{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T03:56:25Z","timestamp":1772855785941,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T00:00:00Z","timestamp":1643414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T00:00:00Z","timestamp":1643414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61761166010"],"award-info":[{"award-number":["61761166010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10623-021-00992-3","type":"journal-article","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T00:02:43Z","timestamp":1643414563000},"page":"545-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Regular complete permutation polynomials over $${\\mathbb {F}}_{2^{n}}$$"],"prefix":"10.1007","volume":"90","author":[{"given":"Xiaofang","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8351-8766","authenticated-orcid":false,"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,29]]},"reference":[{"key":"992_CR1","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/S0021-9800(69)80032-3","volume":"6","author":"S Ahmad","year":"1969","unstructured":"Ahmad S.: Cycle structure of automorphisms of finite cyclic groups. J. Comb. Theory 6, 370\u2013374 (1969).","journal-title":"J. Comb. Theory"},{"issue":"1","key":"992_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.ffa.2010.10.002","volume":"17","author":"A Akbary","year":"2011","unstructured":"Akbary A., Ghioca D., Wang Q.: On constructing permutations of finite fields. Finite Fields Appl. 17(1), 51\u201367 (2011).","journal-title":"Finite Fields Appl."},{"key":"992_CR3","first-page":"45","volume":"2887","author":"A Biryukov","year":"2003","unstructured":"Biryukov A.: Analysis of involutional ciphers: Khazad and Anubis. Fast Softw. Encryption 2887, 45\u201353 (2003).","journal-title":"Fast Softw. Encryption"},{"key":"992_CR4","first-page":"208","volume":"7658","author":"J Borghoff","year":"2012","unstructured":"Borghoff J., Canteaut A., G\u00fcneysu T., Kavun E.B., Knezevic M., Knudsen L.R., Leander G., Nikov V., Paar C.C., Rechberger C., Rombouts P., Thomsen S., Yal\u00e7in T.: PRINCE: a low-latency block cipher for pervasive computing applications. Adv. Cryptol. 7658, 208\u2013225 (2012).","journal-title":"Adv. Cryptol."},{"key":"992_CR5","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1016\/j.ffa.2007.08.003","volume":"14","author":"A \u00c7e\u015fmelio\u011flu","year":"2008","unstructured":"\u00c7e\u015fmelio\u011flu A., Meidl W., Topuzo\u011flu A.: On the cycle structure of permutation polynomials. Finite Fields Appl. 14, 593\u2013614 (2008).","journal-title":"Finite Fields Appl."},{"issue":"4","key":"992_CR6","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIT.2016.2526022","volume":"62","author":"P Charpin","year":"2016","unstructured":"Charpin P., Mesnager S., Sarkar S.: Involutions over the Galois field $${\\mathbb{F}}_{2^n}$$. IEEE Trans. Inf. Theory 62(4), 2266\u20132276 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"992_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1142\/9789814719261_0003","volume-title":"Dickson Polynomials that are Involutions. Contemporary Developments in Finite Fields and Their Applications","author":"P Charpin","year":"2016","unstructured":"Charpin P., Mesnager S., Sarkar S.: Dickson Polynomials that are Involutions. Contemporary Developments in Finite Fields and Their Applications, pp. 22\u201345. World Scientific Press, Singapore (2016)."},{"key":"992_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2021.101847","volume":"73","author":"Y Chen","year":"2021","unstructured":"Chen Y., Wang L., Zhu S.: On the constructions of $$n$$-cycle permutations. Finite Fields Appl. 73, 101847 (2021).","journal-title":"Finite Fields Appl."},{"key":"992_CR9","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, New York (2013)."},{"key":"992_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.ffa.2019.01.003","volume":"57","author":"X Feng","year":"2019","unstructured":"Feng X., Lin D., Wang L., Wang Q.: Further results on complete permutation monomials over finite fields. Finite Fields Appl. 57, 47\u201359 (2019).","journal-title":"Finite Fields Appl."},{"issue":"2","key":"992_CR11","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1137\/1024041","volume":"24","author":"H Fredricksen","year":"1982","unstructured":"Fredricksen H.: A survey of full length nonlinear shift register cycle algorithms. SIAM Rev. 24(2), 195\u2013221 (1982).","journal-title":"SIAM Rev."},{"issue":"2","key":"992_CR12","doi-asserted-by":"publisher","first-page":"283","DOI":"10.2140\/pjm.1981.92.283","volume":"92","author":"RJ Friedlander","year":"1981","unstructured":"Friedlander R.J., Gordon B., Tannenbaum P.: Partitions of groups and complete mappings. Pac. J. Math. 92(2), 283\u2013293 (1981).","journal-title":"Pac. J. Math."