{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:02:12Z","timestamp":1773090132829,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:00:00Z","timestamp":1630368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:00:00Z","timestamp":1630368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Nature Science Foundation of China","award":["62032009"],"award-info":[{"award-number":["62032009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12095-021-00530-x","type":"journal-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T14:04:40Z","timestamp":1630418680000},"page":"371-393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Differential and boomerang spectrums of some power permutations"],"prefix":"10.1007","volume":"14","author":[{"given":"Sha","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Kangquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yubo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,31]]},"reference":[{"issue":"1","key":"530_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"issue":"2","key":"530_CR2","first-page":"149","volume":"1","author":"C Blondeau","year":"2010","unstructured":"Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149\u2013170 (2010)","journal-title":"Int. J. Inf. Coding Theory"},{"issue":"12","key":"530_CR3","doi-asserted-by":"publisher","first-page":"8127","DOI":"10.1109\/TIT.2011.2169129","volume":"57","author":"C Blondeau","year":"2011","unstructured":"Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of $x\\mapsto x^{2^{t}-1}$. IEEE Trans. Inf. Theory 57(12), 8127\u20138137 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ffa.2014.10.007","volume":"32","author":"C Blondeau","year":"2015","unstructured":"Blondeau, C., Nyberg, K.: Perfect nonlinear functions and cryptography. Finite Fields their Appl. 32, 120\u2013147 (2015)","journal-title":"Finite Fields their Appl."},{"issue":"2","key":"530_CR5","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10623-014-9948-2","volume":"73","author":"C Blondeau","year":"2014","unstructured":"Blondeau, C., Perrin, L.: More differentially 6-uniform power functions. Des. Codes Cryptogr. 73(2), 487\u2013505 (2014)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"530_CR6","doi-asserted-by":"publisher","first-page":"290","DOI":"10.46586\/tosc.v2018.i3.290-310","volume":"2018","author":"C Boura","year":"2018","unstructured":"Boura, C., Canteaut, A.: On the boomerang uniformity of cryptographic sboxes. IACR Trans. Symmetric Cryptol. 2018(3), 290\u2013310 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"530_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12991-4","volume-title":"Construction and Analysis of Cryptographic Functions","author":"L Budaghyan","year":"2014","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer, Berlin (2014)"},{"key":"530_CR8","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"issue":"2","key":"530_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.A.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"530_CR10","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ffa.2013.01.002","volume":"21","author":"ST Choi","year":"2013","unstructured":"Choi, S.T., Hong, S., No, J.S., Chung, H.: Differential spectrum of some power functions in odd prime characteristic. Finite Fields their Appl. 21, 11\u201329 (2013)","journal-title":"Finite Fields their Appl."},{"key":"530_CR12","doi-asserted-by":"crossref","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang connectivity table: A new cryptanalysis tool. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II, volume 10821 of Lecture Notes in Computer Science, pp 683\u2013714. Springer (2018)","DOI":"10.1007\/978-3-319-78375-8_22"},{"issue":"2","key":"530_CR13","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1008292303803","volume":"10","author":"RS Coulter","year":"1997","unstructured":"Coulter, R.S., Matthews, R.W.: Planar functions and planes of Lenz-Barlotti class II. Des. Codes Cryptogr. 10(2), 167\u2013184 (1997)","journal-title":"Des. Codes Cryptogr."},{"issue":"7","key":"530_CR14","doi-asserted-by":"publisher","first-page":"2606","DOI":"10.1109\/TIT.2007.899545","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Moisio, M.J., Yuan, J.: Algebraic constructions of optimal frequency-hopping sequences. IEEE Trans. Inf. Theory 53(7), 2606\u20132610 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"530_CR15","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1016\/j.jcta.2005.10.006","volume":"113","author":"C Ding","year":"2006","unstructured":"Ding, C., Yuan, J.: A family of skew Hadamard difference sets. J. Comb. Theory, Ser. A 113(7), 1526\u20131535 (2006)","journal-title":"J. Comb. Theory, Ser. A"},{"issue":"4","key":"530_CR16","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/18.923728","volume":"47","author":"H Dobbertin","year":"2001","unstructured":"Dobbertin, H., Helleseth, T., Kumar, P.V., Martinsen, H.: Ternary m-sequences with three-valued cross-correlation function: New decimations of Welch and Niho type. IEEE Trans. Inf. Theory 47(4), 1473\u20131481 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"530_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/0012-365X(76)90100-X","volume":"16","author":"T Helleseth","year":"1976","unstructured":"Helleseth, T.: Some results about the cross-correlation function between two maximal linear sequences. Discret. Math. 16(3), 209\u2013232 (1976)","journal-title":"Discret. Math."