{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:26Z","timestamp":1772283626206,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T00:00:00Z","timestamp":1404259200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10623-014-9992-y","type":"journal-article","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T07:17:20Z","timestamp":1404285440000},"page":"117-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Differentially 4-uniform bijections by permuting the inverse function"],"prefix":"10.1007","volume":"77","author":[{"given":"Deng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Claude","family":"Carlet","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,2]]},"reference":[{"key":"9992_CR1","doi-asserted-by":"crossref","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","DOI":"10.1007\/BF00630563"},{"key":"9992_CR2","doi-asserted-by":"crossref","unstructured":"Bracken C., Leander G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16(4), 231\u2013242 (2010).","DOI":"10.1016\/j.ffa.2010.03.001"},{"key":"9992_CR3","doi-asserted-by":"crossref","unstructured":"Bracken C., Tan C., Tan Y.: Binomial differentially 4 uniform permutations with high nonlinearity. Finite Fields Appl. 18(3), 537\u2013546 (2012).","DOI":"10.1016\/j.ffa.2011.11.006"},{"key":"9992_CR4","doi-asserted-by":"crossref","unstructured":"Browning K.A., Dillon J.F., McQuistan M.T., Wolfe A.J.: An APN permutation in dimension six. In: Post Proceedings of the 9th International Conference on Finite Fields and their Applications Fq\u20199. Contemp. Math. J. Am. Math. Soc. 518, 33\u201342 (2010).","DOI":"10.1090\/conm\/518\/10194"},{"key":"9992_CR5","doi-asserted-by":"crossref","unstructured":"Budaghyan L., Carlet C., Pott A.: New classes of almost bent and almost perfect nonlinear functions. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006).","DOI":"10.1109\/TIT.2005.864481"},{"key":"9992_CR6","doi-asserted-by":"crossref","unstructured":"Carlet C.: On known and new differentially uniform functions. In: Proceedings of the Australasian Conference on Information Security Privacy. Lecture Notes in Computer Science, vol. 6812, pp. 1\u201315. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-22497-3_1"},{"key":"9992_CR7","doi-asserted-by":"crossref","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998).","DOI":"10.1023\/A:1008344232130"},{"key":"9992_CR8","doi-asserted-by":"crossref","unstructured":"Carlet C., Tang D., Tang X., Liao Q.: New construction of differentially 4-uniform bijections. To appear in Lecture Notes in Computer Science (2014).","DOI":"10.1007\/978-3-319-12087-4_2"},{"key":"9992_CR9","doi-asserted-by":"crossref","unstructured":"Knudsen L.: Truncated and higher order differentials. In: Proceedings of the Second International Workshop Fast Software Encryption. Lecture Notes in Computer Science, vol. 1008, pp. 196\u2013211. Springer, Berlin (1995).","DOI":"10.1007\/3-540-60590-8_16"},{"key":"9992_CR10","unstructured":"MacWilliams F.J., Sloane N.J.: The theory of error-correcting codes. North Holland, Amsterdam (1977)."},{"key":"9992_CR11","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. Advances in Cryptology-EUROCRYPT 1993. Lecture Notes in Computer Science, vol. 765, pp. 386\u2013397. Springer, Berlin (1994)."},{"key":"9992_CR12","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. Advances in Cryptology-EUROCRYPT 1993. Lecture Notes in Computer Science, vol. 765, pp. 55\u201364. Springer, Berlin (1994)."},{"key":"9992_CR13","doi-asserted-by":"crossref","unstructured":"Shannon C.E.: Communication theory of secrecy systems. Bell Sys. Tech. J. 28, 656\u2013715 (1949).","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"9992_CR14","doi-asserted-by":"crossref","unstructured":"Lachaud G., Wolfmann J.: The weights of the orthogonals of the extended quadratic binary Goppa codes. IEEE Trans. Inf. Theory 36(3), 686\u2013692 (1990).","DOI":"10.1109\/18.54892"},{"key":"9992_CR15","doi-asserted-by":"crossref","unstructured":"Li Y., Wang M.: Constructing differentially 4-uniform permutations over $$GF(2^{2m})$$ G F ( 2 2 m ) from quadratic APN permutations over $$GF(2^{2m+1})$$ G F ( 2 2 m + 1 ) . Des. Codes Cryptogr. 72, 249\u2013264 (2012). doi: 10.1007\/s10623-012-9760-9 .","DOI":"10.1007\/s10623-012-9760-9"},{"key":"9992_CR16","doi-asserted-by":"crossref","unstructured":"Qu L., Tan Y., Tan C., Li C.: Constructing differentially $$4$$ 4 -uniform permutations over $$\\mathbb{F}_{2^{2k}}$$ F 2 2 k via the switching method. IEEE Trans. Inf. Theory 59(7), 4675\u20134686 (2013).","DOI":"10.1109\/TIT.2013.2252420"},{"key":"9992_CR17","doi-asserted-by":"crossref","unstructured":"Zha Z., Hu L., Sun S.: Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Appl. 25, 64\u201378 (2014).","DOI":"10.1016\/j.ffa.2013.08.003"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9992-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9992-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9992-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T09:35:55Z","timestamp":1565602555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9992-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,2]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9992"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9992-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,2]]}}}