{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:05:10Z","timestamp":1772906710293,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["18H01133"],"award-info":[{"award-number":["18H01133"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12095-020-00453-z","type":"journal-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T09:03:36Z","timestamp":1598346216000},"page":"53-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Algebraic manipulation detection codes via highly nonlinear functions"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4681-2066","authenticated-orcid":false,"given":"Minfeng","family":"Shao","sequence":"first","affiliation":[]},{"given":"Ying","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"453_CR1","first-page":"238","volume-title":"Detection of algebraic manipulation in the presence of leakage. Information Theoretic Security - ICITS 2013, Lecture Notes in Computer Science, vol. 8317","author":"H Ahmadi","year":"2013","unstructured":"Ahmadi, H., Safavi-Naini, R.: Detection of algebraic manipulation in the presence of leakage. Information Theoretic Security - ICITS 2013, Lecture Notes in Computer Science, vol. 8317, pp 238\u2013258. Springer, Cham (2013)"},{"key":"453_CR2","first-page":"171","volume-title":"Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. Fault analysis in cryptography","author":"KD Akdemir","year":"2012","unstructured":"Akdemir, K.D., Wang, Z., Karpovsky, M., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. Fault analysis in cryptography, pp 171\u2013199. Springer, Berlin (2012)"},{"key":"453_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.endm.2017.02.002","volume":"57","author":"M Alekseev","year":"2017","unstructured":"Alekseev, M.: On encoding polynomials for strong algebraic manipulation detection codes. Electron Notes Discrete Math. 57, 3\u20138 (2017)","journal-title":"Electron Notes Discrete Math."},{"issue":"2","key":"453_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJERTCS.2015040101","volume":"6","author":"M Alekseev","year":"2015","unstructured":"Alekseev, M.: On strengthening of weak algebraic manipulation detection codes. International Journal of Embedded and Real-Time Communication Systems 6(2), 1\u201326 (2015)","journal-title":"International Journal of Embedded and Real-Time Communication Systems"},{"issue":"6","key":"453_CR5","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1016\/j.disc.2017.10.032","volume":"341","author":"J Bao","year":"2018","unstructured":"Bao, J., Ji, L., Wei, R., Zhang, Y.: New existence and nonexistence results for strong external difference families. Discret. Math. 341(6), 1798\u20131805 (2018)","journal-title":"Discret. Math."},{"issue":"1","key":"453_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"issue":"1","key":"453_CR7","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1137\/S0895480198350057","volume":"13","author":"A Canteaut","year":"2000","unstructured":"Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on $\\mathbb {F}_{2^{m}}$, and cross correlation of maximum-length sequences. SIAM J. Discrete Math. 13(1), 105\u2013138 (2000)","journal-title":"SIAM J. Discrete Math."},{"issue":"2-3","key":"453_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.jco.2003.08.008","volume":"20","author":"C Carlet","year":"2004","unstructured":"Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2-3), 205\u2013244 (2004)","journal-title":"J. Complex."},{"issue":"1","key":"453_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10623-005-6407-0","volume":"40","author":"C Carlet","year":"2006","unstructured":"Carlet, C., Ding, C.: Authentication schemes from highly nonlinear functions. Des. Codes Crypt. 40(1), 71\u201379 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"453_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ffa.2005.07.003","volume":"13","author":"C Carlet","year":"2007","unstructured":"Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite Fields and Their Applications 13(1), 121\u2013135 (2007)","journal-title":"Finite Fields and Their Applications"},{"issue":"3","key":"453_CR11","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/S0304-3975(02)00077-4","volume":"290","author":"S Chanson","year":"2003","unstructured":"Chanson, S., Ding, C., Salomaa, A.: Cartesian authentication codes from functions with optimal nonlinearity. Theor. Comput. Sci. 290(3), 1737\u20131752 (2003)","journal-title":"Theor. Comput. Sci."