{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:07:29Z","timestamp":1774022849832,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10623-023-01316-3","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T18:01:51Z","timestamp":1700157711000},"page":"467-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the image of an affine subspace under the inverse function within a finite field"],"prefix":"10.1007","volume":"92","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4367-3507","authenticated-orcid":false,"given":"Nikolay","family":"Kolomeec","sequence":"first","affiliation":[]},{"given":"Denis","family":"Bykov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"1316_CR1","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2015","unstructured":"Budaghyan L.: Construction and Analysis of Cryptographic Functions. Springer, Cham (2015)."},{"key":"1316_CR2","doi-asserted-by":"publisher","unstructured":"Burov D.A.: About existence of the special nonlinear invariants for round functions of XSL-ciphers. Diskr. Mat. 33(2), 31\u201345 (2021). https:\/\/doi.org\/10.4213\/dm1638(in Russian).","DOI":"10.4213\/dm1638"},{"key":"1316_CR3","doi-asserted-by":"publisher","unstructured":"Caranti A., Volta F.D., Sala M., Villani F.: Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis. arXiv (2006). https:\/\/doi.org\/10.48550\/ARXIV.MATH\/0606022.","DOI":"10.48550\/ARXIV.MATH\/0606022"},{"key":"1316_CR4","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10623-009-9283-1","volume":"52","author":"A Caranti","year":"2009","unstructured":"Caranti A., Volta F., Sala M.: An application of the O\u2019Nan\u2013Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52, 293\u2013301 (2009). https:\/\/doi.org\/10.1007\/s10623-009-9283-1.","journal-title":"Des. Codes Cryptogr."},{"key":"1316_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s00200-009-0100-x","volume":"20","author":"A Caranti","year":"2009","unstructured":"Caranti A., Volta F., Sala M.: On some block ciphers and imprimitive groups. Appl. Algebra Eng. Commun. Comput. 20, 339\u2013350 (2009). https:\/\/doi.org\/10.1007\/s00200-009-0100-x.","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"1316_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-16277-5_5","volume-title":"Arithmetic of Finite Fields. LNCS","author":"C Carlet","year":"2015","unstructured":"Carlet C.: Open questions on nonlinearity and on APN functions. In: Ko\u00e7 \u00c7.K., Mesnager S., Sava\u015f E. (eds.) Arithmetic of Finite Fields. LNCS, vol. 9061, pp. 83\u2013107. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16277-5_5."},{"key":"1316_CR7","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)."},{"key":"1316_CR8","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES - The Advanced Encryption Standard, p. 238. Springer, Heidelberg (2002) https:\/\/doi.org\/10.1007\/978-3-662-04722-4."},{"key":"1316_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption. LNCS","author":"I Dinur","year":"2011","unstructured":"Dinur I., Shamir A.: Breaking grain-128 with dynamic cube attacks. In: Joux A. (ed.) Fast Software Encryption. LNCS, vol. 6733, pp. 167\u2013187. Springer, Heidelberg (2011)."},{"key":"1316_CR10","doi-asserted-by":"publisher","unstructured":"Dworkin M., Barker E., Nechvatal J., Foti J., Bassham L., Roback E., Dray J.: Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS). National Institute of Standards and Technology, Gaithersburg (2001). https:\/\/doi.org\/10.6028\/NIST.FIPS.197.","DOI":"10.6028\/NIST.FIPS.197"},{"issue":"2","key":"1316_CR11","doi-asserted-by":"publisher","first-page":"287","DOI":"10.2140\/pjm.2006.227.287","volume":"227","author":"D Goldstein","year":"2006","unstructured":"Goldstein D., Guralnick R., Small L., Zelmanov E.: Inversion-invariant additive subgroups of division rings. Pac. J. Math. 227(2), 287\u2013294 (2006). https:\/\/doi.org\/10.2140\/pjm.2006.227.287.","journal-title":"Pac. J. Math."},{"issue":"9","key":"1316_CR12","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1073\/pnas.35.9.533","volume":"35","author":"L-K Hua","year":"1949","unstructured":"Hua L.