{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:15:12Z","timestamp":1774368912151,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T00:00:00Z","timestamp":1530748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0512-3","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T08:52:06Z","timestamp":1530780726000},"page":"203-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6118-7927","authenticated-orcid":false,"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"issue":"9","key":"512_CR1","doi-asserted-by":"publisher","first-page":"4160","DOI":"10.1109\/TIT.2006.880036","volume":"52","author":"T Berger","year":"2006","unstructured":"Berger T., Canteaut A., Charpin P., Laigle-Chapuy Y.: On almost perfect nonlinear functions. IEEE Trans. Inf. Theory 52(9), 4160\u20134170 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"512_CR2","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2015","unstructured":"Budaghyan L.: Construction and Analysis of Cryptographic Functions. Springer, New York (2015)."},{"key":"512_CR3","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. Chapter of the monography. In: Crama Y., Hammer P. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)."},{"key":"512_CR4","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1017\/CBO9780511780448.012","volume-title":"Boolean Models and Methods in Mathematics, Computer Science and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Vectorial boolean functions for cryptography. Chapter of the monography. In: Crama Y., Hammer P. (eds.) Boolean Models and Methods in Mathematics, Computer Science and Engineering, pp. 398\u2013469. Cambridge University Press, Cambridge (2010)."},{"issue":"11","key":"512_CR5","doi-asserted-by":"publisher","first-page":"6272","DOI":"10.1109\/TIT.2015.2481384","volume":"61","author":"C Carlet","year":"2015","unstructured":"Carlet C.: Boolean and vectorial plateaued functions, and APN functions. IEEE Trans. Inf. Theory 61(11), 6272\u20136289 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"512_CR6","unstructured":"Carlet C.: Characterizations of the differential uniformity of vectorial functions by the Walsh transform. IEEE Trans. Inf. Theory (see a preliminary version in IACR ePrint Archive 2017\/516)."},{"key":"512_CR7","doi-asserted-by":"crossref","unstructured":"Carlet C.: Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets. IACR ePrint Archive 2017\/528.","DOI":"10.1016\/j.ffa.2018.06.007"},{"key":"512_CR8","unstructured":"Carlet C., Mesnager S.: Characterizations of o-polynomials by the Walsh transform (2017). \n                    arXiv:1709.03765\n                    \n                  ."},{"key":"512_CR9","unstructured":"Carlet C., Picek S.: On the exponents of APN power functions and Sidon sets, sum-free sets and Dickson polynomials. IACR ePrint Archive 2017\/1179."},{"issue":"2","key":"512_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"512_CR11","unstructured":"Carlet C., Danger J.-L., Desjardins M., Guilley S., Schaub A.: DIBO functions and white box cryptography (2017)."},{"key":"512_CR12","unstructured":"Chabaud F., Vaudenay S.: Links between differential and linear cryptanalysis. In: Proceedings of EUROCRYPT\u201994, Lecture Notes in Computer Science, vol. 950, pp. 356\u2013365 (1995)."},{"key":"512_CR13","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1090\/S0002-9947-1994-1272675-0","volume":"345","author":"SD Cohen","year":"1994","unstructured":"Cohen S.D., Matthews R.W.: A class of exceptional polynomials. Trans. Am. Math. Soc. 345, 897\u2013909 (1994).","journal-title":"Trans. Am. Math. Soc."},{"key":"512_CR14","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.ffa.2003.09.003","volume":"10","author":"JF Dillon","year":"2004","unstructured":"Dillon J.F., Dobbertin H.: New cyclic difference sets with Singer parameters. Finite Fields Appl. 10, 342\u2013389 (2004).","journal-title":"Finite Fields Appl."},{"key":"512_CR15","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.ffa.2009.06.004","volume":"15","author":"X Hou","year":"2009","unstructured":"Hou X., Mullen G.L., Sellers J.A., Yucas J.: Reversed Dickson polynomials over finite fields. Finite Fields Appl. 15, 748\u2013773 (2009).","journal-title":"Finite Fields Appl."},{"issue":"3","key":"512_CR16","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.ffa.2006.03.003","volume":"13","author":"G Kyureghyan","year":"2007","unstructured":"Kyureghyan G.: Crooked maps in \n                    \n                      \n                    \n                    $${\\mathbb{F}}_2^n$$\n                    \n                      \n                        \n                          F\n                          2\n                          n\n                        \n                      \n                    \n                  . Finite Fields Appl. 13(3), 713\u2013726 (2007).","journal-title":"Finite Fields Appl."},{"key":"512_CR17","unstructured":"Nyberg K.: Perfect non-linear S-boxes. In: Proceedings of EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, pp. 378\u2013386 (1992)."},{"key":"512_CR18","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Proceedings of EUROCRYPT\u2019 93, Lecture Notes in Computer Science, vol. 765, pp. 55\u201364 (1994)."},{"key":"512_CR19","unstructured":"Nyberg K.: S-boxes and round functions with controllable linearity and differential uniformity. In: Proceedings of Fast Software Encryption 1994, Lecture Notes in Computer Science, vol. 1008, pp. 111\u2013130 (1995)."},{"key":"512_CR20","unstructured":"Piret G., Roche T., Carlet C.: PICARO\u2014a block cipher allowing efficient higher-order side-channel resistance. In: Proceedings of ACNS 2012, Lecture Notes in Computer Science, vol. 7341, pp. 311\u2013328 (2012)."},{"key":"512_CR21","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949).","journal-title":"Bell Syst. Tech. J."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0512-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0512-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0512-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T19:03:05Z","timestamp":1562266985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0512-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":21,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["512"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0512-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"assertion":[{"value":"22 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}