{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:26Z","timestamp":1772283626168,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,15]],"date-time":"2016-01-15T00:00:00Z","timestamp":1452816000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Self-determined Research Funds of CCNU from the Colleges'basic Research and Operation of MOE","award":["CCNU14Z01002"],"award-info":[{"award-number":["CCNU14Z01002"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61202471"],"award-info":[{"award-number":["61202471"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12095-016-0181-x","type":"journal-article","created":{"date-parts":[[2016,1,15]],"date-time":"2016-01-15T08:17:17Z","timestamp":1452845837000},"page":"363-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["New differentially 4-uniform permutations by modifying the inverse function on subfields"],"prefix":"10.1007","volume":"9","author":[{"given":"Jie","family":"Peng","sequence":"first","affiliation":[]},{"given":"Chik How","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,15]]},"reference":[{"issue":"1","key":"181_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"issue":"3","key":"181_CR2","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1016\/j.ffa.2007.11.002","volume":"14","author":"C Bracken","year":"2008","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl. 14 (3), 703\u2013714 (2008)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"181_CR3","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s12095-010-0038-7","volume":"3","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptogr. Commun. 3(1), 43\u201353 (2011)","journal-title":"Cryptogr. Commun."},{"issue":"4","key":"181_CR4","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.ffa.2010.03.001","volume":"16","author":"C Bracken","year":"2010","unstructured":"Bracken, C., Leander, G.: A highly nonlinearity differentially 4-uniform power mapping that permutes fields of even degree. Finite Fields Appl. 16(4), 231\u2013242 (2010)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"181_CR5","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.ffa.2011.11.006","volume":"18","author":"C Bracken","year":"2012","unstructured":"Bracken, C., Tan, C.H., Tan, Y.: Binomial differentially 4-uniform permutations with high nonlinearity. Finite Fields Appl. 18(3), 537\u2013546 (2012)","journal-title":"Finite Fields Appl."},{"key":"181_CR6","doi-asserted-by":"crossref","unstructured":"Browning, K.A., Dillon, J.F., McQuistan, M.T.: An APN permutation in dimension six. In: Contemporary Mathematics, Vol. 518 (Post Proceedings of the Ninth International Conference on Finite Fields and Their Applications-Fq\u20199), J Am Math Soc, pp. 33\u201342 (2010)","DOI":"10.1090\/conm\/518\/10194"},{"issue":"5","key":"181_CR7","doi-asserted-by":"crossref","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inf. Theory 54(5), 2354\u20132357 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"181_CR8","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150\u2013159 (2009)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"181_CR9","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New class of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"181_CR10","doi-asserted-by":"crossref","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"181_CR11","doi-asserted-by":"crossref","unstructured":"Carlet, C: On known and new differentially uniform functions ACISP, pp. 1\u201315 (2011)","DOI":"10.1007\/978-3-642-22497-3_1"},{"issue":"2","key":"181_CR12","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptsystems. Des. Codes Crypt. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Crypt."},{"key":"181_CR13","unstructured":"Carlet, C., Tang, D., Tang, X.H., Liao, Q.Y.: New construction of differentially 4-uniform bijections. In: Proceedings of INSCRYPT 2013, 9th International Conference, Guangzhou, China, November 27\u201330, 2013, LNCS, 8567, pp. 22\u201338 (2014)"},{"key":"181_CR14","unstructured":"Dillon, J.F.: APN polynomials and related codes. Slides in Banhff Conference (2006)"},{"issue":"1","key":"181_CR15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Advances in Mathematical Communications 3(1), 59\u201381 (2009)","journal-title":"Advances in Mathematical Communications"},{"issue":"1","key":"181_CR16","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.) IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"181_CR17","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T Kasami","year":"1971","unstructured":"Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary reed-muller codes. Inf. Control. 