{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:58:13Z","timestamp":1765357093293,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["411879806","411879806"],"award-info":[{"award-number":["411879806","411879806"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this work, we study functions that can be obtained by restricting a vectorial Boolean function<jats:inline-formula><jats:alternatives><jats:tex-math>$$F :\\mathbb {F}_{2}^n \\rightarrow \\mathbb {F}_{2}^n$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mi>F<\/mml:mi><mml:mo>:<\/mml:mo><mml:msubsup><mml:mi>F<\/mml:mi><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mi>n<\/mml:mi><\/mml:msubsup><mml:mo>\u2192<\/mml:mo><mml:msubsup><mml:mi>F<\/mml:mi><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mi>n<\/mml:mi><\/mml:msubsup><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>to an affine hyperplane of dimension<jats:inline-formula><jats:alternatives><jats:tex-math>$$n-1$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mi>n<\/mml:mi><mml:mo>-<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>and then projecting the output to an<jats:inline-formula><jats:alternatives><jats:tex-math>$$n-1$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mi>n<\/mml:mi><mml:mo>-<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>-dimensional space. We show that a multiset of<jats:inline-formula><jats:alternatives><jats:tex-math>$$2 \\cdot (2^n-1)^2$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mn>2<\/mml:mn><mml:mo>\u00b7<\/mml:mo><mml:msup><mml:mrow><mml:mo>(<\/mml:mo><mml:msup><mml:mn>2<\/mml:mn><mml:mi>n<\/mml:mi><\/mml:msup><mml:mo>-<\/mml:mo><mml:mn>1<\/mml:mn><mml:mo>)<\/mml:mo><\/mml:mrow><mml:mn>2<\/mml:mn><\/mml:msup><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>EA-equivalence classes of such restrictions defines an EA-invariant for vectorial Boolean functions on<jats:inline-formula><jats:alternatives><jats:tex-math>$$\\mathbb {F}_{2}^n$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:msubsup><mml:mi>F<\/mml:mi><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mi>n<\/mml:mi><\/mml:msubsup><\/mml:math><\/jats:alternatives><\/jats:inline-formula>. Further, for all of the known quadratic APN functions in dimension<jats:inline-formula><jats:alternatives><jats:tex-math>$$n &lt; 10$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mi>n<\/mml:mi><mml:mo>&lt;<\/mml:mo><mml:mn>10<\/mml:mn><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>, we determine the restrictions that are also APN. Moreover, we construct 6368 new quadratic APN functions in dimension eight up to EA-equivalence by extending a quadratic APN function in dimension seven. A special focus of this work is on quadratic APN functions with maximum linearity. In particular, we characterize a quadratic APN function<jats:inline-formula><jats:alternatives><jats:tex-math>$$F :\\mathbb {F}_{2}^n \\rightarrow \\mathbb {F}_{2}^n$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow><mml:mi>F<\/mml:mi><mml:mo>:<\/mml:mo><mml:msubsup><mml:mi>F<\/mml:mi><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mi>n<\/mml:mi><\/mml:msubsup><mml:mo>\u2192<\/mml:mo><mml:msubsup><mml:mi>F<\/mml:mi><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><mml:mi>n<\/mml:mi><\/mml:msubsup><\/mml:mrow><\/mml:math><\/jats:alternatives><\/jats:inline-formula>with linearity of<jats:inline-formula><jats:alternatives><jats:tex-math>$$2^{n-1}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:msup><mml:mn>2<\/mml:mn><mml:mrow><mml:mi>n<\/mml:mi><mml:mo>-<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:msup><\/mml:math><\/jats:alternatives><\/jats:inline-formula>by a property of the ortho-derivative of its restriction to a linear hyperplane. Using the fact that all quadratic APN functions in dimension seven are classified, we are able to obtain a classification of all quadratic 8-bit APN functions with linearity<jats:inline-formula><jats:alternatives><jats:tex-math>$$2^7$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:msup><mml:mn>2<\/mml:mn><mml:mn>7<\/mml:mn><\/mml:msup><\/mml:math><\/jats:alternatives><\/jats:inline-formula>up to EA-equivalence.