{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T17:25:03Z","timestamp":1769189103828,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[2008,3,12]],"date-time":"2008-03-12T00:00:00Z","timestamp":1205280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1007\/s10623-008-9194-6","type":"journal-article","created":{"date-parts":[[2008,3,11]],"date-time":"2008-03-11T19:59:29Z","timestamp":1205265569000},"page":"273-288","source":"Crossref","is-referenced-by-count":67,"title":["On the classification of APN functions up to dimension five"],"prefix":"10.1007","volume":"49","author":[{"given":"Marcus","family":"Brinkmann","sequence":"first","affiliation":[]},{"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,3,12]]},"reference":[{"key":"9194_CR1","doi-asserted-by":"crossref","unstructured":"Biryukov A., Canni\u00e8re C.D., Braeken A., Preneel B.: A toolbox for cryptanalysis: linear and affine equivalence algorithms. In: EUROCRYPT, pp. 33\u201350 (2003).","DOI":"10.1007\/3-540-39200-9_3"},{"key":"9194_CR2","doi-asserted-by":"crossref","unstructured":"Budaghyan L., Carlet C., Felke P., Leander G.: An infinite class of quadratic APN functions which are not equivalent to power mappings. In: IEEE International Symposium on Information Theory, pp. 2637\u20132641 (2006).","DOI":"10.1109\/ISIT.2006.262131"},{"key":"9194_CR3","unstructured":"Budaghyan L., Carlet C., Leander G.: A class of quadratic apn binomials inequivalent to power functions. Cryptology ePrint Archive, Report 2006\/445 (2006)."},{"key":"9194_CR4","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L. Budaghyan","year":"2006","unstructured":"Budaghyan L., Carlet C., Pott A. (2006). New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inform. Theory 52: 1141\u20131152","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9194_CR5","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C. Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V. (1998). Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15: 125\u2013156","journal-title":"Des. Codes Cryptogr."},{"key":"9194_CR6","unstructured":"Dillon J.F.: APN polynomials and related codes. Banff International Research Station workshop on Polynomials over Finite Fields and Applications (2006)."},{"key":"9194_CR7","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIT.2005.862128","volume":"52","author":"Y. Edel","year":"2006","unstructured":"Edel Y., Kyureghyan G., Pott A. (2006). A new APN function which is not equivalent to a power mapping. IEEE Trans. Inform. Theory 52: 744\u2013747","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9194_CR8","unstructured":"Farad\u017eev I.A.: Constructive enumeration of combinatorial objects. In: Probl\u00e8mes Combinatoires et Th\u00e9orie des Graphes, vol. 260, pp. 131\u2013135. Coloques internationaux C.N.R.S. (1978)."},{"key":"9194_CR9","unstructured":"dong Hou X.: Affinity of permutations of $${\\mathbb{F}}_2^n$$ . In: Proceedings of the Workshop on Coding and Cryptography, pp. 273\u2013280 (2003)."},{"key":"9194_CR10","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2307\/2005469","volume":"29","author":"D.E. Knuth","year":"1975","unstructured":"Knuth D.E. (1975). Estimating the efficiency of backtrack programs. Math. Comput. 29: 121\u2013136","journal-title":"Math. Comput."},{"key":"9194_CR11","unstructured":"http:\/\/magma.maths.usyd.edu.au\/magma\/ (2007)."},{"key":"9194_CR12","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: EUROCRYPT \u201993, pp. 55\u201364 (1994).","DOI":"10.1007\/3-540-48285-7_6"},{"key":"9194_CR13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0167-5060(08)70325-X","volume":"2","author":"R.C. Read","year":"1978","unstructured":"Read R.C. (1978). Every one a winner. Ann. Discrete Math. 2: 107\u2013120","journal-title":"Ann. Discrete Math."},{"key":"9194_CR14","unstructured":"Sloane N.J.A.: The on-line encyclopedia of integer sequences. http:\/\/www.research.att.com\/~njas\/sequences\/ (2007)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9194-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9194-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9194-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:10Z","timestamp":1559245810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9194-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,12]]},"references-count":14,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2008,12]]}},"alternative-id":["9194"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9194-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3,12]]}}}