{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:32:31Z","timestamp":1773689551287,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T00:00:00Z","timestamp":1582156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T00:00:00Z","timestamp":1582156800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10623-020-00739-6","type":"journal-article","created":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T07:02:58Z","timestamp":1582182178000},"page":"1159-1177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Partially APN functions with APN-like polynomial representations"],"prefix":"10.1007","volume":"88","author":[{"given":"Lilya","family":"Budaghyan","sequence":"first","affiliation":[]},{"given":"Nikolay","family":"Kaleyski","sequence":"additional","affiliation":[]},{"given":"Constanza","family":"Riera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8622-7120","authenticated-orcid":false,"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,20]]},"reference":[{"key":"739_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0019-9958(67)91016-9","volume":"10","author":"ER Berlekamp","year":"1967","unstructured":"Berlekamp E.R., Rumsey H., Solomon G.: On the solutions of algebraic equations over finite fields. Inf. Control 10, 553\u2013564 (1967).","journal-title":"Inf. Control"},{"issue":"4","key":"739_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.ffa.2010.03.001","volume":"16","author":"C Bracken","year":"2010","unstructured":"Bracken C., Leander G.: A highly nonlinear differentially $$4$$ uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16(4), 231\u2013242 (2010).","journal-title":"Finite Fields Appl."},{"key":"739_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan L.: Construction and Analysis of Cryptographic Functions. Springer, New York (2014)."},{"issue":"5","key":"739_CR4","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan L., Carlet C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inform. Theory 54(5), 2354\u20132357 (2008).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"739_CR5","doi-asserted-by":"publisher","first-page":"4399","DOI":"10.1109\/TIT.2017.2757938","volume":"64","author":"L Budaghyan","year":"2018","unstructured":"Budaghyan L., Carlet C., Helleseth T., Li N., Sun B.: On upper bounds for algebraic degrees of APN functions. IEEE Trans. Inform. Theory 64(6), 4399\u20134411 (2018).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"#cr-split#-739_CR6.1","unstructured":"Budaghyan, L., Kaleyski, N., Kwon, S., Riera, C., St\u0103nic\u0103, P.: Partially APN Boolean functions and classes of functions that are not APN infinitely often. In: Proceedings of the Cryptography and Communication, 2019"},{"key":"#cr-split#-739_CR6.2","unstructured":"preliminary version as Partially APN Boolean functions, Sequences and Their Applications, SETA, Hong Kong (2018)"},{"key":"739_CR7","first-page":"257","volume-title":"Boolean Methods and Models","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes. In: Crama Y., Hammer P. (eds.) Boolean Methods and Models, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)."},{"key":"739_CR8","first-page":"398","volume-title":"Boolean Methods and Models","author":"C Carlet","year":"2010","unstructured":"Carlet C.: Vectorial Boolean functions for cryptography. In: Crama Y., Hammer P. (eds.) Boolean Methods and Models, pp. 398\u2013472. Cambridge University Press, Cambridge (2010)."},{"key":"739_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable For DES-like cryptosystems. Des. Codes Cryptogr. 15, 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"739_CR10","first-page":"356","volume":"950","author":"F Chabaud","year":"1995","unstructured":"Chabaud F., Vaudenay S.: Links between differential and linear cryptanalysis, advances in cryptology-EUROCRYPT\u201994. LNCS 950, 356\u2013365 (1995).","journal-title":"LNCS"},{"key":"739_CR11","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick T.W., St\u0103nic\u0103 P.: Cryptographic Boolean Functions and Applications. Academic Press, San Diego (2017)."},{"key":"739_CR12","volume-title":"APN Polynomials and Related Codes. Polynomials Over Finite Fields and Applications","author":"JF Dillon","year":"2006","unstructured":"Dillon J.F.: APN Polynomials and Related Codes. Polynomials Over Finite Fields and Applications. Banff International Research Station, Banff (2006)."},{"key":"739_CR13","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.ffa.2009.06.004","volume":"15","author":"X Hou","year":"2009","unstructured":"Hou X., Mullen G.L., Sellers J.A., Yucas J.: Reversed Dickson polynomials over finite fields. Finite Fields Appl. 15, 748\u2013773 (2009).","journal-title":"Finite Fields Appl."},{"key":"739_CR14","doi-asserted-by":"publisher","first-page":"921","DOI":"10.2307\/2372996","volume":"81","author":"DR Hughes","year":"1959","unstructured":"Hughes D.R.: Collineation groups and non-Desarguesian planes. Am. J. Math 81, 921\u2013938 (1959).","journal-title":"Am. J. Math"},{"key":"739_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.2307\/2372881","volume":"82","author":"DR Hughes","year":"1959","unstructured":"Hughes D.R.: Collineation groups and non-Desarguesian planes. Am. J. Math 82, 113\u2013119 (1959).","journal-title":"Am. J. Math"},{"key":"739_CR16","volume-title":"Finite Fields. Encyclopedia of Mathematics and its Applications","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and its Applications, 2nd edn. Cambridge University Press, Cambridge (1997).","edition":"2"},{"key":"739_CR17","doi-asserted-by":"crossref","unstructured":"Rodier, F.: Borne sur le degr\u00e9 des polyn\u00f4mes presque parfaitement non-lin\u00e9aires, Arithmetic, Geometry, Cryptography and Coding Theory, G. Lachaud, C. Ritzenthaler and M.Tsfasman eds., Contemporary Math. no 487, AMS, Providence (RI), USA, pp. 169\u2013181 (2009)","DOI":"10.1090\/conm\/487\/09531"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00739-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-020-00739-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00739-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T19:31:19Z","timestamp":1613763079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-020-00739-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,20]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["739"],"URL":"https:\/\/doi.org\/10.1007\/s10623-020-00739-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,20]]},"assertion":[{"value":"26 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}