<\/jats:p>","DOI":"10.1007\/s10623-022-01024-4","type":"journal-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T12:09:01Z","timestamp":1647000541000},"page":"1009-1036","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Trims and extensions of quadratic APN functions"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5558-0722","authenticated-orcid":false,"given":"Christof","family":"Beierle","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2579-8587","authenticated-orcid":false,"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4722-7005","authenticated-orcid":false,"given":"L\u00e9o","family":"Perrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,11]]},"reference":[{"issue":"7","key":"1024_CR1","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1109\/TIT.2021.3071533","volume":"67","author":"C Beierle","year":"2021","unstructured":"Beierle C., Brinkmann M., Leander G.: Linearly self-equivalent APN permutations in small dimension. IEEE Trans. Inf. Theory 67(7), 4863\u20134875 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1024_CR2","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TIT.2021.3120698","volume":"68","author":"C Beierle","year":"2022","unstructured":"Beierle C., Leander G.: New instances of quadratic APN functions. IEEE Trans. Inf. Theory 68(1), 670\u2013678 (2022).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1024_CR3","doi-asserted-by":"publisher","unstructured":"Beierle C., Leander G., Perrin L.: Quadratic APN Extensions. https:\/\/doi.org\/10.5281\/zenodo.5821018. Dataset (Version 2.0)","DOI":"10.5281\/zenodo.5821018"},{"key":"1024_CR4","doi-asserted-by":"publisher","unstructured":"Beierle C., Leander G., Perrin L.: Supplementary Code to Trims and Extensions of Quadratic APN Functions. https:\/\/doi.org\/10.5281\/zenodo.5871840. Software (Version v1)","DOI":"10.5281\/zenodo.5871840"},{"key":"1024_CR5","unstructured":"Boolean Function Wiki: CCZ-inequivalent representatives from the known APN families for dimensions up to 11 (2021). https:\/\/boolean.h.uib.no\/mediawiki\/index.php\/CCZ-inequivalent_representatives_from_the_known_APN_families_for_dimensions_up_to_11. Accessed 30 Aug 2021."},{"issue":"1\u20133","key":"1024_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann M., Leander G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49(1\u20133), 273\u2013288 (2008).","journal-title":"Des. Codes Cryptogr."},{"issue":"8","key":"1024_CR7","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan L., Calderini M., Carlet C., Coulter R.S., Villa I.: Constructing APN functions through isotopic shifts. IEEE Trans. Inf. Theory 66(8), 5299\u20135309 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1024_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10623-020-00803-1","volume":"89","author":"L Budaghyan","year":"2021","unstructured":"Budaghyan L., Calderini M., Carlet C., Coulter R.S., Villa I.: Generalized isotopic shift construction for APN functions. Des. Codes Cryptogr. 89(1), 19\u201332 (2021).","journal-title":"Des. Codes Cryptogr."},{"key":"1024_CR9","doi-asserted-by":"crossref","unstructured":"Budaghyan L., Carlet C., Leander G.: On a construction of quadratic APN functions. In: 2009 IEEE Information Theory Workshop, pp. 374\u2013378 (2009). IEEE.","DOI":"10.1109\/ITW.2009.5351383"},{"issue":"2","key":"1024_CR10","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan L., Carlet C., Leander G.: Constructing new APN functions from known ones. Finite Fields Their Appl. 15(2), 150\u2013159 (2009).","journal-title":"Finite Fields Their Appl."},{"issue":"5","key":"1024_CR11","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s12095-020-00427-1","volume":"12","author":"M Calderini","year":"2020","unstructured":"Calderini M.: On the EA-classes of known APN functions in small dimensions. Cryptogr. Commun. 12(5), 821\u2013840 (2020).","journal-title":"Cryptogr. Commun."},{"key":"1024_CR12","unstructured":"Canteaut A., Couvreur A., Perrin L.: Recovering or testing extended-affine equivalence (2021). arXiv:2103.00078."},{"issue":"9","key":"1024_CR13","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.1109\/TIT.2017.2761392","volume":"64","author":"C Carlet","year":"2018","unstructured":"Carlet C.: Characterizations of the differential uniformity of vectorial functions by the Walsh transform. IEEE Trans. Inf. Theory 64(9), 6443\u20136453 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1024_CR14","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)."},{"issue":"2","key":"1024_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.A.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"1024_CR16","doi-asserted-by":"crossref","unstructured":"Chabaud F., Vaudenay S.: Links between differential and linear cryptanalysis. In: Santis A.D. (ed.) Advances in Cryptology\u2014EUROCRYPT \u201994, Proceedings, vol. 950, pp. 356\u2013365. LNCS. Springer, Berlin (1994).","DOI":"10.1007\/BFb0053450"},{"issue":"1","key":"1024_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel Y., Pott A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009).","journal-title":"Adv. Math. Commun."