{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:22Z","timestamp":1740148942898,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T00:00:00Z","timestamp":1653696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T00:00:00Z","timestamp":1653696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2015-06250"],"award-info":[{"award-number":["RGPIN-2015-06250"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12095-022-00580-9","type":"journal-article","created":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T07:03:28Z","timestamp":1653721408000},"page":"1345-1357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of APN permutations via Walsh zero spaces"],"prefix":"10.1007","volume":"14","author":[{"given":"Benjamin","family":"Chase","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5083-0083","authenticated-orcid":false,"given":"Petr","family":"Lison\u011bk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,28]]},"reference":[{"key":"580_CR1","doi-asserted-by":"crossref","unstructured":"Beierle, C., Carlet, C., Leander, G., Perrin, L.: A further study of quadratic APN permutations in dimension nine. arXiv:2104.08008 (2021)","DOI":"10.1016\/j.ffa.2022.102049"},{"key":"580_CR2","unstructured":"Beierle, C., Leander, G.: New instances of quadratic APN functions. arXiv:2009.07204 (2020)"},{"key":"580_CR3","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Perrin, L., Tian, S.: Anomalies and Vector Space Search: Tools for S-box Analysis. In: Galbraith, S., Moriai, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2019. Lecture Notes in Computer Science, Vol. 11921, pp. 196\u2013223. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-34578-5_8"},{"issue":"1\u20134","key":"580_CR4","first-page":"135","volume":"34","author":"KA Browning","year":"2009","unstructured":"Browning, K. A., Dillon, J. F., Kibler, R. E., McQuistan, M. T.: APN Polynomials and related codes. Journal of Combinatorics, Information and System Science, Special Issue in honor of Prof. D.K Ray-Chaudhuri on the occasion of his 75th birthday 34(1\u20134), 135\u2013159 (2009)","journal-title":"Journal of Combinatorics, Information and System Science, Special Issue in honor of Prof. D.K Ray-Chaudhuri on the occasion of his 75th birthday"},{"key":"580_CR5","doi-asserted-by":"crossref","unstructured":"Browning, K. A., Dillon, J. F., McQuistan, M. T., Wolfe, A. J.: An APN permutation in dimension Six. Finite fields: theory and applications, 33\u201342, Contemp. Math., 518, Amer. Math. Soc., Providence, RI, (2010)","DOI":"10.1090\/conm\/518\/10194"},{"key":"580_CR6","unstructured":"Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other. IACR Cryptol. ePrint Arch., 2020:1444 (2020)"},{"issue":"9","key":"580_CR7","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"580_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.ffa.2018.11.008","volume":"56","author":"A Canteaut","year":"2019","unstructured":"Canteaut, A., Perrin, L.: On CCZ-equivalence, extended-affine equivalence, and function twisting. Finite Fields Appl. 56, 209\u2013246 (2019)","journal-title":"Finite Fields Appl."},{"key":"580_CR9","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"key":"580_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des Codes Cryptogr. 15, 125\u2013156 (1998)","journal-title":"Des Codes Cryptogr."},{"key":"580_CR11","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): A new case for n divisible by 5. International Conference on Finite Fields and Applications 113\u2013121 (2001)","DOI":"10.1007\/978-3-642-56755-1_11"},{"issue":"1","key":"580_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"580_CR13","unstructured":"Joly, M., Perrin, L.: SboxU (software library) https:\/\/github.com\/lpp-crypto\/sboxU\u00a0(2021). Accessed 19 April 2021"},{"issue":"2","key":"580_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3934\/amc.2007.1.243","volume":"1","author":"J Lahtonen","year":"2007","unstructured":"Lahtonen, J., McGuire, G., Ward, H. N.: Gold and Kasami-Welch functions, quadratic forms, and bent functions. Adv. Math. Commun. 1(2), 243\u2013250 (2007)","journal-title":"Adv. Math. Commun."},{"key":"580_CR15","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F. J., Sloane, N.J.A: The Theory of Error-Correcting Codes. Elsevier, Amsterdam (1977)"},{"key":"580_CR16","doi-asserted-by":"crossref","unstructured":"Stinson, D.R., Paterson, M.B.: Cryptography. Theory and Practice. Fourth edition. CRC Press (2019)","DOI":"10.1201\/9781315282497"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00580-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00580-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00580-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T16:23:11Z","timestamp":1717431791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00580-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,28]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["580"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00580-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2022,5,28]]},"assertion":[{"value":"20 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}