-K.: Some Properties of a field. Proc. Natl. Acad. Sci. USA 35(9), 533\u2013537 (1949). https:\/\/doi.org\/10.1073\/pnas.35.9.533.","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"1316_CR13","unstructured":"Idrisova V.A., Tokareva N.N., Gorodilova A.A., Beterov I.I., Bonich T.A., Ishchukova E.A., Kolomeec N.A., Kutsenko A.V., Malygina E.S., Pankratova I.A., Pudovkina M.A., Udovenko A.N.: Mathematical problems and solutions of the ninth International Olympiad in cryptography NSUCRYPTO. Prikl. Diskr. Mat. 62 (2023, in press)"},{"key":"1316_CR14","volume-title":"Basic Algebra I","author":"N Jacobson","year":"2009","unstructured":"Jacobson N.: Basic Algebra I, 2nd edn Dover Publications, Mineola (2009).","edition":"2"},{"key":"1316_CR15","doi-asserted-by":"publisher","unstructured":"Leander G., Abdelraheem M.A., AlKhzaimi H., Zenner E.: A Cryptanalysis of PRINTCIPHER: The Invariant Subspace Attack. In: Rogaway, P. (ed.) Advances in Cryptology\u2014CRYPTO 2011. LNCS, vol. 6841, pp. 206\u2013221. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_12.","DOI":"10.1007\/978-3-642-22792-9_12"},{"key":"1316_CR16","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-662-46800-5_11","volume-title":"Advances in cryptology \u2013 EUROCRYPT 2015. LNCS","author":"G Leander","year":"2015","unstructured":"Leander G., Minaud B., R\u00f8njom S.: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. In: Oswald E., Fischlin M. (eds.) Advances in cryptology \u2013 EUROCRYPT 2015. LNCS, vol. 9056, pp. 254\u2013283. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_11."},{"key":"1316_CR17","unstructured":"Lidl R., Niederreiter H.: Finite Fields, 2nd edn. Encyclopedia of Mathematics and its Applications, vol. 20. Cambridge University Press, Cambridge (1997)"},{"key":"1316_CR18","doi-asserted-by":"publisher","DOI":"10.1090\/mmono\/241","volume-title":"Boolean Functions in Coding Theory and Cryptography. Translations of Mathematical Monographs","author":"OA Logachev","year":"2012","unstructured":"Logachev O.A., Salnikov A.A., Yashchenko V.V.: Boolean Functions in Coding Theory and Cryptography. Translations of Mathematical Monographs, vol. 241. American Mathematical Society, Providence (2012)."},{"key":"1316_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11856-007-0050-6","volume":"159","author":"S Mattarei","year":"2007","unstructured":"Mattarei S.: Inverse-closed additive subgroups of fields. Isr. J. Math. 159, 343\u2013347 (2007). https:\/\/doi.org\/10.1007\/s11856-007-0050-6.","journal-title":"Isr. J. Math."},{"key":"1316_CR20","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201993. LNCS","author":"K Nyberg","year":"1994","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Helleseth T. (ed.) Advances in Cryptology \u2014 EUROCRYPT\u201993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_6."},{"key":"1316_CR21","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s00145-018-9285-0","volume":"32","author":"Y Todo","year":"2019","unstructured":"Todo Y., Leander G., Sasaki Y.: Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32, 1383\u20131422 (2019). https:\/\/doi.org\/10.1007\/s00145-018-9285-0.","journal-title":"J. Cryptol."},{"key":"1316_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802318-1.00002-9","volume-title":"Bent Functions: Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva N.: Bent Functions: Results and Applications to Cryptography. Academic Press, New York (2015)."},{"key":"1316_CR23","first-page":"58","volume":"54","author":"DI Trifonov","year":"2021","unstructured":"Trifonov D.I., Fomin D.B.: Invariant subspaces in SPN block cipher. Prikl. Diskr. Mat. 54, 58\u201376 (2021) (in Russian).","journal-title":"Prikl. Diskr. Mat."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01316-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-023-01316-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01316-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T03:32:08Z","timestamp":1709523128000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-023-01316-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,16]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1316"],"URL":"https:\/\/doi.org\/10.1007\/s10623-023-01316-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,16]]},"assertion":[{"value":"27 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}