},{"issue":"4","key":"1024_CR18","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1515\/dma-2016-0017","volume":"26","author":"AA Gorodilova","year":"2016","unstructured":"Gorodilova A.A.: Characterization of almost perfect nonlinear functions in terms of subfunctions. Discret. Math. Appl. 26(4), 193\u2013202 (2016).","journal-title":"Discret. Math. Appl."},{"issue":"1","key":"1024_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s12095-018-0310-9","volume":"11","author":"V Idrisova","year":"2019","unstructured":"Idrisova V.: On an algorithm generating 2-to-1 APN functions and its applications to \u201cthe big APN problem\u2019\u2019. Cryptogr. Commun. 11(1), 21\u201339 (2019).","journal-title":"Cryptogr. Commun."},{"key":"1024_CR20","first-page":"1515","volume":"2020","author":"K Kalgin","year":"2020","unstructured":"Kalgin K., Idrisova V.: The classification of quadratic APN functions in 7 variables. IACR Cryptol. ePrint Arch. 2020, 1515 (2020).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1024_CR21","unstructured":"Langevin P.: Classification of APN cubics in dimension 6 over GF(2) (2012). http:\/\/langevin.univ-tln.fr\/project\/apn-6\/apn-6.html. Accessed 30 Aug 2021."},{"key":"1024_CR22","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Helleseth T. (ed.) Advances in Cryptology\u2014EUROCRYPT \u201993, Proceedings, vol. 765, pp. 55\u201364. LNCS. Springer, Heidelberg (1993).","DOI":"10.1007\/3-540-48285-7_6"},{"key":"1024_CR23","doi-asserted-by":"crossref","unstructured":"Nyberg K.: S-boxes and round functions with controllable linearity and differential uniformity. In: Preneel B. (ed.) Fast Software Encryption: Second International Workshop, Proceedings, vol. 1008, pp. 111\u2013130. LNCS. Springer, Berlin (1994).","DOI":"10.1007\/3-540-60590-8_9"},{"key":"1024_CR24","doi-asserted-by":"crossref","unstructured":"Nyberg K., Knudsen L.R.: Provable security against differential cryptanalysis. In: Brickell E.F. (ed.) Advances in Cryptology\u2014CRYPTO \u201992, Proceedings, vol. 740, pp. 566\u2013574. LNCS. Springer, Berlin (1992).","DOI":"10.1007\/3-540-48071-4_41"},{"key":"1024_CR25","unstructured":"Perrin L.: sboxU. GitHub repository (2017). https:\/\/github.com\/lpp-crypto\/sboxU"},{"key":"1024_CR26","unstructured":"Sage Developers: SageMath, the Sage Mathematics Software System (Version 9.3) (2021). https:\/\/www.sagemath.org"},{"issue":"9","key":"1024_CR27","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s10623-018-00598-2","volume":"87","author":"H Taniguchi","year":"2019","unstructured":"Taniguchi H.: On some quadratic APN functions. Des. Codes Cryptogr. 87(9), 1973\u20131983 (2019).","journal-title":"Des. Codes Cryptogr."},{"key":"1024_CR28","unstructured":"Weng G., Tan Y., Gong G.: On quadratic almost perfect nonlinear functions and their related algebraic object. In: Workshop on Coding and Cryptography (WCC) (2013)."},{"key":"1024_CR29","doi-asserted-by":"crossref","unstructured":"Yu Y., Kaleyski N., Budaghyan L., Li Y.: Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9. Finite Fields and Their Applications 68, 101733 (2020).","DOI":"10.1016\/j.ffa.2020.101733"},{"key":"1024_CR30","first-page":"574","volume":"2021","author":"Y Yu","year":"2021","unstructured":"Yu Y., Perrin L.: Constructing more quadratic APN functions with the QAM method. IACR Cryptol. ePrint Arch. 2021, 574 (2021).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1024_CR31","first-page":"7","volume":"2013","author":"Y Yu","year":"2013","unstructured":"Yu Y., Wang M., Li Y.: A matrix approach for constructing quadratic APN functions. IACR Cryptol. ePrint Arch. 2013, 7 (2013).","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"2","key":"1024_CR32","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu Y., Wang M., Li Y.: A matrix approach for constructing quadratic APN functions. Des. Codes Cryptogr. 73(2), 587\u2013600 (2014).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01024-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01024-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01024-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T21:23:32Z","timestamp":1674941012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01024-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,11]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1024"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01024-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,3,11]]},"assertion":[{"value":"30 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All Authors declare that they have no competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}