{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:56:17Z","timestamp":1767992177137,"version":"3.49.0"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["MTR\/2019\/000744"],"award-info":[{"award-number":["MTR\/2019\/000744"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10623-021-00944-x","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T15:04:09Z","timestamp":1631718249000},"page":"2627-2636","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Boomerang uniformity of a class of power maps"],"prefix":"10.1007","volume":"89","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7962-3221","authenticated-orcid":false,"given":"Sartaj Ul","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,15]]},"reference":[{"issue":"1","key":"944_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"issue":"12","key":"944_CR2","doi-asserted-by":"publisher","first-page":"8127","DOI":"10.1109\/TIT.2011.2169129","volume":"57","author":"C Blondeau","year":"2011","unstructured":"Blondeau C., Canteaut A., Charpin P.: Differential properties of $$x \\mapsto x^{2^t-1}$$. IEEE Trans. Inf. Theory 57(12), 8127\u20138137 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"944_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.46586\/tosc.v2018.i3.290-310","volume":"3","author":"C Boura","year":"2018","unstructured":"Boura C., Canteaut A.: On the boomerang uniformity of cryptographic S-boxes. IACR Trans. Symmetric Cryptol. 3, 290\u2013310 (2018).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"944_CR4","first-page":"33","volume-title":"Proceedings of the 9th International Conference on Finite Fields and Applications, Contemporary Mathematics","author":"KA Browning","year":"2010","unstructured":"Browning K.A., Dillon J.F., McQuistan M.T., Wolfe A.J.: An APN permutation in dimension six. In: McGuire G., et al. (eds.) Proceedings of the 9th International Conference on Finite Fields and Applications, Contemporary Mathematics, vol. 518, pp. 33\u201342. American Mathematical Society, Providence (2010)."},{"key":"944_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10623-020-00807-x","volume":"89","author":"M Calderini","year":"2021","unstructured":"Calderini M.: Differentially low uniform permutations from known $$4$$-uniform functions. Des. Codes Cryptogr. 89, 33\u201352 (2021).","journal-title":"Des. Codes Cryptogr."},{"key":"944_CR6","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s12095-020-00439-x","volume":"12","author":"M Calderini","year":"2020","unstructured":"Calderini M., Villa I.: On the boomerang uniformity of some permutation polynomials. Cryptogr. Commun. 12, 1161\u20131178 (2020).","journal-title":"Cryptogr. Commun."},{"key":"944_CR7","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-78375-8_22","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2018, LNCS 10821","author":"C Cid","year":"2018","unstructured":"Cid C., Huang T., Peyrin T., Sasaki Y., Song L.: Boomerang connectivity table: a new cryptanalysis tool. In: Nielsen J., Rijmen V. (eds.) Advances in Cryptology\u2014EUROCRYPT 2018, LNCS 10821, pp. 683\u2013714. Springer, Cham (2018)."},{"issue":"11","key":"944_CR8","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li K., Qu L., Sun B., Li C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542\u20137553 (2019).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"944_CR9","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10623-020-00837-5","volume":"89","author":"K Li","year":"2021","unstructured":"Li K., Li C., Helleseth T., Qu L.: Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89, 737\u2013761 (2021).","journal-title":"Des. Codes Cryptogr."},{"key":"944_CR10","unstructured":"Li N., Hu Z., Xiong M., Zeng X.: $$4$$-uniform BCT permutations from generalized butterfly structure. Preprint at https:\/\/arxiv.org\/abs\/2001.00464"},{"issue":"10","key":"944_CR11","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1007\/s10623-020-00775-2","volume":"88","author":"S Mesnager","year":"2020","unstructured":"Mesnager S., Tang C., Xiong M.: On the boomerang uniformity of quadratic permutations. Des. Codes Cryptogr. 88(10), 2233\u20132246 (2020).","journal-title":"Des. Codes Cryptogr."},{"key":"944_CR12","first-page":"55","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201993, LNCS 765","author":"K Nyberg","year":"1993","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Helleseth T. (ed.) Advances in Cryptology\u2014EUROCRYPT\u201993, LNCS 765, pp. 55\u201364. Springer, Berlin (1993)."},{"issue":"6","key":"944_CR13","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1109\/TIT.2020.2969578","volume":"66","author":"Z Tu","year":"2020","unstructured":"Tu Z., Li N., Zeng X., Zhou J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753\u20133765 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"944_CR14","first-page":"156","volume-title":"Proceedings of Fast Software Encryption\u2014FSE 1999, LNCS 1636","author":"D Wagner","year":"1999","unstructured":"Wagner D.: The boomerang attack. In: Knudsen L.R. (ed.) Proceedings of Fast Software Encryption\u2014FSE 1999, LNCS 1636, pp. 156\u2013170. Springer, Heidelberg (1999)."},{"key":"944_CR15","doi-asserted-by":"crossref","unstructured":"Zha Z., Hu L.: The Boomerang uniformity of power permutations $$x^{2^k-1}$$ over $$\\mathbb{F}_{2^n}$$. In: 2019 Ninth International Workshop on Signal Design and Its Applications in Communications (IWSDA), pp. 1\u20134 (2019)","DOI":"10.1109\/IWSDA46143.2019.8966114"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00944-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00944-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00944-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:51:34Z","timestamp":1725796294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00944-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":15,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["944"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00944-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,15]]},"assertion":[{"value":"20 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}