{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:30:55Z","timestamp":1760524255346},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12095-021-00533-8","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:02:25Z","timestamp":1631145745000},"page":"161-182","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On equivalence between two known families of APN polynomial functions and APN power functions"],"prefix":"10.1007","volume":"14","author":[{"given":"Qianhong","family":"Wan","sequence":"first","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"533_CR1","doi-asserted-by":"publisher","unstructured":"Beth, T., Ding, C.: On Almost Perfect Nonlinear Permutations. In: Helleseth, T. (ed.) Advances in Cryptology \u2014 EUROCRYPT \u201993. EUROCRYPT 1993. Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/3-540-48285-7_7, vol. 765. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48285-7_7"},{"issue":"1","key":"533_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12095-010-0038-7","volume":"3","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptogr. Commun. 3(1), 43\u201353 (2011)","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"533_CR3","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/j.ffa.2007.11.002","volume":"14","author":"C Bracken","year":"2008","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Their Appl. 14(3), 703\u2013714 (2008)","journal-title":"Finite Fields Their Appl."},{"issue":"3","key":"533_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10623-010-9475-8","volume":"61","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., McGuire, G., Nebe, G.: On the equivalence of quadratic APN funcitons. Des. Codes Crypt. 61(3), 261\u2013272 (2011)","journal-title":"Des. Codes Crypt."},{"issue":"8","key":"533_CR5","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, C., Carlet, R., Coulter, R., Villa, I., Construting, A P N: Functions through iostopic shift. IEEE Trans. Inf. Theory 66(8), 5299\u20135309 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"533_CR6","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inf. Theory 54(5), 2354\u20132357 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"533_CR7","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"533_CR8","first-page":"374","volume":"2009","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In. IEEE Inf. Theory Workshop 2009, 374\u2013378 (2009)","journal-title":"IEEE Inf. Theory Workshop"},{"key":"533_CR9","doi-asserted-by":"publisher","unstructured":"Budaghyan, L., Calderini, M., Villa, I.: On equivalence between known families of quadratic APN functions, Finite Fields and Their Applications. https:\/\/doi.org\/10.1016\/j.ffa.2020.101704 (2020)","DOI":"10.1016\/j.ffa.2020.101704"},{"key":"533_CR10","doi-asserted-by":"publisher","unstructured":"Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Transaction on Information Theory. https:\/\/doi.org\/10.1109\/TIT.2020.3007513 (2020)","DOI":"10.1109\/TIT.2020.3007513"},{"key":"533_CR11","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Helleseth, T., Li, N., Sun, B.: Some results on the known classes of quadratic APN functions. In: El Hajji, S., Nitaj, A., Souidi, E. (eds.) Codes, Cryptology and Information Security (2017)","DOI":"10.1007\/978-3-319-55589-8_1"},{"issue":"3","key":"533_CR12","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s10623-017-0350-8","volume":"86","author":"U Dempwolff","year":"2018","unstructured":"Dempwolff, U.: CCZ Equivalence of power functions. Des. Codes Crypt. 86(3), 665\u2013692 (2018)","journal-title":"Des. Codes Crypt."},{"issue":"4","key":"533_CR13","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): the Welch case. IEEE Trans. Inf. Theory 45(4), 1271\u20131275 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1-2","key":"533_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1006\/inco.1998.2764","volume":"151","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): the Niho case. Inf. Comput. 151(1-2), 57\u201372 (1999)","journal-title":"Inf. Comput."},{"key":"533_CR15","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): a new case for n divisible by 5, Finite Fields and Applications, pp. 113\u2013121. Springer, Berlin (2001)","DOI":"10.1007\/978-3-642-56755-1_11"},{"issue":"1","key":"533_CR16","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"533_CR17","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.ffa.2014.12.006","volume":"33","author":"F Go\u0307log\u030clu","year":"2015","unstructured":"Go\u0307log\u030clu, F.: Almost perfect nonlinear trinomials and hexanomials. Finite Fields Their Appl. 33, 258\u2013282 (2015)","journal-title":"Finite Fields Their Appl."},{"issue":"4","key":"533_CR18","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T Kasami","year":"1971","unstructured":"Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes. Inf. Control. 18(4), 369\u2013394 (1971)","journal-title":"Inf. Control."},{"key":"533_CR19","unstructured":"Kaspers, C., Zhou, Y.: A lower bound on the number of inequivalent APN functions. arXiv:2002.00673"},{"issue":"1","key":"533_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-020-09373-w","volume":"34","author":"C Kaspers","year":"2021","unstructured":"Kaspers, C., Zhou, Y.: The number of almost perfect nonlinear functions grows exponentially. J. Cryptol. 34(1), 1\u201337 (2021)","journal-title":"J. Cryptol."},{"key":"533_CR21","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume":"765","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. Lect. Notes Comput. Sci 765, 55\u201364 (1994)","journal-title":"Lect. Notes Comput. Sci"},{"key":"533_CR22","doi-asserted-by":"publisher","unstructured":"Taniguchi, H.: On Some Quadratic APN Functions. Designs, Codes and Cryptography. https:\/\/doi.org\/10.1007\/S10623-018-00598-2 (2019)","DOI":"10.1007\/S10623-018-00598-2"},{"key":"533_CR23","doi-asserted-by":"publisher","unstructured":"Wan, Q., Qu, L., Li, C.: On equivalence between known polynomial APN functions and power APN functions. Finite Fields and Their Applications. https:\/\/doi.org\/10.1016\/j.ffa.2020.101762 (2021)","DOI":"10.1016\/j.ffa.2020.101762"},{"issue":"3","key":"533_CR24","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10801-016-0680-z","volume":"44","author":"S Yoshiara","year":"2016","unstructured":"Yoshiara, S.: Equivalences of power APN funcitons with power or quadratic APN functions. J. Algebraic Comb. 44(3), 561\u2013585 (2016)","journal-title":"J. Algebraic Comb."},{"issue":"3","key":"533_CR25","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10801-011-0309-1","volume":"35","author":"S Yoshiara","year":"2012","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35(3), 461\u2013475 (2012)","journal-title":"J. Algebraic Comb."},{"key":"533_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.aim.2012.10.014","volume":"234","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Adv. Math. 234, 43\u201360 (2013)","journal-title":"Adv. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00533-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00533-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00533-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T11:27:47Z","timestamp":1643887667000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00533-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["533"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00533-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"12 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}