{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:11Z","timestamp":1740122531771,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:00:00Z","timestamp":1538092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarships Council","doi-asserted-by":"crossref","award":["No. 201503170276"],"award-info":[{"award-number":["No. 201503170276"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Nature Science Foundation of China","award":["No.61722213","11531002"],"award-info":[{"award-number":["No.61722213","11531002"]}]},{"name":"Nature Science Foundation of China","award":["61572026"],"award-info":[{"award-number":["61572026"]}]},{"name":"National Science and Technology Major Project","award":["No. 2017YFB0802001"],"award-info":[{"award-number":["No. 2017YFB0802001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10623-018-0553-7","type":"journal-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:57:43Z","timestamp":1538096263000},"page":"1577-1599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Constructing infinite families of low differential uniformity (n,\u00a0m)-functions with \n                \n                  \n                \n                $$m&gt;n\/2$$\n                \n                  \n                    \n                      m\n                      &gt;\n                      n\n                      \/\n                      2"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6118-7927","authenticated-orcid":false,"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6874-663X","authenticated-orcid":false,"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3506-5501","authenticated-orcid":false,"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,28]]},"reference":[{"key":"553_CR1","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1008229029587","volume":"12","author":"CM Adams","year":"1997","unstructured":"Adams C.M.: Constructing symmetric ciphers using the CAST design procedure. Des. Codes Cryptogr. 12, 283\u2013316 (1997).","journal-title":"Des. Codes Cryptogr."},{"key":"553_CR2","first-page":"1","volume":"174","author":"R Anderson","year":"1998","unstructured":"Anderson R., Biham E., Knudsen L.: Serpent: a proposal for the advanced encryption standard. NIST AES Propos. 174, 1\u201323 (1998).","journal-title":"NIST AES Propos."},{"key":"553_CR3","unstructured":"Biham E., Anderson R., Knudsen L.: Serpent: a new block cipher proposal. In: International Workshop on Fast Software Encryption, vol. 1372. Springer, Berlin, pp. 222\u2013238 (1998)."},{"key":"553_CR4","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume":"4727","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A., Knudsen L.R., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe C.: PRESENT: an ultra-lightweight block cipher. CHES 2007. Lect. Notes Comput. Sci. 4727, 450\u2013466 (2007).","journal-title":"Lect. Notes Comput. Sci."},{"key":"553_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The magma algebra system I: the user language. J. Symb. Comput. 24, 235\u2013265 (1997).","journal-title":"J. Symb. Comput."},{"key":"553_CR6","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Vectorial Boolean functions for cryptography. Chapter of the monography. In: Crama Y., Hammer P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering. Cambridge University Press, Cambridge (2010)."},{"issue":"11","key":"553_CR7","doi-asserted-by":"publisher","first-page":"6272","DOI":"10.1109\/TIT.2015.2481384","volume":"61","author":"C Carlet","year":"2015","unstructured":"Carlet C.: Boolean and vectorial plateaued functions and APN functions. IEEE Trans. Inf. Theory 61(11), 6272\u20136289 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"553_CR8","doi-asserted-by":"crossref","unstructured":"Carlet C.: Open questions on nonlinearity and on APN functions. In: International Workshop on the Arithmetic of Finite Fields, pp. 83\u2013107 (2015).","DOI":"10.1007\/978-3-319-16277-5_5"},{"issue":"4","key":"553_CR9","doi-asserted-by":"publisher","first-page":"541","DOI":"10.3934\/amc.2015.9.541","volume":"9","author":"C Carlet","year":"2015","unstructured":"Carlet C., AlSalami Y.: A new construction of differentially \n                    \n                      \n                    \n                    $$4$$\n                    \n                      \n                        \n                          4\n                        \n                      \n                    \n                  -uniform \n                    \n                      \n                    \n                    $$(n, n-1)$$\n                    \n                      \n                        \n                          (\n                          n\n                          ,\n                          n\n                          -\n                          1\n                          )\n                        \n                      \n                    \n                  -functions. Adv. Math. Commun. 9(4), 541\u2013565 (2015).","journal-title":"Adv. Math. Commun."},{"key":"553_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-12087-4_2","volume":"8567","author":"C Carlet","year":"2014","unstructured":"Carlet C., Tang D., Tang X.H., Liao Q.Y.: New construction of differentially 4-uniform bijections. Inf. Secur. Cryptol. 