{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:03:42Z","timestamp":1764997422820,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s12095-022-00558-7","type":"journal-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T17:17:33Z","timestamp":1646846253000},"page":"925-931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On a conjecture on APN permutations"],"prefix":"10.1007","volume":"14","author":[{"given":"Daniele","family":"Bartoli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6058-1909","authenticated-orcid":false,"given":"Marco","family":"Timpanella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"key":"558_CR1","first-page":"23","volume":"518","author":"Y Aubry","year":"2010","unstructured":"Aubry, Y., McGuire, G., Rodier, F.: A few more functions that are not APN infinitely often. Finite Fields: Theory and Applications 518, 23\u201331 (2010)","journal-title":"Finite Fields: Theory and Applications"},{"key":"558_CR2","doi-asserted-by":"crossref","unstructured":"Bartoli, D.: Hasse-Weil type theorems and relevant classes of polynomial functions. In: London Mathematical Society Lecture Note Series, Proceedings of 28th British Combinatorial Conference. Cambridge University Press, to appear (2020)","DOI":"10.1017\/9781009036214.003"},{"key":"558_CR3","doi-asserted-by":"crossref","unstructured":"Beierle, C., Carlet, C., Leander, G., Perrin, L.: A further study of quadratic APN permutations in dimension nine, arXiv:2104.08008 (2021)","DOI":"10.1016\/j.ffa.2022.102049"},{"key":"558_CR4","unstructured":"Beierle, C., Leander, G.: New instances of quadratic APN functions, arXiv:2009.07204 (2020)"},{"issue":"1","key":"558_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"558_CR6","first-page":"66","volume":"101704","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, M., Villa, I.: On equivalence between known families of quadratic APN functions. Finite Fields Appl. 101704, 66 (2020)","journal-title":"Finite Fields Appl."},{"issue":"9","key":"558_CR7","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"558_CR8","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S., Villa, I.: Constructing APN functions through isotopic shifts. IEEE Trans. Inf. Theory 66, 5299\u20135309 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"558_CR9","doi-asserted-by":"publisher","first-page":"1147\u20141164","DOI":"10.1007\/s12095-019-00361-x","volume":"11","author":"A Canteaut","year":"2019","unstructured":"Canteaut, A., Perrin, L., Tian, S.: If a generalised butterfly is APN then it operates on 6 bits. Cryptogr. Commun. 11, 1147\u20141164 (2019)","journal-title":"Cryptogr. Commun."},{"key":"558_CR10","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ffa.2005.03.003","volume":"12","author":"A Cafure","year":"2006","unstructured":"Cafure, A., Matera, G.: Improved explicit estimates on the number of solutions of equations over a finite field. Finite Fields Appl. 12, 155\u2013185 (2006)","journal-title":"Finite Fields Appl."},{"key":"558_CR11","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"key":"558_CR12","doi-asserted-by":"crossref","unstructured":"Carlet, C., Kim, K.H., Mesnager1, S.: A direct proof of APN-ness of the Kasami function. Des. Codes Cryptogr. 89, 441\u2013446 (2021)","DOI":"10.1007\/s10623-020-00830-y"},{"key":"558_CR13","first-page":"41","volume":"37","author":"M Delgado","year":"2017","unstructured":"Delgado, M.: The state of the art on the conjecture of exceptional APN functions. Note Mat. 37, 41\u201351 (2017)","journal-title":"Note Mat."},{"key":"558_CR14","doi-asserted-by":"crossref","unstructured":"Browning, K., Dillon, J.F., McQuistan, M., Wolfe, A.J.: An APN permutation in dimension six. In: Post-proceedings of the 9-th International conference on finite fields and their applications, american mathematical society, vol. 518, pp 33\u201342 (2010)","DOI":"10.1090\/conm\/518\/10194"},{"key":"558_CR15","volume-title":"Graduate Texts in Mathematics","author":"R Hartshorne","year":"1977","unstructured":"Hartshorne, R., Geometry, Algebraic: Graduate Texts in Mathematics. Springer-Verlag, New York (1977)"},{"key":"558_CR16","doi-asserted-by":"publisher","DOI":"10.1515\/9781400847419","volume-title":"Algebraic curves over a finite field, Princeton Series in Applied Mathematics","author":"JWP Hirschfeld","year":"2008","unstructured":"Hirschfeld, J.W.P., Korchm\u00e1ros, G., Torres, F.: Algebraic curves over a finite field, Princeton Series in Applied Mathematics. Princeton University Press, Princeton (2008)"},{"key":"558_CR17","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.ffa.2010.05.001","volume":"16","author":"M Homma","year":"2010","unstructured":"Homma, M., Kim, S.J.: Sziklai\u2019s conjecture on the number of points of a plane curve over a finite field III. Finite Fields Appl. 16, 315\u2013319 (2010)","journal-title":"Finite Fields Appl."},{"key":"558_CR18","doi-asserted-by":"crossref","unstructured":"Perrin, L., Udovenko, A, Biryukov, A.: Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem. In: M. Robshaw, J. Katz (eds.) Advances in Cryptology - CRYPTO 2016, Proceedings, Part II, volume 9815 of LNCS, pp 93\u2013122. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_4"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00558-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00558-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00558-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T05:14:54Z","timestamp":1654578894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00558-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,9]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["558"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00558-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2022,3,9]]},"assertion":[{"value":"14 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}