},{"key":"992_CR13","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1007\/s10623-020-00721-2","volume":"88","author":"D Gerike","year":"2020","unstructured":"Gerike D., Kyureghyan G.M.: Permutations on finite fields with invariant cycle structure on lines. Des. Codes Cryptogr. 88, 1723\u20131740 (2020).","journal-title":"Des. Codes Cryptogr."},{"key":"992_CR14","volume-title":"Shift Register Sequences","author":"SW Golomb","year":"1967","unstructured":"Golomb S.W.: Shift Register Sequences. Holden-Day Inc, Laguna Hills (1967)."},{"key":"992_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar","author":"SW Golomb","year":"2005","unstructured":"Golomb S.W., Gong G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2005)."},{"key":"992_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-56755-1_15","volume-title":"Constructions of Orthomorphisms of $${\\mathbb{Z}}_2^n$$. Finite Fields and Applications","author":"SW Golomb","year":"2001","unstructured":"Golomb S.W., Gong G., Mittenthal L.: Constructions of Orthomorphisms of $${\\mathbb{Z}}_2^n$$. Finite Fields and Applications, pp. 178\u2013195. Springer, Berlin (2001)."},{"key":"992_CR17","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.ffa.2017.11.011","volume":"50","author":"R Gupta","year":"2018","unstructured":"Gupta R., Sharma R.K.: Further results on permutation polynomials of the form $$(x^{p^m}-x+\\delta )^s+x$$ over $${\\mathbb{F}}_{p^{2m}}$$. Finite Fields Appl. 50, 196\u2013208 (2018).","journal-title":"Finite Fields Appl."},{"issue":"1","key":"992_CR18","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ffa.2005.08.003","volume":"13","author":"Y Laigle-Chapuy","year":"2007","unstructured":"Laigle-Chapuy Y.: Permutation polynomials and applications to coding theory. Finite Fields Appl. 13(1), 58\u201370 (2007).","journal-title":"Finite Fields Appl."},{"key":"992_CR19","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ffa.2018.10.001","volume":"55","author":"L Li","year":"2019","unstructured":"Li L., Li C., Li C., Zeng X.: New classes of complete permutation polynomials. Finite Fields Appl. 55, 177\u2013201 (2019).","journal-title":"Finite Fields Appl."},{"key":"992_CR20","first-page":"1","volume":"33","author":"R Lidl","year":"1991","unstructured":"Lidl R., Mullen G.L.: Cycle structure of Dickson permutation polynomials. Math. J. Okayama Univ. 33, 1\u201311 (1991).","journal-title":"Math. J. Okayama Univ."},{"key":"992_CR21","volume-title":"Finite Fields, Encyclopedia of Mathematics and its Applications","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, Encyclopedia of Mathematics and its Applications, vol. 20, 2nd edn Cambridge University Press, Cambridge (1997).","edition":"2"},{"key":"992_CR22","volume-title":"Complete Mapping and Application in Cryptography","author":"S Lv","year":"2008","unstructured":"Lv S., Fan X., Wang Z., Xu L., Zhang J.: Complete Mapping and Application in Cryptography. Press of University of Science and Technology of China, Hefei (2008)."},{"issue":"10","key":"992_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1006\/aama.1995.1003","volume":"16","author":"L Mittenthal","year":"1995","unstructured":"Mittenthal L.: Block substitutions using orthomorphic mappings. Adv. Appl. Math. 16(10), 59\u201371 (1995).","journal-title":"Adv. Appl. Math."},{"key":"992_CR24","unstructured":"Mittenthal L.: Nonlinear dynamic substitution devices and methods for block substitutions employing coset decompositions and direct geometric generation. US Patent 5647001 (1997)."},{"key":"992_CR25","doi-asserted-by":"publisher","DOI":"10.1201\/b15006","volume-title":"Handbook of Finite Fields","author":"GL Mullen","year":"2013","unstructured":"Mullen G.L., Panario D.: Handbook of Finite Fields. Taylor-Francis, Boca Raton (2013)."},{"key":"992_CR26","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.ffa.2013.10.008","volume":"25","author":"A Muratovi\u0107-Ribi\u0107","year":"2014","unstructured":"Muratovi\u0107-Ribi\u0107 A., Pasalic E.: A note on complete polynomials over finite fields and their applications in cryptography. Finite Fields Appl. 25, 306\u2013315 (2014).","journal-title":"Finite Fields Appl."},{"key":"992_CR27","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.disc.2004.12.011","volume":"295","author":"H Niederreiter","year":"2005","unstructured":"Niederreiter H., Winterhof A.: Cyclotomic $${\\cal{R}}$$-orthomorphisms of finite fields. Discret. Math. 295, 161\u2013171 (2005).","journal-title":"Discret. Math."},{"key":"992_CR28","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s12095-019-00386-2","volume":"12","author":"T Niu","year":"2020","unstructured":"Niu T., Li K., Qu L., Wang Q.: New constructions of involutions over finite fields. Cryptogr. Commun. 