},{"key":"453_CR12","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J., Dinitz, J.H.: Handbook of Combinatorial Designs. Chapman& hall\/CRC (2007)","DOI":"10.1201\/9781420010541"},{"key":"453_CR13","first-page":"471","volume-title":"Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965","author":"R Cramer","year":"2008","unstructured":"Cramer, R., Dodis, Y., Fehr, S., Padr\u00f3, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, pp 471\u2013488. Springer, Berlin (2008)"},{"issue":"7","key":"453_CR14","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1007\/s11425-013-4654-5","volume":"56","author":"R Cramer","year":"2013","unstructured":"Cramer, R., Fehr, S., Padr\u00f3, C.: Algebraic manipulation codes. Science China Mathematics 56(7), 1349\u20131358 (2013)","journal-title":"Science China Mathematics"},{"key":"453_CR15","first-page":"481","volume-title":"Optimal algebraic manipulation detection codes in the constant-error model. Theory of Cryptography TCC 2015, Lecture Notes in Computer Science, vol. 9014","author":"R Cramer","year":"2015","unstructured":"Cramer, R., Padr\u00f3, C., Xing, C.: Optimal algebraic manipulation detection codes in the constant-error model. Theory of Cryptography TCC 2015, Lecture Notes in Computer Science, vol. 9014, pp 481\u2013501. Springer, Berlin (2015)"},{"key":"453_CR16","unstructured":"Cusick, T.W., Ding, C., Renvall, A.: Stream ciphers and number theory. In: North-Holland Mathematical Library, vol. 55. North-Holland\/Elsevier, Amsterdam (1998)"},{"key":"453_CR17","unstructured":"Dillon, J.F.: Elementary Hadamard Difference Sets. Ph.D, Thesis, University of Maryland (1974)"},{"issue":"1","key":"453_CR18","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/18.904555","volume":"47","author":"C Ding","year":"2001","unstructured":"Ding, C., Helleseth, T., Martinsen, H.M.: New families of binary sequences with optimal three-level autocorrelation. IEEE Trans. Inform. Theory 47 (1), 428\u2013433 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"453_CR19","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Helleseth, T., Kl\u00f8ve, T., Wang, X.: A general construction of authentication codes. IEEE Trans. Inform. Theory 53(6), 2229\u20132235 (2007)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"10","key":"453_CR20","doi-asserted-by":"publisher","first-page":"2421","DOI":"10.1109\/TIT.2004.834788","volume":"50","author":"C Ding","year":"2004","unstructured":"Ding, C., Niederreiter, H.: Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inform. Theory 50(10), 2421\u20132428 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"453_CR21","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1006\/ffta.1997.0200","volume":"4","author":"X Hou","year":"1998","unstructured":"Hou, X.: q-Ary bent functions constructed from chain rings. Finite Fields and Their Applications 4(1), 55\u201361 (1998)","journal-title":"Finite Fields and Their Applications"},{"issue":"3","key":"453_CR22","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.disc.2018.11.009","volume":"342","author":"S Huczynska","year":"2019","unstructured":"Huczynska, S., Paterson, M.B.: Weighted external difference families and R-optimal AMD codes. Discret. Math. 342(3), 855\u2013867 (2019)","journal-title":"Discret. Math."},{"issue":"1","key":"453_CR23","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10801-018-0812-8","volume":"49","author":"J Jedwab","year":"2019","unstructured":"Jedwab, J., Li, S.: Construction and nonexistence of strong external difference families. Journal of Algebraic Combinatorics 49(1), 21\u201348 (2019)","journal-title":"Journal of Algebraic Combinatorics"},{"issue":"9","key":"453_CR24","doi-asserted-by":"publisher","first-page":"6054","DOI":"10.1109\/TIT.2012.2199736","volume":"58","author":"W Jia","year":"2012","unstructured":"Jia, W., Zeng, X., Helleseth, T., Li, C.: A class of binomial bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 58 (9), 6054\u20136063 (2012)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"11","key":"453_CR25","doi-asserted-by":"publisher","first-page":"2716","DOI":"10.1109\/TC.2013.146","volume":"63","author":"M Karpovsky","year":"2013","unstructured":"Karpovsky, M., Wang, Z.: Design of strongly secure communication and computation channels by nonlinear error detecting codes. IEEE Trans. Comput. 63(11), 2716\u20132728 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"453_CR26","doi-asserted-by":"crossref","unstructured":"Levina, A.B., Taranov, S.V., Kaplun, D., Klionskiy, D., Gulvanskii, V.: AMD Codes based on wavelet transform. Progress In Electromagnetics Research Symposium - Fall (PIERS-FALL) - 2017, pp 2534\u20132539 (2017)","DOI":"10.1109\/PIERS-FALL.2017.8293564"},{"key":"453_CR27","doi-asserted-by":"crossref","unstructured":"Levina, A.B., Taranov, S.V.: New construction of algebraic manipulation detection codes based on wavelet transform. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT - 2016, pp 187\u2013192 (2016)","DOI":"10.1109\/FRUCT-ISPIT.2016.7561526"},{"issue":"9","key":"453_CR28","doi-asserted-by":"publisher","first-page":"5760","DOI":"10.1109\/TIT.2014.2339861","volume":"60","author":"N Li","year":"2014","unstructured":"Li, N., Tang, X., Helleseth, T.: New constructions of quadratic bent functions in polynomial form. IEEE Trans. Inform. Theory 60(9), 5760\u20135767 (2014)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"12","key":"453_CR29","doi-asserted-by":"publisher","first-page":"2857","DOI":"10.1007\/s10623-018-0481-6","volume":"86","author":"X Lu","year":"2018","unstructured":"Lu, X., Niu, X., Cao, H.: Some results on generalized strong external difference families. Des. Codes Crypt. 86(12), 2857\u20132868 (2018)","journal-title":"Des. Codes Crypt."