18(4), 369\u2013394 (1971)","journal-title":"Inf. Control."},{"key":"181_CR18","doi-asserted-by":"crossref","unstructured":"Knudsen, L.: Truncated and higher order differentials Lecture Notes in Computer Sciences, volume 1008, FSE 1994, pp. 196\u2013211 (1995)","DOI":"10.1007\/3-540-60590-8_16"},{"issue":"3","key":"181_CR19","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/18.54892","volume":"36","author":"G Lachaud","year":"1990","unstructured":"Lachaud, G., Wolfmann, J.: The weights of the orthogonals of the extended quadratic binary Goppa codes. IEEE Trans. Inf. Theory 36(3), 686\u2013692 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"181_CR20","first-page":"249","volume":"72","author":"YQ Li","year":"2014","unstructured":"Li, Y.Q., Wang, M.S.: Constructing differentially 4-uniform permutations over F 2 2 m $F_{{2}^{2m}}$ from quadratic APN permutations over F 2 2 m + 1 $F_{{2}^{2m+1}}$ . Des. Codes. Cryptogr. 72, 249\u2013264 (2014). doi: 10.1007\/s10623-012-9760-9","journal-title":"Des. Codes. Cryptogr."},{"key":"181_CR21","unstructured":"Li, Y.Q., Wang, M.S., Yu, Y.Y.: Constructing differentially 4-uniform permutations over F 2 2 k $F_{{2}^{2k}}$ from the inverse function revisted. eprint.iacr\/2013\/731 (2013)"},{"key":"181_CR22","volume-title":"The theory of error-correocting codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.: The theory of error-correocting codes. North Holland, Amsterdam (1977)"},{"key":"181_CR23","first-page":"386","volume-title":"Advances in CryptologyEUROCRYPT93","author":"L Matsui","year":"1994","unstructured":"Matsui, L.: Linear cryptanalysis method for DES cipher Advances in CryptologyEUROCRYPT93, pp. 386\u2013397. Springer, Berlin Heidelberg (1994)"},{"key":"181_CR24","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Adances in Cryptography, EUROCRYPT 93 (Lofthus, 1993), LNCS, vol. 765, pp. 55\u201364 (1994)","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"7","key":"181_CR25","doi-asserted-by":"crossref","first-page":"4675","DOI":"10.1109\/TIT.2013.2252420","volume":"59","author":"LJ Qu","year":"2013","unstructured":"Qu, L.J., Tan, Y., Tan, C.H., Li, C.: Constructing differentially 4-uniform permutations over F 2 2 k $F_{{2}^{2k}}$ via the switching method. IEEE Trans. Inf. Theory 59(7), 4675\u20134686 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"181_CR26","author":"LJ Qu","year":"2014","unstructured":"Qu, L.J., Tan, Y., Li, C., Gong, G.: More constructions of differentially 4-uniform permutations on F 2 2 k $F_{{2}^{2k}}$ . Des. Codes. Cryptogr. (2014). doi: 10.1007\/s.10623-014-0006-x","journal-title":"Des. Codes. Cryptogr."},{"key":"181_CR27","doi-asserted-by":"crossref","unstructured":"Tan, Y., Qu, L.J., Tan, C.H., Li, C.: New families of differentially 4-uniform permutations over F 2 2 k $F_{{2}^{2k}}$ . Sequences and Their Applications-SETA 2012, LNCS 7338: pp. 13\u201328 (2012)","DOI":"10.1007\/978-3-642-30615-0_3"},{"key":"181_CR28","author":"D Tang","year":"2014","unstructured":"Tang, D., Carlet, C., Tang, X.: Differentially 4-uniform bijections by permuting the inverse function. Des. Codes. Cryptogr. (2014). doi: 10.1007\/s10623-014-9992-y","journal-title":"Des. Codes. Cryptogr."},{"key":"181_CR29","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ffa.2013.08.003","volume":"25","author":"ZB Zha","year":"2014","unstructured":"Zha, Z.B., Hu, L., Sun, S.W.: Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Appl. 25, 64\u201378 (2014)","journal-title":"Finite Fields Appl."},{"key":"181_CR30","doi-asserted-by":"publisher","unstructured":"Zha, Z.B., Hu, L., Sun, S.W., et al.: Further results on differentially 4-uniform permutations over F 2 2 m $F_{{2}^{2m}}$ . Sci. China Math 58 (2015). doi: 10.1007\/s11425-015-4996-2","DOI":"10.1007\/s11425-015-4996-2"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0181-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0181-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0181-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0181-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T14:40:18Z","timestamp":1567521618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0181-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,15]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["181"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0181-x","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,15]]}}}