{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:42:48Z","timestamp":1761061368646,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12095-021-00476-0","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T11:17:36Z","timestamp":1615893456000},"page":"377-391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1223-3093","authenticated-orcid":false,"given":"Faruk","family":"G\u00f6lo\u011flu","sequence":"first","affiliation":[]},{"given":"Ji\u0159\u00ed","family":"Pavlu\u0307","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"476_CR1","doi-asserted-by":"crossref","unstructured":"Berger, T.P., Canteaut, A., Charpin, P., Laigle-Chapuy, Y.: On almost perfect nonlinear functions over $\\mathbb {F}_{2^{n}}$. IEEE Trans. Inf. Theor. 52(9), 4160\u20134170 (2006)","DOI":"10.1109\/TIT.2006.880036"},{"key":"476_CR2","doi-asserted-by":"crossref","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: On the Walsh spectrum of a new APN function. In: S.D. Galbraith (ed.) Cryptography and Coding, 11th IMA International Conference, Cirencester, Proceedings, Lecture Notes in Computer Science, vol. 4887, pp. 92\u201398. Springer (2007)","DOI":"10.1007\/978-3-540-77272-9_6"},{"key":"476_CR3","doi-asserted-by":"crossref","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl 14(3), 703\u2013714 (2008)","DOI":"10.1016\/j.ffa.2007.11.002"},{"key":"476_CR4","doi-asserted-by":"crossref","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptography and Communications 3(1), 43\u201353 (2011)","DOI":"10.1007\/s12095-010-0038-7"},{"key":"476_CR5","unstructured":"Browning, K., Dillon, J., Kibler, R., McQuistan, M.: APN polynomials and related codes. J. Comb. Inf. Syst. Sci. 34(1-4), 135\u2013159 (2009)"},{"key":"476_CR6","doi-asserted-by":"crossref","unstructured":"Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. In: Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, pp. 33\u201342. American Mathematical Society (AMS), Providence (2010)","DOI":"10.1090\/conm\/518\/10194"},{"key":"476_CR7","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Calderini, M., Villa, I.: On equivalence between known families of quadratic APN functions. Finite Fields and Their Applications 66, 101704 (2020)","DOI":"10.1016\/j.ffa.2020.101704"},{"key":"476_CR8","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inform. Theory 54(5), 2354\u20132357 (2008)","DOI":"10.1109\/TIT.2008.920246"},{"key":"476_CR9","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Felke, P., Leander, G.: An infinite class of quadratic APN functions which are not equivalent to power mappings. In: 2006 IEEE International Symposium on Information Theory, pp. 2637\u20132641 (2006)","DOI":"10.1109\/ISIT.2006.262131"},{"key":"476_CR10","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Helleseth, T., Kaleyski, N.: On the distance between APN functions. IEEE Transactions on Information Theory 66(9), pp. 5742-5753, (2020)","DOI":"10.1109\/TIT.2020.2983684"},{"key":"476_CR11","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theor. 54(9), 4218\u20134229 (2008)","DOI":"10.1109\/TIT.2008.928275"},{"key":"476_CR12","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields and Their Applications 15(2), 150\u2013159 (2009)","DOI":"10.1016\/j.ffa.2008.10.001"},{"key":"476_CR13","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In: 2009 IEEE Information Theory Workshop, pp. 374\u2013378 (2009)","DOI":"10.1109\/ITW.2009.5351383"},{"key":"476_CR14","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Transactions on Information Theory, 66(11), pp. 7081\u20137087, (2020)","DOI":"10.1109\/TIT.2020.3007513"},{"key":"476_CR15","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Helleseth, T., Li, N., Sun, B.: Some results on the known classes of quadratic APN functions. In: Codes, cryptology and information security, Lecture Notes in Comput. Sci., vol. 10194, pp. 3\u201316. