012","unstructured":"Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O.: Related-key boomerang and rectangle attacks: theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948\u20134966 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"520_CR19","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542\u20137553 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR20","unstructured":"N. Li, Z. Hu, M. Xiong, X. Zeng, $$4$$-uniform BCT permutations from generalized butterfly structure, https:\/\/arxiv.org\/abs\/2001.00464"},{"key":"520_CR21","doi-asserted-by":"crossref","unstructured":"R. Lidl, H. Niederreiter, Finite Fields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge, 1997","DOI":"10.1017\/CBO9780511525926"},{"key":"520_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent functions: fundamentals and results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S.: Bent functions: fundamentals and results. Springer Verlag (2016)"},{"key":"520_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3081348","author":"S Mesnager","year":"2021","unstructured":"Mesnager, S., Riera, C., St\u0103nic\u0103, P., Yan, H., Zhou, Z.: Investigation on c-(almost) perfect nonlinear functions. IEEE Trans. Inf. Theory (2021). https:\/\/doi.org\/10.1109\/TIT.2021.3081348","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR24","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1007\/s10623-020-00775-2","volume":"88","author":"S Mesnager","year":"2020","unstructured":"Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations, Des. Codes Cryptogr. 88, 2233\u20132246 (2020)","journal-title":"Codes Cryptogr."},{"key":"520_CR25","unstructured":"C. Riera, P. St\u0103nic\u0103, Investigations on $$c$$-(almost) perfect nonlinear functions, https:\/\/arxiv.org\/abs\/2004.02245"},{"key":"520_CR26","unstructured":"St\u0103nic\u0103, P.: Investigations on c-boomerang uniformity and perfect nonlinearity. Discret. Appl. Math. (2020).\u00a0https:\/\/arxiv.org\/abs\/2004.11859"},{"issue":"10","key":"520_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2021.112543","volume":"344","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P.: Low $$c$$-differential and c-boomerang uniformity of the swapped inverse function. Discrete Mathematics 344(10), 112543 (2021)","journal-title":"Discrete Mathematics"},{"key":"520_CR28","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s12095-020-00466-8","volume":"13","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P., Geary, A.: The $$c$$-differential behavior of the inverse function under the $$EA$$-equivalence. Cryptogr. Commun. 13, 295\u2013306 (2021)","journal-title":"Cryptogr. Commun."},{"key":"520_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802318-1.00002-9","volume-title":"Bent Functions","author":"N Tokareva","year":"2015","unstructured":"Tokareva, N.: Bent Functions. Academic Press, San Diego, CA, Results and Applications to Cryptography (2015)"},{"issue":"6","key":"520_CR30","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1109\/TIT.2020.2969578","volume":"66","author":"Z Tu","year":"2020","unstructured":"Tu, Z., Li, N., Zeng, X., Zhou, J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753\u20133765 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR31","unstructured":"Yan, H., Mesnager, S., Zhou, Z.: Power functions over finite fields with low c-differential uniformity. https:\/\/arxiv.org\/pdf\/2003.13019.pdf"},{"key":"520_CR32","doi-asserted-by":"crossref","unstructured":"D. Wagner, The boomerang attack, In: L. R. Knudsen (ed.), Fast Software Encryption, FSE \u201999, LNCS 1636, pages 156\u2013170, 1999, Springer, Heidelberg","DOI":"10.1007\/3-540-48519-8_12"},{"key":"520_CR33","unstructured":"Y. Wu, N. Li, X. Zeng, New P$$c$$N and AP$$c$$N functions over finite fields, https:\/\/arxiv.org\/pdf\/2010.05396.pdf"},{"issue":"2","key":"520_CR34","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/TIT.2019.2939113","volume":"66","author":"Y Zheng","year":"2020","unstructured":"Zheng, Y., Wang, Q., Wei, W.: On inverses of permutation polynomials of small degree over finite fields. IEEE Trans. Inf. Theory 66(2), 914\u2013922 (2020)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-021-00520-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00200-021-00520-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-021-00520-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T11:03:10Z","timestamp":1686567790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00200-021-00520-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,6]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["520"],"URL":"https:\/\/doi.org\/10.1007\/s00200-021-00520-9","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,6]]},"assertion":[{"value":"8 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}