},{"key":"453_CR30","first-page":"79","volume":"80","author":"WJ Martin","year":"2017","unstructured":"Martin, W.J., Stinson, D.R.: Some nonexistence results for strong external difference families using character theory. Bull. Inst. Combin. Appl. 80, 79\u201392 (2017)","journal-title":"Bull. Inst. Combin. Appl."},{"key":"453_CR31","first-page":"386","volume-title":"Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT\u201993, Lecture Notes in Computer Science, vol. 765","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT\u201993, Lecture Notes in Computer Science, vol. 765, pp 386\u2013397. Springer, Berlin (1994)"},{"key":"453_CR32","doi-asserted-by":"crossref","unstructured":"Mesnager, S.: Bent functions: Fundamentals and results. Springer (2016)","DOI":"10.1007\/978-3-319-32595-8"},{"issue":"1","key":"453_CR33","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12095-018-0293-6","volume":"11","author":"S Mesnager","year":"2019","unstructured":"Mesnager, S., Zhou, Z., Ding, C.: On the nonlinearity of Boolean functions with restricted input. Cryptogr. Commun. 11(1), 63\u201376 (2019)","journal-title":"Cryptogr. Commun."},{"key":"453_CR34","first-page":"378","volume-title":"Perfect nonlinear S-boxes. Advance in Cryptology - EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547","author":"K Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect nonlinear S-boxes. Advance in Cryptology - EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547, pp 378\u2013386. Springer, Berlin (1991)"},{"issue":"6","key":"453_CR35","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/TIT.1982.1056589","volume":"28","author":"JD Olsen","year":"1982","unstructured":"Olsen, J.D., Scholtz, R.A., abd Welch, L.R.: Bent function sequences. IEEE Trans. Inform. Theory 28(6), 858\u2013864 (1982)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"12","key":"453_CR36","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1016\/j.disc.2016.06.004","volume":"339","author":"MB Paterson","year":"2016","unstructured":"Paterson, M.B., Stinson, D.R.: Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339(12), 2891\u20132906 (2016)","journal-title":"Discret. Math."},{"issue":"3","key":"453_CR37","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. Journal of Combinatorial Theory Series A 20(3), 300\u2013305 (1976)","journal-title":"Journal of Combinatorial Theory Series A"},{"issue":"7","key":"453_CR38","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1007\/s10623-020-00754-7","volume":"88","author":"M Shao","year":"2020","unstructured":"Shao, M., Miao, Y.: On optimal weak algebraic manipulation detection codes and weighted external difference families. Des. Codes Crypt. 88(7), 1349\u20131369 (2020)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"453_CR39","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang, D., Carlet, C., Tang, X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inform. Theory 59(1), 653\u2013664 (2013)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"453_CR40","doi-asserted-by":"crossref","unstructured":"Wang, Z., Karpovsky, M.: Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. IEEE 17th International On-Line Testing Symposium, pp 234\u2013239 (2011)","DOI":"10.1109\/IOLTS.2011.5994535"},{"key":"453_CR41","first-page":"262","volume-title":"Public key encryption against related key attacks. Public Key cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293","author":"H Wee","year":"2012","unstructured":"Wee, H.: Public key encryption against related key attacks. Public Key cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp 262\u2013279. Springer, Berlin (2012)"},{"key":"453_CR42","unstructured":"Wen, J., Yang, M., Feng, K.: The (n, m, k, \u03bb)-strong external difference family with m \u2265\u20095 exists. arXiv:1612.09495v1 (2016)"},{"issue":"5","key":"453_CR43","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1007\/s10623-017-0384-y","volume":"86","author":"J Wen","year":"2018","unstructured":"Wen, J., Yang, M., Fu, F., Feng, K.: Cyclotomic construction of strong external difference families in finite fields. Des. Codes Crypt. 86(5), 1149\u20131159 (2018)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"453_CR44","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TCOMM.2019.2953674","volume":"68","author":"Y Wu","year":"2020","unstructured":"Wu, Y., Li, N., Zeng, X.: Linear codes from perfect nonlinear functions over finite fields. IEEE Trans. Commun. 68(1), 3\u201311 (2020)","journal-title":"IEEE Trans. Commun."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00453-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-020-00453-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00453-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:07:44Z","timestamp":1629850064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-020-00453-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["453"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00453-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"20 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}