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-55589-8_1"},{"key":"476_CR16","doi-asserted-by":"crossref","unstructured":"Calderini, M., Sala, M., Villa, I.: A note on APN permutations in even dimension. Finite Fields Appl. 46, 1\u201316 (2017)","DOI":"10.1016\/j.ffa.2017.02.001"},{"key":"476_CR17","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial Boolean functions for cryptography. In: Y. Crama, P.L. Hammer (eds.) Boolean models and methods in mathematics, computer science, and engineering, Encyclopedia of Mathematics and its Applications, vol. 134, pp. xx+\u2009759. Cambridge University Press, Cambridge (2010)","DOI":"10.1017\/CBO9780511780448.012"},{"key":"476_CR18","doi-asserted-by":"crossref","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.A.: Codes, bent functions and permutations suitable for des-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","DOI":"10.1023\/A:1008344232130"},{"key":"476_CR19","doi-asserted-by":"crossref","unstructured":"Carlitz, L.: Explicit evaluation of certain exponential sums. Math. Scand. 44(1), 5\u201316 (1979)","DOI":"10.7146\/math.scand.a-11793"},{"key":"476_CR20","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): The Niho case. Information and Computation 151(1), 57\u201372 (1999)","DOI":"10.1006\/inco.1998.2764"},{"key":"476_CR21","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): The Welch case 45, 1271 \u2013 1275 (1999) Information Theory, IEEE Transactions on 45(06 1999), 1271\u20131275","DOI":"10.1109\/18.761283"},{"key":"476_CR22","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): A new case for n divisible by 5. In: Jungnickel, D., Niederreiter, H. (eds.) Finite Fields and Applications, pp. 113\u2013121. Springer Berlin Heidelberg, Berlin, Heidelberg (2001)","DOI":"10.1007\/978-3-642-56755-1_11"},{"key":"476_CR23","doi-asserted-by":"crossref","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.). IEEE Trans. Inf. Theor. 14(1), 154\u2013156 (1968)","DOI":"10.1109\/TIT.1968.1054106"},{"key":"476_CR24","doi-asserted-by":"crossref","unstructured":"G\u00f6lo\u011flu, F., Langevin, P.: Almost perfect nonlinear families which are not equivalent to permutations. Finite Fields and Their Applications 67, 101707 (2020)","DOI":"10.1016\/j.ffa.2020.101707"},{"key":"476_CR25","unstructured":"Hou, X.d.: Affinity of permutations of $\\mathbb {F_{2}^{n}}$. Discrete Appl. Math. 154(2), 313\u2013325 (2006)"},{"key":"476_CR26","doi-asserted-by":"crossref","unstructured":"Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary reed-muller codes. Information and Control 18(4), 369\u2013394 (1971)","DOI":"10.1016\/S0019-9958(71)90473-6"},{"key":"476_CR27","doi-asserted-by":"crossref","unstructured":"Lidl, R., Niederreiter, H.: Finite fields and their applications. In: Handbook of algebra, vol. 1. Amsterdam, North-Holland (1996)","DOI":"10.1017\/CBO9780511525926"},{"key":"476_CR28","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: T. Helleseth (ed.) Advances in Cryptology \u2014 EUROCRYPT \u201993, pp. 55\u201364. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48285-7_6"},{"key":"476_CR29","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. In: Preneel, B. (ed.) Fast Software Encryption, pp. 111\u2013130. Springer, Berlin (1995)","DOI":"10.1007\/3-540-60590-8_9"},{"key":"476_CR30","unstructured":"Pavlu\u0307, J.: Search for APN permutations among known APN functions. Master\u2019s thesis, Charles University, Prague (2018)"},{"key":"476_CR31","doi-asserted-by":"crossref","unstructured":"Taniguchi, H.: On some quadratic APN functions. Designs, Codes and Cryptography 87(9), 1973\u20131983 (2019)","DOI":"10.1007\/s10623-018-00598-2"},{"key":"476_CR32","doi-asserted-by":"crossref","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35(3), 461\u2013475 (2012)","DOI":"10.1007\/s10801-011-0309-1"},{"key":"476_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Advances in Mathematics 234, 43\u201360 (2013)","DOI":"10.1016\/j.aim.2012.10.014"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00476-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00476-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00476-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T16:54:24Z","timestamp":1671641664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00476-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["476"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00476-0","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,3,16]]},"assertion":[{"value":"7 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}