},{"issue":"5","key":"530_CR18","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s002000050073","volume":"8","author":"T Helleseth","year":"1997","unstructured":"Helleseth, T., Sandberg, D.: Some power mappings with low differential uniformity. Appl. Algebra Eng. Commun. Comput. 8(5), 363\u2013370 (1997)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"3","key":"530_CR19","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3934\/amc.2020080","volume":"15","author":"L Lei","year":"2021","unstructured":"Lei, L., Ren, W., Fan, C.: The differential spectrum of a class of power functions over finite fields. Adv. Math. Commun. 15(3), 525\u2013537 (2021)","journal-title":"Adv. Math. Commun."},{"issue":"11","key":"530_CR20","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542\u20137553 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR21","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) Advances in cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, volume 765 of Lecture Notes in Computer Science, pp 55\u201364. Springer (1993)"},{"issue":"1","key":"530_CR22","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10623-015-0151-x","volume":"78","author":"A Pott","year":"2016","unstructured":"Pott, A.: Almost perfect and planar functions. Des. Codes Cryptogr. 78(1), 141\u2013195 (2016)","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"530_CR23","doi-asserted-by":"publisher","first-page":"3691","DOI":"10.1109\/TIT.2019.2959764","volume":"66","author":"C Tang","year":"2020","unstructured":"Tang, C., Ding, C., Xiong, M.: Codes, differentially \u03b4-uniform functions, and t-designs. IEEE Trans. Inf. Theory 66(6), 3691\u20133703 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"530_CR24","doi-asserted-by":"crossref","unstructured":"Wagner, D.A.: The boomerang attack. In: Knudsen, L.R. (ed.) Fast Software Encryption, 6th International Workshop, FSE \u201999, Rome, Italy, March 24-26, 1999, Proceedings, volume 1636 of Lecture Notes in Computer Science, pp 156\u2013170. Springer (1999)","DOI":"10.1007\/3-540-48519-8_12"},{"key":"530_CR25","doi-asserted-by":"publisher","first-page":"101660","DOI":"10.1016\/j.ffa.2020.101660","volume":"64","author":"Y Xia","year":"2020","unstructured":"Xia, Y., Zhang, X., Li, C., Helleseth, T.: The differential spectrum of a ternary power mapping. Finite Fields Their Appl. 64, 101660 (2020)","journal-title":"Finite Fields Their Appl."},{"key":"530_CR26","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ffa.2017.07.008","volume":"48","author":"M Xiong","year":"2017","unstructured":"Xiong, M., Yan, H.: A note on the differential spectrum of a differentially 4-uniform power function. Finite Fields Their Appl. 48, 117\u2013125 (2017)","journal-title":"Finite Fields Their Appl."},{"issue":"8","key":"530_CR27","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1007\/s10623-017-0416-7","volume":"86","author":"M Xiong","year":"2018","unstructured":"Xiong, M., Yan, H., Yuan, P.: On a conjecture of differentially 8-uniform power functions. Des. Codes Cryptogr. 86(8), 1601\u20131621 (2018)","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"530_CR28","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1007\/s10623-021-00865-9","volume":"89","author":"H Yan","year":"2021","unstructured":"Yan, H., Li, C.: Differential spectra of a class of power permutations with characteristic 5. Des. Codes Cryptogr. 89(6), 1181\u20131191 (2021)","journal-title":"Des. Codes Cryptogr."},{"issue":"10","key":"530_CR29","doi-asserted-by":"publisher","first-page":"6819","DOI":"10.1109\/TIT.2019.2910070","volume":"65","author":"H Yan","year":"2019","unstructured":"Yan, H., Zhou, Z., Weng, J., Wen, J., Helleseth, T., Wang, Q.: Differential spectrum of Kasami power permutations over odd characteristic finite fields. IEEE Trans. Inf. Theory 65(10), 6819\u20136826 (2019)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00530-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00530-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00530-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T07:16:13Z","timestamp":1646291773000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00530-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,31]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["530"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00530-x","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,31]]},"assertion":[{"value":"17 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}