{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:21:01Z","timestamp":1759332061308,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T00:00:00Z","timestamp":1628208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100016190","name":"Trond Mohn foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016190","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100016190","name":"Trond Mohn foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016190","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12095-021-00520-z","type":"journal-article","created":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T23:04:36Z","timestamp":1628204676000},"page":"319-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the behavior of some APN permutations under swapping points"],"prefix":"10.1007","volume":"14","author":[{"given":"Lilya","family":"Budaghyan","sequence":"first","affiliation":[]},{"given":"Nikolay","family":"Kaleyski","sequence":"additional","affiliation":[]},{"given":"Constanza","family":"Riera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8622-7120","authenticated-orcid":false,"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,6]]},"reference":[{"key":"520_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0019-9958(67)91016-9","volume":"10","author":"ER Berlekamp","year":"1967","unstructured":"Berlekamp, E.R., Rumsey, H., Solomon, G.: On the solutions of algebraic equations over finite fields. Inf. Control. 10, 553\u2013564 (1967)","journal-title":"Inf. Control."},{"doi-asserted-by":"crossref","unstructured":"Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J., An, APN: Permutation in Dimension Six, Finite Fields: Theory and Applications, Pp. 33-42, Contemp. Math. 518, Amer. 6 Soc., Providence, RI (2010)","key":"520_CR2","DOI":"10.1090\/conm\/518\/10194"},{"issue":"6","key":"520_CR3","doi-asserted-by":"publisher","first-page":"4399","DOI":"10.1109\/TIT.2017.2757938","volume":"64","author":"L Budaghyan","year":"2018","unstructured":"Budaghyan, L., Carlet, C., Helleseth, T., Li, N., Sun, B.: On upper bounds for algebraic degrees of APN functions. IEEE Trans. Inform. Theory 64 (6), 4399\u20134411 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Kaleyski, N., Kwon, S., Riera, C., St\u0103nic\u0103, P., functions, Partially APN Boolean: Classes of functions that are not APN infinitely often, Cryptography & Communications - CCDS 12 (2020), 527-545","key":"#cr-split#-520_CR4.1","DOI":"10.1007\/s12095-019-00372-8"},{"unstructured":"preliminary version in Proc Sequences and Their Applications - SETA 2018 Hong Kong (2018)","key":"#cr-split#-520_CR4.2"},{"doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Kaleyski, N., Riera, C., St\u0103nic\u0103, P.: On the sensitivity of some APN permutations to swapping points, Proc. Sequences and Their Applications \u2013 SETA, Paper # 9 (2020)","key":"520_CR5","DOI":"10.1007\/s12095-021-00520-z"},{"key":"520_CR6","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s12095-020-00439-x","volume":"12","author":"M Calderini","year":"2020","unstructured":"Calderini, M.: I.villa, On the Boomerang Uniformity of some Permutation Polynomials. Cryptogr. Commun. 12, 1161\u20131178 (2020)","journal-title":"Cryptogr. Commun."},{"doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial Boolean Functions for Cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, Cambridge Univ, pp. 398\u2013472. Press, Cambridge (2010)","key":"520_CR7","DOI":"10.1017\/CBO9780511780448.012"},{"doi-asserted-by":"crossref","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. Advances in cryptology\u2013EUROCRYPT\u201994, LNCS 950, pp. 356\u2013365 (1995)","key":"520_CR8","DOI":"10.1007\/BFb0053450"},{"key":"520_CR9","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1017\/S0004972700036200","volume":"69","author":"RS Coulter","year":"2004","unstructured":"Coulter, R.S., Henderson, M.: A note on the roots of trinomials over a finite field. Bull. Austral. Math. Soc. 69, 429\u2013432 (2004)","journal-title":"Bull. Austral. Math. Soc."