{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:14:04Z","timestamp":1774944844919,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s12095-021-00544-5","type":"journal-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T06:08:56Z","timestamp":1636438136000},"page":"653-662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic"],"prefix":"10.1007","volume":"14","author":[{"given":"Xia","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9925-1026","authenticated-orcid":false,"given":"Qin","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Deng","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,9]]},"reference":[{"key":"544_CR1","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle attack-rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT LNCS, vol. 2045, pp 340\u2013357. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_21"},{"key":"544_CR2","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O., Keller, N.: New results on boomerang and rectangle attacks. In: Daemen, J., Rijmen, V. (eds.) FSE LNCS, vol. 2365, pp 1\u201316. Springer (2002)","DOI":"10.1007\/3-540-45661-9_1"},{"key":"544_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov, A., De Canni\u00e8re, C., Dellkrantz, G.: Cryptanalysis of SAFER++. In: Boneh, D. (ed.) CRYPTO LNCS, vol. 2729, pp 195\u2013211. Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_12"},{"key":"544_CR4","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT LNCS, vol. 5912, pp 1\u201318. Springer (2009)","DOI":"10.1007\/978-3-642-10366-7_1"},{"issue":"1","key":"544_CR5","doi-asserted-by":"publisher","first-page":"331","DOI":"10.46586\/tosc.v2020.i1.331-362","volume":"2020","author":"H Boukerrou","year":"2020","unstructured":"Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table introduction and analysis of the FBCT. IACR Trans. Symmetric Cryptol. 2020(1), 331\u2013362 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"544_CR6","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-78375-8_22","volume":"10821","author":"C Cid","year":"2018","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. Eurocrypt 2018 LNCS 10821, 683\u2013714 (2018)","journal-title":"Eurocrypt 2018 LNCS"},{"key":"544_CR7","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/18.748997","volume":"45","author":"T Helleseth","year":"1999","unstructured":"Helleseth, T., Rong, C., Sandberg, D.: New families of almost perfect nonlinear power mappings. IEEE Trans. Inf. Theory 45, 475\u2013485 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"544_CR8","doi-asserted-by":"crossref","unstructured":"Helleseth, T., Sandberg, D.: Some power mappings with low differential uniformity. Appl. Algerbra Eng. Commun. Comput., 363\u2013370 (1997)","DOI":"10.1007\/s002000050073"},{"key":"544_CR9","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: HartmanisJan, G.G., Schneier, V.L. (eds.) FSE LNCS, vol. 1978, pp 75\u201393. Springer (2000)","DOI":"10.1007\/3-540-44706-7_6"},{"issue":"7","key":"544_CR10","doi-asserted-by":"publisher","first-page":"4948","DOI":"10.1109\/TIT.2012.2191655","volume":"58","author":"J Kim","year":"2012","unstructured":"Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks: Theory and experimental analysis. IEEE Trans. Inf. Theory 58(7), 4948\u20134966 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"544_CR11","unstructured":"Lidl, R., Niederreiter, H.: Finite fields. Addison Wesley, Reading (1983)"},{"key":"544_CR12","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in cryptology-EUROCRYPT\u201993, Lecture Notes in Computer Science, vol. 765, pp 55\u201364. Springer, New York (1994)","DOI":"10.1007\/3-540-48285-7_6"},{"key":"544_CR13","volume-title":"Cyclotomy and Difference Sets","author":"T Storer","year":"1967","unstructured":"Storer, T.: Cyclotomy and Difference Sets. Markham, Chicago (1967)"},{"key":"544_CR14","first-page":"156","volume":"1636","author":"D Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. FSE 1999 LNCS 1636, 156\u2013170 (1999)","journal-title":"FSE 1999 LNCS"},{"issue":"7","key":"544_CR15","doi-asserted-by":"publisher","first-page":"4826","DOI":"10.1109\/TIT.2011.2145130","volume":"57","author":"Z Zha","year":"2011","unstructured":"Zha, Z., Wang, X.: Almost perfect nonlinear power functions in odd characteristic. IEEE Trans. Inf. Theory 57(7), 4826\u20134832 (2011)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00544-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00544-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00544-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T10:10:43Z","timestamp":1651572643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00544-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,9]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["544"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00544-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,9]]},"assertion":[{"value":"19 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}