{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:43:39Z","timestamp":1774907019299,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s12095-020-00466-8","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T13:26:56Z","timestamp":1610026016000},"page":"295-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["The c-differential behavior of the inverse function under the EA-equivalence"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8622-7120","authenticated-orcid":false,"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Geary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"466_CR1","doi-asserted-by":"crossref","unstructured":"Bartoli, D., Calderini, M.: On construction and (non)existence of c-(almost) perfect nonlinear functions. arXiv:2008.03953 (2020)","DOI":"10.1016\/j.ffa.2021.101835"},{"key":"466_CR2","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10801-019-00899-2","volume":"52","author":"D Bartoli","year":"2020","unstructured":"Bartoli, D., Timpanella, M.: On a generalization of planar functions. J. Algebr. Comb. 52, 187\u2013213 (2020)","journal-title":"J. Algebr. Comb."},{"key":"466_CR3","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0019-9958(67)91016-9","volume":"10","author":"ER Berlekamp","year":"1967","unstructured":"Berlekamp, E. R., Rumsey, H., Solomon, G.: On the solutions of algebraic equations over finite fields. Inf. Control. 10, 553\u2013564 (1967)","journal-title":"Inf. Control."},{"issue":"3","key":"466_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ffa.2003.08.004","volume":"10","author":"AW Bluher","year":"2004","unstructured":"Bluher, A. W.: On xq+\u20091+ax+b. Finite Fields Appl. 10(3), 285\u2013305 (2004)","journal-title":"Finite Fields Appl."},{"key":"466_CR5","doi-asserted-by":"crossref","unstructured":"Borisov, N., Chew, M., Johnson, R., Wagner, D.: Multiplicative differentials. In: Daemen, J., Rijmen, V (eds.) Fast Software Encryption, FSE 2002, LNCS 2365, pp 17\u201333. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45661-9_2"},{"key":"466_CR6","volume-title":"Elements of Mathematics, Algebra II (translated by P. M. Cohn and J. Howie)","author":"N Bourbaki","year":"1990","unstructured":"Bourbaki, N.: Elements of Mathematics, Algebra II (translated by P. M. Cohn and J. Howie). Springer, Berlin (1990)"},{"key":"466_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Berlin (2014)"},{"key":"466_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, pp. 257\u2013397. Cambridge Univ. Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511780448.011"},{"key":"466_CR9","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, pp 398\u2013472. Cambridge Univ. Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511780448.012"},{"key":"466_CR10","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean Functions and Applications, 2nd edn. Academic Press, San Diego (2017)","edition":"2nd edn."},{"key":"466_CR11","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. https:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/Rijndael.pdf"},{"issue":"9","key":"466_CR12","doi-asserted-by":"publisher","first-page":"5781","DOI":"10.1109\/TIT.2020.2971988","volume":"66","author":"P Ellingsen","year":"2020","unstructured":"Ellingsen, P., Felke, P., Riera, C., St\u0103nic\u0103, P., Tkachenko, A.: C-differentials, multiplicative uniformity and (almost) perfect c-nonlinearity. IEEE Trans. Inf. Theory 66(9), 5781\u20135789 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"466_CR13","doi-asserted-by":"publisher","unstructured":"Hasan, S.U., Pal, M., Riera, C., St\u0103nic\u0103, P.: On the c-differential uniformity of certain maps over finite fields. Des. Codes Cryptogr. https:\/\/doi.org\/10.1007\/s10623-020-00812-0 (2020)","DOI":"10.1007\/s10623-020-00812-0"},{"key":"466_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ffa.2007.09.009","volume":"14","author":"T Helleseth","year":"2008","unstructured":"Helleseth, T., Kholosha, A.: On the equation x2\u2113+\u20091 + x + a =\u20090 over GF(2k). Finite Fields Appl. 14, 159\u2013176 (2008)","journal-title":"Finite Fields Appl."},{"issue":"11","key":"466_CR15","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542\u20137553 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"466_CR16","volume-title":"Finite Fields, 2nd edn., vol. 20","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, 2nd edn., vol. 20. Cambridge Univ. Press, Cambridge (1997). Encycl. Math Appl."},{"key":"466_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S.: Bent Functions: Fundamentals and Results. Springer, Berlin (2016)"},{"issue":"1","key":"466_CR18","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1006\/jnth.2001.2701","volume":"92","author":"D Mills","year":"2002","unstructured":"Mills, D.: On the evaluation of Weil Sums of Dembowski\u2013Ostrom polynomials. J. Number Theory 92(1), 87\u201398 (2002)","journal-title":"J. Number Theory"},{"key":"466_CR19","unstructured":"Mesnager, S., Riera, C., St\u0103nic\u0103, P., Zhou, Z., Yan, H.: Investigations on c-(almost) perfect nonlinear functions manuscript (2020)"},{"key":"466_CR20","unstructured":"St\u0103nic\u0103, P.: Investigations on c-boomerang uniformity and perfect nonlinearity. arXiv:2004.11859 (2020)"},{"key":"466_CR21","doi-asserted-by":"crossref","unstructured":"St\u0103nic\u0103, P.: Using double Weil sums in finding the Boomerang and the c-Boomerang Connectivity Table for monomial functions on finite fields. arXiv:2007.09553 (2020)","DOI":"10.1007\/s00200-021-00520-9"},{"key":"466_CR22","volume-title":"Bent Functions, Results and Applications to Cryptography","author":"N Tokareva","year":"2015","unstructured":"Tokareva, N.: Bent Functions, Results and Applications to Cryptography. Academic Press, San Diego (2015)"},{"key":"466_CR23","unstructured":"Zha, Z., Hu, L.: Some classes of power functions with low c-differential uniformity over finite fields. https:\/\/arxiv.org\/pdf\/2008.12183v1.pdf"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00466-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-020-00466-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00466-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T22:09:22Z","timestamp":1670710162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-020-00466-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["466"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00466-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"28 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}