},{"issue":"9","key":"520_CR10","doi-asserted-by":"publisher","first-page":"5781","DOI":"10.1109\/TIT.2020.2971988","volume":"66","author":"P Ellingsen","year":"2020","unstructured":"Ellingsen, P., Felke, P., Riera, C., St\u0103nic\u0103, P., Tkachenko, A.: C-differentials, multiplicative uniformity and (almost) perfect c-nonlinearity. IEEE Trans. Inf. Theory 66(9), 5781\u20135789 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Janwa, H., Wilson, M.: Hyperplane sections of Fermat varieties in p3 in char. 2 and some applications to cyclic codes, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Proceedings AAECC10 (G. Cohen, T. Mora and O. Moreno, Eds.), LNCS 673, Springer-Verlag, New York\/Berlin, pp 180\u2013194 (1993)","key":"520_CR11","DOI":"10.1007\/3-540-56686-4_43"},{"issue":"6","key":"520_CR12","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s12095-019-00366-6","volume":"11","author":"NS Kaleyski","year":"2019","unstructured":"Kaleyski, N.S.: Changing APN functions at two points. Cryptography and Communications 11(6), 1165\u20131184 (2019)","journal-title":"Cryptography and Communications"},{"issue":"11","key":"520_CR13","doi-asserted-by":"publisher","first-page":"7101","DOI":"10.1109\/TIT.2020.3002993","volume":"66","author":"S Li","year":"2020","unstructured":"Li, S., Meidl, W., Polujan, A., Pott, A., Riera, C., St\u0103nic\u0103, P.: Vanishing flats: a combinatorial viewpoint on the planarity of functions and their application. IEEE Trans. Inf. Theory 66(11), 7101\u20137112 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR14","first-page":"379","volume":"70","author":"J Liang","year":"1978","unstructured":"Liang, J.: On the solutions of trinomial equations over finite fields. Bull. Cal. Math. Soc. 70, 379\u2013382 (1978)","journal-title":"Bull. Cal. Math. Soc."},{"doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography, Workshop on the Theory and Application of of Cryptographic Techniques, May 23 (Pp. 55-64) Springer, Berlin, Heidelberg (1993)","key":"520_CR15","DOI":"10.1007\/3-540-48285-7_6"},{"key":"520_CR16","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10623-014-9992-y","volume":"77","author":"D Tang","year":"2014","unstructured":"Tang, D., Carlet, C., Tang, X.: Differentially 4-uniform bijections by permuting the inverse function. Des. Codes. Cryptogr. 77, 117\u2013141 (2014)","journal-title":"Des. Codes. Cryptogr."},{"issue":"4","key":"520_CR17","first-page":"4675","volume":"59","author":"L Qu","year":"2013","unstructured":"Qu, L., Tan, Y., Tan, C.H., Li, C.: Constructing differentially 4-uniform permutations over $\\mathbb {F}_{2^{2k}}$ via the switching method. IEEE Trans. Inf. Theory 59(4), 4675\u20134686 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"520_CR18","first-page":"391","volume":"78","author":"L Qu","year":"2016","unstructured":"Qu, L., Tan, Y., Li, C., Gong, G.: More constructions of differentially 4-uniform permutations on $\\mathbb {F}_{2^{2k}}$. Des. Codes Cryptogr. 78, 391\u2013408 (2016)","journal-title":"Des. Codes Cryptogr."},{"doi-asserted-by":"crossref","unstructured":"Rodier, F.: Borne sur le degr\u00e9 des polyn\u00f4mes presque parfaitement non-lin\u00e9aires, Arithmetic, Geometry, Cryptography and Coding Theory, G. lachaud, C. Ritzenthaler and M. Tsfasman, eds., Contemporary Math. no 487, AMS, Providence (RI), USA, pp 169\u2013181 (2009)","key":"520_CR19","DOI":"10.1090\/conm\/487\/09531"},{"key":"520_CR20","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0022-314X(75)90038-4","volume":"7","author":"KS Williams","year":"1975","unstructured":"Williams, K.S.: Note on cubics over GF(2n) and GF(3n). J. Number Theory 7, 361\u2013365 (1975)","journal-title":"J. Number Theory"},{"issue":"3","key":"520_CR21","first-page":"495","volume":"22","author":"Y Yu","year":"2013","unstructured":"Yu, Y., Wang, M., Li, Y.: Constructing differentially 4-uniform permutations from known ones. Chinese Journal of Electronics 22(3), 495\u2013499 (2013)","journal-title":"Chinese Journal of Electronics"},{"key":"520_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ffa.2013.08.003","volume":"25","author":"Z Zha","year":"2014","unstructured":"Zha, Z., Hu, L., Sun, S.: Constructing new differentially 4-uniform permutations from the inverse function. Finite Fields Appl. 25, 64\u201378 (2014)","journal-title":"Finite Fields Appl."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00520-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00520-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00520-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T07:15:23Z","timestamp":1646291723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00520-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,6]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["520"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00520-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,8,6]]},"assertion":[{"value":"23 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}