{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:06:16Z","timestamp":1771038376598,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0496-z","type":"journal-article","created":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T07:57:32Z","timestamp":1527839852000},"page":"185-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Two notions of differential equivalence on Sboxes"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6796-8874","authenticated-orcid":false,"given":"Christina","family":"Boura","sequence":"first","affiliation":[]},{"given":"Anne","family":"Canteaut","sequence":"additional","affiliation":[]},{"given":"J\u00e9r\u00e9my","family":"Jean","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Suder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,1]]},"reference":[{"key":"496_CR1","first-page":"2","volume-title":"CRYPTO\u201990, LNCS","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes A.J., Vanstone S.A. (eds.) CRYPTO\u201990, LNCS, vol. 537, pp. 2\u201321. Springer, Heidelberg (1991)."},{"key":"496_CR2","first-page":"35","volume-title":"FSE 2011, LNCS","author":"C Blondeau","year":"2011","unstructured":"Blondeau C., G\u00e9rard B.: Multiple differential cryptanalysis: theory and practice. In: Joux A. (ed.) FSE 2011, LNCS, vol. 6733, pp. 35\u201354. Springer, Heidelberg (2011)."},{"key":"496_CR3","doi-asserted-by":"publisher","unstructured":"Blondeau C., Nyberg K.: New links between differential and linear cryptanalysis. In: Johansson T., Nguyen P.Q. (eds.) EUROCRYPT 2013, LNCS, vol. 7881, pp. 388\u2013404. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-38348-9_24\n                    \n                  .","DOI":"10.1007\/978-3-642-38348-9_24"},{"issue":"2","key":"496_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1504\/IJICOT.2010.032132","volume":"1","author":"C Blondeau","year":"2010","unstructured":"Blondeau C., Canteaut A., Charpin P.: Differential properties of power functions. IJICoT 1(2), 149\u2013170 (2010). \n                    https:\/\/doi.org\/10.1504\/IJICOT.2010.032132\n                    \n                  .","journal-title":"IJICoT"},{"issue":"1\u20133","key":"496_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann M., Leander G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49(1\u20133), 273\u2013288 (2008). \n                    https:\/\/doi.org\/10.1007\/s10623-008-9194-6\n                    \n                  .","journal-title":"Des. Codes Cryptogr."},{"issue":"1\u20134","key":"496_CR6","first-page":"135","volume":"34","author":"K Browning","year":"2009","unstructured":"Browning K., Dillon J., Kibler R., McQuistan M.: APN polynomials and related codes. J. Comb. Inf. Syst. Sci. 34(1\u20134), 135\u2013159 (2009).","journal-title":"J. Comb. Inf. Syst. Sci."},{"key":"496_CR7","doi-asserted-by":"crossref","unstructured":"Browning K., Dillon J., McQuistan M., Wolfe A.: An APN permutation in dimension six. In: Finite Fields: Theory and Applications, Contemporary Mathematics, vol. 518, pp. 33\u201342. AMS (2010)","DOI":"10.1090\/conm\/518\/10194"},{"key":"496_CR8","doi-asserted-by":"publisher","unstructured":"Canteaut A., Rou\u00e9 J.: On the behaviors of affine equivalent sboxes regarding differential and linear attacks. In: Oswald E., Fischlin M. (eds.) EUROCRYPT 2015, Part I, LNCS, vol. 9056, pp. 45\u201374. Springer, Heidelberg (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-662-46800-5_3\n                    \n                  .","DOI":"10.1007\/978-3-662-46800-5_3"},{"issue":"2","key":"496_CR9","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C Carlet","year":"1993","unstructured":"Carlet C.: Partially-bent functions. Des. Codes Cryptogr. 3(2), 135\u2013145 (1993). \n                    https:\/\/doi.org\/10.1007\/BF01388412\n                    \n                  .","journal-title":"Des. Codes Cryptogr."},{"key":"496_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-16277-5_5","volume-title":"Arithmetic of Finite Fields - WAIFI 2014","author":"C Carlet","year":"2015","unstructured":"Carlet C.: Open questions on nonlinearity and on APN functions. In: Ko\u00e7 \u00c7.K., Mesnager S., Sava\u015f E. (eds.) Arithmetic of Finite Fields - WAIFI 2014, pp. 83\u2013107. Springer, New York (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-16277-5_5\n                    \n                  ."},{"issue":"2","key":"496_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable For DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"496_CR12","first-page":"356","volume-title":"EUROCRYPT\u201994, LNCS","author":"F Chabaud","year":"1995","unstructured":"Chabaud F., Vaudenay S.: Links between differential and linear cryptoanalysis. In: Santis A.D. (ed.) EUROCRYPT\u201994, LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995)."},{"issue":"4","key":"496_CR13","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin H.: Almost perfect nonlinear power functions on GF(2\n                    \n                      \n                    \n                    $$^{\\text{ n }}$$\n                    \n                      \n                        \n                          \n                          \n                            \n                            n\n                            \n                          \n                        \n                      \n                    \n                  ): the Welch case. IEEE Trans. Inf. Theory 45(4), 1271\u20131275 (1999).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"496_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel Y., Pott A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009). \n                    https:\/\/doi.org\/10.3934\/amc.2009.3.59\n                    \n                  .","journal-title":"Adv. Math. Commun."