{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:06:30Z","timestamp":1771038390202,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T00:00:00Z","timestamp":1648684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T00:00:00Z","timestamp":1648684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Science and Engineering Research Board, Government of India.","award":["MTR\/2019\/000744"],"award-info":[{"award-number":["MTR\/2019\/000744"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12095-022-00573-8","type":"journal-article","created":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T15:06:53Z","timestamp":1648739213000},"page":"1257-1280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["The binary Gold function and its c-boomerang connectivity table"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7962-3221","authenticated-orcid":false,"given":"Sartaj Ul","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"573_CR1","doi-asserted-by":"publisher","first-page":"101835","DOI":"10.1016\/j.ffa.2021.101835","volume":"72","author":"D Bartoli","year":"2021","unstructured":"Bartoli, D., Calderini, M.: On construction and (non)existence of c-(almost) perfect nonlinear functions. Finite Fields Appl. 72, 101835 (2021)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"573_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.46586\/tosc.v2018.i3.290-310","volume":"2018","author":"C Boura","year":"2018","unstructured":"Boura, C., Canteaut, A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 2018(3), 290\u2013310 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"573_CR3","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge, Cambridge (2021)"},{"key":"573_CR4","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-78375-8_22","volume-title":"Advances in Cryptology-EUROCRYPT 2018, LNCS 10821","author":"C Cid","year":"2018","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. In: Nielsen, J., Rijmen, V. (eds.) Advances in Cryptology-EUROCRYPT 2018, LNCS 10821, pp. 683\u2013714. Springer, Cham (2018)"},{"key":"573_CR5","first-page":"171","volume":"28","author":"RS Coulter","year":"1999","unstructured":"Coulter, R.S.: On the evaluation of a class of Weil sums in characteristic 2. New Zealand J. Math. 28, 171\u2013184 (1999)","journal-title":"New Zealand J. Math."},{"key":"573_CR6","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic boolean functions and applications (Ed. 2), Academic Press, San Diego, CA, (2017)","DOI":"10.1016\/B978-0-12-811129-1.00005-5"},{"key":"573_CR7","doi-asserted-by":"crossref","unstructured":"S. Eddahmani, S.: Mesnager, explicit values of the tables DDT, BCT, FBCT, and FBDT of the inverse, the Gold, and the Bracken-Leander functions, Boolean Functions and their Applications (BFA 2021) (2021)","DOI":"10.1007\/s12095-022-00581-8"},{"issue":"9","key":"573_CR8","doi-asserted-by":"publisher","first-page":"5781","DOI":"10.1109\/TIT.2020.2971988","volume":"66","author":"P Ellingsen","year":"2020","unstructured":"Ellingsen, P., Felke, P., Riera, C., St\u0103nic\u0103, P., Tkachenko, A.: C-differentials, multiplicative uniformity and (almost) perfect c-nonlinearity. IEEE Trans. Inform. Theory 66(9), 5781\u20135789 (2020)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"573_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10623-020-00812-0","volume":"89","author":"SU Hasan","year":"2021","unstructured":"Hasan, S.U., Pal, M., Riera, C., St\u0103nic\u0103, P.: On the c-differential uniformity of certain maps over finite fields. Des. Codes Cryptogr 89(2), 221\u2013239 (2021)","journal-title":"Des. Codes Cryptogr"},{"key":"573_CR10","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1007\/s10623-021-00944-x","volume":"89","author":"SU Hasan","year":"2021","unstructured":"Hasan, S.U., Pal, M., St\u0103nic\u0103, P.: Boomerang uniformity of a class of power maps. Des. Codes Cryptogr. 89, 2627\u20132636 (2021)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"573_CR11","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TIT.2021.3123104","volume":"68","author":"SU Hasan","year":"2022","unstructured":"Hasan, S.U., Pal, M., St\u0103nic\u0103, P.: The c-differential uniformity and boomerang uniformity of two classes of permutation polynomials. IEEE Trans. Inform. Theory 68(1), 679\u2013691 (2022)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"573_CR12","unstructured":"Lidl, R., Niederreiter, H.: FiniteFields (Ed. 2), Encycl. Math. Appl., vol.20, Cambridge Univ. Press, Cambridge (1997)"},{"issue":"11","key":"573_CR13","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li, K., Qu, L., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inform. Theory 65(11), 7542\u20137553 (2019)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"10","key":"573_CR14","doi-asserted-by":"publisher","first-page":"6916","DOI":"10.1109\/TIT.2021.3081348","volume":"67","author":"S Mesnager","year":"2021","unstructured":"Mesnager, S., Riera, C., St\u0103nic\u0103, P., Yan, H., Zhou, Z.: Investigations on c-(almost) perfect nonlinear functions. IEEE Trans. Inform. Theory 67(10), 6916\u20136925 (2021)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"573_CR15","first-page":"55","volume-title":"Advances in Cryptology-EUROCRYPT 1993, LNCS 765","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) Advances in Cryptology-EUROCRYPT 1993, LNCS 765, pp. 55\u201364. Springer, Berlin, Heidelberg (1994)"},{"key":"573_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.dam.2021.08.002","volume":"304","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P.: Investigations on c-boomerang uniformity and perfect nonlinearity. Discrete Appl. Math. 304, 297\u2013314 (2021)","journal-title":"Discrete Appl. Math."},{"issue":"10","key":"573_CR17","doi-asserted-by":"publisher","first-page":"112543","DOI":"10.1016\/j.disc.2021.112543","volume":"344","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P.: Low c-boomerang uniformity of the swapped inverse function. Discrete Math. 344(10), 112543 (2021)","journal-title":"Discrete Math."},{"key":"573_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-021-00520-9","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P.: Using double Weil sums in finding the c-boomerang connectivity table for monomial functions on finite fields. Appl. Algebra Eng. Commun. Comput (2021). https:\/\/doi.org\/10.1007\/s00200-021-00520-9","journal-title":"Appl. Algebra Eng. Commun. Comput"},{"key":"573_CR19","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s12095-020-00466-8","volume":"13","author":"P St\u0103nic\u0103","year":"2021","unstructured":"St\u0103nic\u0103, P., Geary, A.: The c-differential behaviour of the inverse function under the c-equivalence. Cryptogr. Commun. 13, 295\u2013306 (2021)","journal-title":"Cryptogr. Commun."},{"key":"573_CR20","doi-asserted-by":"crossref","unstructured":"St\u0103nic\u0103, P., Riera, C., Tkachenko, A.: Characters, Weil sums and c-differential uniformity with an application to the perturbed Gold function, Cryptogr. Commun. 6, 891\u2013907 (2021)","DOI":"10.1007\/s12095-021-00485-z"},{"key":"573_CR21","doi-asserted-by":"crossref","unstructured":"Wagner, D.: The boomerang attack, In: Knudsen, L.R. (ed.) Fast Software Encryption-FSE 1999. LNCS 1636, Springer, Berlin, Heidelberg, pp. 156\u2013170 (1999)","DOI":"10.1007\/3-540-48519-8_12"},{"key":"573_CR22","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s10623-021-00866-8","volume":"89","author":"Z Zha","year":"2021","unstructured":"Zha, Z., Hu, L.: Some classes of power functions with low c-differential uniformity over finite fields. Des. Codes Cryptogr. 89, 1193\u20131210 (2021)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00573-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00573-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00573-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T16:22:21Z","timestamp":1717431741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00573-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,31]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["573"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00573-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,31]]},"assertion":[{"value":"17 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}