12, 165\u2013185 (2020).","journal-title":"Cryptogr. Commun."},{"key":"992_CR29","doi-asserted-by":"crossref","unstructured":"Rubio I., Corrada C.: Cyclic decomposition of permutations of finite fields obtained using monomials, Finite Fields and Applications, LNCS 2948, pp. 254\u2013261, Springer, New York (2004).","DOI":"10.1007\/978-3-540-24633-6_19"},{"key":"992_CR30","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1090\/conm\/461\/08996","volume":"461","author":"I Rubio","year":"2008","unstructured":"Rubio I., Mullen G.L., Corrada C., Castro F.N.: Dickson permutation polynomials that decompose in cycles of the same length. Contemp. Math. 461, 229\u2013240 (2008).","journal-title":"Contemp. Math."},{"issue":"3","key":"992_CR31","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3934\/amc.2012.6.347","volume":"6","author":"A Sakzad","year":"2012","unstructured":"Sakzad A., Sadeghi M.R., Panario D.: Cycle structure of permutation functions over finite fields and their applications. Adv. Math. Commun. 6(3), 347\u2013361 (2012).","journal-title":"Adv. Math. Commun."},{"issue":"5","key":"992_CR32","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1515\/ms-2017-0037","volume":"67","author":"S Samardjiska","year":"2017","unstructured":"Samardjiska S., Gligoroski D.: Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares. Math. Slovaca 67(5), 1129\u20131146 (2017).","journal-title":"Math. Slovaca"},{"key":"992_CR33","doi-asserted-by":"crossref","unstructured":"Schnorr C.P., Vaudenay S.: Black box cryptanalysis of hash networks based on multipermutations, Advances in Cryptology-Eurocrypt\u201994, pp. 47\u201357. Springer, New York (1995).","DOI":"10.1007\/BFb0053423"},{"key":"992_CR34","unstructured":"Specification of SMS4, block cipher for WLAN products-SMS4 (in Chinese), http:\/\/www.sca.gov.cn\/sca\/c100061\/201611\/1002423\/files\/330480f731f64e1ea75138211ea0dc27.pdf."},{"key":"992_CR35","doi-asserted-by":"publisher","first-page":"4064","DOI":"10.1109\/TIT.2012.2186785","volume":"58","author":"P St\u01cenic\u01ce","year":"2012","unstructured":"St\u01cenic\u01ce P., Gangopadhyay S., Chaturvedi A., Gangopadhyay A.K., Maitra S.: Investigations on bent and negabent functions via the negaHadamard transform. IEEE Trans. Inf. Theory 58, 4064\u20134072 (2012).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"992_CR36","doi-asserted-by":"crossref","unstructured":"Wang Q.: Cyclotomic mapping permutation polynomials over finite fields. Proceedings of the 2007 international conference on Sequences, subsequences, and consequences (SSC 2007), pp. 119\u2013128, Los Angeles, CA, USA (2007).","DOI":"10.1007\/978-3-540-77404-4_11"},{"key":"992_CR37","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ffa.2013.02.005","volume":"22","author":"Q Wang","year":"2013","unstructured":"Wang Q.: Cyclotomy and permutation polynomials of large indices. Finite Fields Appl. 22, 57\u201369 (2013).","journal-title":"Finite Fields Appl."},{"key":"992_CR38","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.ffa.2017.01.006","volume":"45","author":"Q Wang","year":"2016","unstructured":"Wang Q.: A note on inverses of cyclotomic mapping permutation polynomials over finite fields. Finite Fields Appl. 45, 422\u2013427 (2016).","journal-title":"Finite Fields Appl."},{"key":"992_CR39","doi-asserted-by":"crossref","unstructured":"Wang Q.: Polynomials over finite fields: an index approach. In: Proceedings of Pseudo-Randomness and Finite Fields, Multivariate Algorithms and their Foundations in Number Theory, October 15\u201319, Linz, 2018, Combinatorics and Finite Fields, Difference Sets, Polynomials, Pseudorandomness and Applications, pp. 319\u2013348 (2019).","DOI":"10.1515\/9783110642094-015"},{"issue":"10","key":"992_CR40","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1007\/s10623-020-00768-1","volume":"88","author":"M Wu","year":"2020","unstructured":"Wu M., Li C., Wang Z.: Characterizations and constructions of triple-cycle permutations of the form $$x^rh(x^s)$$. Des. Codes Cryptogr. 88(10), 2119\u20132132 (2020).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00992-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00992-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00992-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T10:08:25Z","timestamp":1646647705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00992-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,29]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["992"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00992-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,29]]},"assertion":[{"value":"17 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}