},{"issue":"2","key":"496_CR15","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIT.2005.862128","volume":"52","author":"Y Edel","year":"2006","unstructured":"Edel Y., Kyureghyan G.M., Pott A.: A new APN function which is not equivalent to a power mapping. IEEE Trans. Inf. Theory 52(2), 744\u2013747 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"496_CR16","unstructured":"Flori J.P., Jean J.: libapn C++ Library. \n                    https:\/\/github.com\/ANSSI-FR\/libapn\n                    \n                   (2018)"},{"key":"496_CR17","unstructured":"Gorodilova A.: On a remarkable property of APN Gold functions. Cryptology ePrint Archive, Report 2016\/286 (2016)"},{"issue":"1","key":"496_CR18","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.jalgebra.2011.06.019","volume":"343","author":"F Hernando","year":"2011","unstructured":"Hernando F., McGuire G.: Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions. J. Algebr. 343(1), 78\u201392 (2011).","journal-title":"J. Algebr."},{"key":"496_CR19","first-page":"196","volume-title":"FSE\u201994, LNCS","author":"LR Knudsen","year":"1995","unstructured":"Knudsen L.R.: Truncated and higher order differentials. In: Preneel B. (ed.) FSE\u201994, LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995)."},{"key":"496_CR20","first-page":"16","volume-title":"CHES 2010, LNCS","author":"LR Knudsen","year":"2010","unstructured":"Knudsen L.R., Leander G., Poschmann A., Robshaw M.J.B.: PRINTcipher: a block cipher for IC-printing. In: Mangard S., Standaert F.X. (eds.) CHES 2010, LNCS, vol. 6225, pp. 16\u201332. Springer, Heidelberg (2010)."},{"key":"496_CR21","unstructured":"Langevin, P.: Classification of Boolean functions under the affine group. \n                    http:\/\/langevin.univ-tln.fr\/project\/agl\/agl.html\n                    \n                   (2009)"},{"key":"496_CR22","doi-asserted-by":"publisher","unstructured":"Leander G., Poschmann A.: On the classification of 4 bit s-boxes. In: Carlet C., Sunar B. (eds.) Proceedings of Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21\u201322, 2007, Lecture Notes in Computer Science, vol. 4547, pp. 159\u2013176. Springer, New York (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-73074-3_13","DOI":"10.1007\/978-3-540-73074-3_13"},{"key":"496_CR23","first-page":"55","volume-title":"EUROCRYPT\u201993, LNCS","author":"K Nyberg","year":"1994","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Helleseth T. (ed.) EUROCRYPT\u201993, LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994)."},{"key":"496_CR24","first-page":"566","volume-title":"CRYPTO\u201992, LNCS","author":"K Nyberg","year":"1993","unstructured":"Nyberg K., Knudsen L.R.: Provable security against differential cryptanalysis (rump session). In: Brickell E.F. (ed.) CRYPTO\u201992, LNCS, vol. 740, pp. 566\u2013574. Springer, Heidelberg (1993)."},{"key":"496_CR25","first-page":"247","volume-title":"FSE 2003, LNCS","author":"S Park","year":"2003","unstructured":"Park S., Sung S.H., Lee S., Lim J.: Improving the upper bound on the maximum differential and the maximum linear Hull probability for SPN structures and AES. In: Johansson T. (ed.) FSE 2003, LNCS, vol. 2887, pp. 247\u2013260. Springer, Heidelberg (2003)."},{"issue":"3","key":"496_CR26","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u201cbent\u201d functions. J. Comb. Theory Ser. A 20(3), 300\u2013305 (1976).","journal-title":"J. Comb. Theory Ser. A"},{"key":"496_CR27","unstructured":"Suder, V.: Antiderivative functions over \n                    \n                      \n                    \n                    $${\\mathbb{F}}\\_{2^n}$$\n                    \n                      \n                        \n                          F\n                          _\n                          \n                            2\n                            n\n                          \n                        \n                      \n                    \n                  . In: Workshop on Coding and Cryptography\u2014WCC 2015 (2015). \n                    https:\/\/hal.archives-ouvertes.fr\/WCC2015\/hal-01275708v1"},{"issue":"1\u20132","key":"496_CR28","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10623-016-0186-7","volume":"82","author":"V Suder","year":"2017","unstructured":"Suder V.: Antiderivative functions over \n                    \n                      \n                    \n                    $${\\mathbb{F}}\\_{2^n}$$\n                    \n                      \n                        \n                          F\n                          _\n                          \n                            2\n                            n\n                          \n                        \n                      \n                    \n                  . Des. Codes Cryptogr. 82(1\u20132), 435\u2013447 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"496_CR29","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu Y., Wang M., Li Y.: A matrix approach for constructing quadratic APN functions. Des. Codes Cryptogr. 73(2), 587\u2013600 (2014). \n                    https:\/\/doi.org\/10.1007\/s10623-014-9955-3\n                    \n                  .","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0496-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0496-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0496-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:49:24Z","timestamp":1559357364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0496-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,1]]},"references-count":29,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["496"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0496-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,1]]},"assertion":[{"value":"21 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}