8567, 22\u201338 (2014).","journal-title":"Inf. Secur. Cryptol."},{"key":"553_CR11","volume-title":"The Design of Rijndael: AES: The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES: The Advanced Encryption Standard. Springer, Berlin (2002)."},{"key":"553_CR12","volume-title":"Elementary Hadamard Difference Sets","author":"JF Dillon","year":"1974","unstructured":"Dillon J.F.: Elementary Hadamard Difference Sets. University of Maryland, College Park (1974)."},{"key":"553_CR13","unstructured":"European Telecommunications Standards Institute, Technical Specification 135 202 V9.0.0: Universal mobile telecommunications system (UMTS); LTE; specification of the 3GPP confidentiality and integrity algorithms; Document 2: KASUMI specification (3GPP TS 35.202 V9.0.0 Release 9)."},{"key":"553_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17342-4","volume-title":"The Block Cipher Companion","author":"LR Knudsen","year":"2011","unstructured":"Knudsen L.R., Robshaw M.: The Block Cipher Companion. Springer, Berlin (2011)."},{"issue":"7","key":"553_CR15","first-page":"136","volume":"33","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite fields: encyclopedia of mathematics and its applications. Comput. Math. Appl. 33(7), 136 (1997).","journal-title":"Comput. Math. Appl."},{"key":"553_CR16","volume-title":"The Theory of Error-Correcting Codes","author":"FJ Macwilliams","year":"1977","unstructured":"Macwilliams F.J., Sloane N.J.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)."},{"key":"553_CR17","unstructured":"Matsui M.: New block encryption algorithm MISTY. In: International Workshop on Fast Software Encryption, vol. 1267, pp. 54\u201368. Springer, Berlin (1997)."},{"key":"553_CR18","unstructured":"National Institute of Standards and Technology: Data Encryption Standard (DES), Federal Information Processing Standards Publication 49-3. United States National Institute of Standards and Technology (NIST). Reaffirmed on October 25 (1999)."},{"key":"553_CR19","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST) (2001)."},{"key":"553_CR20","unstructured":"Nyberg K.: Perfect non-linear S-boxes. In: Proceedings of EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547, pp. 378\u2013386 (1992)."},{"key":"553_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K Nyberg","year":"1995","unstructured":"Nyberg K., Knudsen L.R.: Provable security against a differential attack. J. Cryptol. 8, 27\u201337 (1995).","journal-title":"J. Cryptol."},{"key":"553_CR22","first-page":"210","volume":"9354","author":"S Picek","year":"2015","unstructured":"Picek S., Mazumdar B., Mukhopadhyay D., Batina L.: Modified transparency order property: solution or just another attempt. Int. Conf. Secur. 9354, 210\u2013227 (2015).","journal-title":"Int. Conf. Secur."},{"key":"553_CR23","doi-asserted-by":"crossref","unstructured":"Piret G., Roche T., Carlet C.: PICARO\u2014a block cipher allowing efficient higher-order side-channel resistance. In: International Conference on Applied Cryptography and Network Security, pp. 311\u2013328 (2012).","DOI":"10.1007\/978-3-642-31284-7_19"},{"key":"553_CR24","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0022-314X(75)90038-4","volume":"7","author":"K Williams","year":"1975","unstructured":"Williams K.: Note on cubics over \n                    \n                      \n                    \n                    $$GF(2^n)$$\n                    \n                      \n                        \n                          G\n                          F\n                          (\n                          \n                            2\n                            n\n                          \n                          )\n                        \n                      \n                    \n                   and \n                    \n                      \n                    \n                    $$GF(3^n)$$\n                    \n                      \n                        \n                          G\n                          F\n                          (\n                          \n                            3\n                            n\n                          \n                          )\n                        \n                      \n                    \n                  . J. Number Theory 7, 361\u2013365 (1975).","journal-title":"J. Number Theory"},{"issue":"6","key":"553_CR25","doi-asserted-by":"publisher","first-page":"3757","DOI":"10.1109\/TIT.2016.2550478","volume":"62","author":"WG Zhang","year":"2016","unstructured":"Zhang W.G., Xie C.L., Pasalic E.: Large sets of orthogonal sequences suitable for applications in CDMA systems. IEEE Trans. Inf. Theory 62(6), 3757\u20133767 (2016).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0553-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0553-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0553-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T22:17:24Z","timestamp":1569622644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0553-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,28]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["553"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0553-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,9,28]]},"assertion":[{"value":"14 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}