{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:46:14Z","timestamp":1761061574458,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072162","61761166010"],"award-info":[{"award-number":["62072162","61761166010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12001176"],"award-info":[{"award-number":["12001176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Application Foundation Frontier Project of Wuhan Science and Technology Bureau","award":["2020010601012189"],"award-info":[{"award-number":["2020010601012189"]}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["N_HKUST619\/17"],"award-info":[{"award-number":["N_HKUST619\/17"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10623-021-00974-5","type":"journal-article","created":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:05:35Z","timestamp":1642205135000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A note on \u201cCryptographically strong permutations from the butterfly structure\u201d"],"prefix":"10.1007","volume":"90","author":[{"given":"Nian","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6044-9561","authenticated-orcid":false,"given":"Maosheng","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,15]]},"reference":[{"issue":"3","key":"974_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ffa.2003.08.004","volume":"10","author":"AW Bluher","year":"2004","unstructured":"Bluher A.W.: On $$x^{q+1}+ax+b$$. Finite Fields Appl. 10(3), 285\u2013305 (2004).","journal-title":"Finite Fields Appl."},{"key":"974_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.46586\/tosc.v2018.i3.290-310","volume":"3","author":"C Boura","year":"2018","unstructured":"Boura C., Canteaut A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290\u2013310 (2018).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"11","key":"974_CR3","doi-asserted-by":"publisher","first-page":"7575","DOI":"10.1109\/TIT.2017.2676807","volume":"63","author":"A Canteaut","year":"2017","unstructured":"Canteaut A., Duval S., Perrin L.: A generalisation of Dillon\u2019s APN permutation with the best known differential and nonlinear properties for all fields of size $$2^{4k+2}$$. IEEE Trans. Inf. Theory 63(11), 7575\u20137591 (2017).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"974_CR4","doi-asserted-by":"crossref","unstructured":"Cid C., Huang T., Peyrin T., Sasaki Y., Song L.: Boomerang Connectivity Table: A New Cryptanalysis Tool, Advances in Cryptology-EUROCRYPT 2018, Part II, pp. 683\u2013714, Lecture Notes in Comput. Sci., vol. 10821. Springer, Cham (2018).","DOI":"10.1007\/978-3-319-78375-8_22"},{"key":"974_CR5","doi-asserted-by":"publisher","first-page":"228","DOI":"10.46586\/tosc.v2017.i2.228-249","volume":"2","author":"S Fu","year":"2017","unstructured":"Fu S., Feng X., Wu B.: Differentially $$4$$-uniform permutations with the best known nonlinearity from butterflies. IACR Trans. Symmetric Cryptol. 2, 228\u2013249 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"974_CR6","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ffa.2007.09.009","volume":"14","author":"T Helleseth","year":"2008","unstructured":"Helleseth T., Kholosha A.: On the equation $$x^{2^l+1}+x+a$$ over $${\\rm GF}(2^k)$$. Finite Fields Appl. 14(1), 159\u2013176 (2008).","journal-title":"Finite Fields Appl."},{"key":"974_CR7","doi-asserted-by":"publisher","first-page":"101690","DOI":"10.1016\/j.ffa.2020.101690","volume":"66","author":"K Li","year":"2020","unstructured":"Li K., Qu L., Li C., Chen H.: On a conjecture about a class of permutation quadrinomials. Finite Fields Appl. 66, 101690 (2020).","journal-title":"Finite Fields Appl."},{"issue":"4","key":"974_CR8","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10623-020-00837-5","volume":"89","author":"K Li","year":"2021","unstructured":"Li K., Li C., Helleseth T., Qu L.: Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89(4), 737\u2013761 (2021).","journal-title":"Des. Codes Cryptogr."},{"key":"974_CR9","unstructured":"Li N., Hu Z., Xiong M., Zeng X.: $$4$$-Uniform BCT permutations from generalized butterfly structure, arXiv:2001.00464."},{"issue":"7","key":"974_CR10","doi-asserted-by":"publisher","first-page":"4845","DOI":"10.1109\/TIT.2021.3062681","volume":"67","author":"N Li","year":"2021","unstructured":"Li N., Xiong M., Zeng X.: On permutation quadrinomials and $$4$$-uniform BCT. IEEE Trans. Inf. Theory 67(7), 4845\u20134855 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"974_CR11","doi-asserted-by":"publisher","first-page":"160","DOI":"10.46586\/tosc.v2018.i1.160-179","volume":"2","author":"Y Li","year":"2018","unstructured":"Li Y., Tian S., Yu Y., Wang M.: On the generalization of butterfly structure. IACR Trans. Symmetric Cryptol. 2, 160\u2013179 (2018).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"974_CR12","volume-title":"Finite Fields, Encyclopedia of Mathematics","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, Encyclopedia of Mathematics, vol. 20. Cambridge University Press, Cambridge (1997)."},{"issue":"4","key":"974_CR13","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s12095-020-00425-3","volume":"12","author":"S Mesnager","year":"2020","unstructured":"Mesnager S., Kim K., Choe J., Lee D., Go D.: Solving $$x+x^{2^l}+\\cdots +x^{2^{ml}}=a$$ over $$\\mathbb{F}_{2^n}$$. Cryptogr. Commun. 12(4), 809\u2013817 (2020).","journal-title":"Cryptogr. Commun."},{"key":"974_CR14","doi-asserted-by":"crossref","unstructured":"Perrin L., Udovenko A., Biryukov A.: Cryptanalysis of a Theorem: Decomposing the only known solution to the big APN problem. In: Robshaw M., Katz J. (eds.) LNCS, vol. 9816, pp. 93\u2013122. Springer (2016).","DOI":"10.1007\/978-3-662-53008-5_4"},{"issue":"6","key":"974_CR15","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1109\/TIT.2020.2969578","volume":"66","author":"Z Tu","year":"2020","unstructured":"Tu Z., Li N., Zeng X., Zhou J.: A class of quadrinomial permutation with boomerang uniformity four. IEEE Trans. Inf. Theory 66(6), 3753\u20133765 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"974_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ffa.2019.04.008","volume":"59","author":"Z Tu","year":"2019","unstructured":"Tu Z., Liu X., Zeng X.: A revisit of a class of permutation quadrinomial. Finite Fields Appl. 59, 57\u201385 (2019).","journal-title":"Finite Fields Appl."},{"key":"974_CR17","doi-asserted-by":"crossref","unstructured":"Wagner D.: The boomerang attack. In: Knudsen L.R. (ed.) FSE\u20191999, LNCS, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999).","DOI":"10.1007\/3-540-48519-8_12"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00974-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00974-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00974-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T18:26:18Z","timestamp":1645727178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00974-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,15]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["974"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00974-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,1,15]]},"assertion":[{"value":"25 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}