{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:36:10Z","timestamp":1774370170006,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Mathematical Center in Akademgorodok","award":["agreement No. 075-15-2019-1613 with the Ministry of Science and Higher Education of the Russian Federation"],"award-info":[{"award-number":["agreement No. 075-15-2019-1613 with the Ministry of Science and Higher Education of the Russian Federation"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12095-022-00588-1","type":"journal-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T06:09:44Z","timestamp":1656482984000},"page":"239-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functions"],"prefix":"10.1007","volume":"15","author":[{"given":"Konstantin","family":"Kalgin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3013-5446","authenticated-orcid":false,"given":"Valeriya","family":"Idrisova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,29]]},"reference":[{"issue":"29","key":"588_CR1","first-page":"5","volume":"3","author":"S Agievich","year":"2015","unstructured":"Agievich, S., Gorodilova, A., Kolomeec, N., Nikova, S., Preneel, B., Rijmen, V., Shushuev, G., Tokareva, N., Vitkup, V.: Problems, solutions and experience of the first international student\u2019s Olympiad in cryptography. Prikl. Diskretnaya Matematika 3(29), 5\u201328 (2015)","journal-title":"Prikl. Diskretnaya Matematika"},{"key":"588_CR2","unstructured":"Beierle, C., Leander, G.: New instances of quadratic APN functions. arXiv:abs\/2009.07204 (2020)"},{"key":"588_CR3","doi-asserted-by":"crossref","unstructured":"Beth, T., Ding, C.: On almost perfect nonlinear permutations. Advances in Cryptology, EUROCRYPT\u201993, Lecture Notes Computer Science, vol. 765, pp. 65\u201376 (1993)","DOI":"10.1007\/3-540-48285-7_7"},{"issue":"1","key":"588_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"588_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ffa.2014.10.007","volume":"32","author":"C Blondeau","year":"2015","unstructured":"Blondeau, C., Nyberg, K.: Perfect nonlinear functions and cryptography. Finite Fields Appl. 32, 120\u2013147 (2015)","journal-title":"Finite Fields Appl."},{"key":"588_CR6","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10623-018-0496-z","volume":"87","author":"C Boura","year":"2019","unstructured":"Boura, C., Canteaut, A., Jean, J., Suder, V.: Two notions of differential equivalence on Sboxes. Des. Codes Cryptogr. 87, 185\u2013202 (2019)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"588_CR7","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/j.ffa.2007.11.002","volume":"14","author":"C Bracken","year":"2008","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl. 14(3), 703\u2013714 (2008)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"588_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12095-010-0038-7","volume":"3","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire G.: A few more quadratic APN functions. Crypt. Commun. 3(1), 43\u201353 (2011)","journal-title":"Crypt. Commun."},{"issue":"1\u20133","key":"588_CR9","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49(1\u20133), 273\u2013288 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"588_CR10","doi-asserted-by":"crossref","unstructured":"Browning, K.A., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six. Post-proceedings of the 9-th International Conference on Finite Fields and Their Applications Fq\u201909, Contemporary Math., AMS, vol. 518, pp. 33\u201342 (2010)","DOI":"10.1090\/conm\/518\/10194"},{"key":"588_CR11","doi-asserted-by":"crossref","unstructured":"Budaghyan, L.: Construction and analysis of cryptographic functions. Springer International Publishing, VIII 168 pp (2014)","DOI":"10.1007\/978-3-319-12991-4"},{"issue":"6","key":"588_CR12","doi-asserted-by":"publisher","first-page":"4399","DOI":"10.1109\/TIT.2017.2757938","volume":"64","author":"L Budaghyan","year":"2018","unstructured":"Budaghyan, L., Carlet, C., Helleseth, T., Li, N., Sun, B.: On upper bounds for algebraic degrees of APN functions. IEEE Trans. Inf. Theory 64(6), 4399\u20134411 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"588_CR13","doi-asserted-by":"publisher","first-page":"5742","DOI":"10.1109\/TIT.2020.2983684","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Carlet, C., Helleseth, T., Kaleyski, N.: On the distance between APN functions. IEEE Trans. Inf. Theory 66(9), 5742\u20135753 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"588_CR14","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN Functions from known ones. Finite Fields Appl. 15(2), 150\u2013159 (2009)","journal-title":"Finite Fields Appl."},{"key":"588_CR15","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. 2009 IEEE Information Theory Workshop, Taormina, pp. 374\u2013378 (2009)","DOI":"10.1109\/ITW.2009.5351383"},{"issue":"9","key":"588_CR16","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inform. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"8","key":"588_CR17","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S., Villa, I.: Constructing APN functions through isotopic shifts. IEEE Trans. Inf. Theory 66(8), 5299\u20135309 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"588_CR18","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"588_CR19","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inf. Theory 54(5), 2354\u20132357 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"588_CR20","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1109\/TIT.2020.3007513","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Trans. Inform. Theory 66(11), 7081\u20137087 (2020)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"588_CR21","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s12095-020-00427-1","volume":"12","author":"M Calderini","year":"2020","unstructured":"Calderini, M.: On the EA-classes of known APN functions in small dimensions. Cryptogr. Commun. 12, 821\u2013840 (2020)","journal-title":"Cryptogr. Commun."},{"key":"588_CR22","unstructured":"Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other. Cryptology ePrint Archive, Report 2020\/1444"},{"issue":"1","key":"588_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/18.817504","volume":"46","author":"A Canteaut","year":"2000","unstructured":"Canteaut, A., Charpin, P., Dobbertin, H.: Binary m-sequences with three-valued crosscorrelation: a proof of Welch conjecture. IEEE Trans. Inf. Theory. 46 (1), 4\u20138 (2000)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"588_CR24","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Open questions on nonlinearity and on APN functions. Arithmetic of Finite Fields. WAIFI 2014. Lecture Notes Computer Science, vol. 9061, pp. 83\u2013107 (2015)","DOI":"10.1007\/978-3-319-16277-5_5"},{"key":"588_CR25","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge Univ. Press, 562 pages (2021)","DOI":"10.1017\/9781108606806"},{"key":"588_CR26","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15, 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"588_CR27","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2n): the Welch case. IEEE Trans. Inf. Theory. 45(4), 1271\u20131275 (1999)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"588_CR28","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1006\/inco.1998.2764","volume":"151","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin, H.: Almost perfect nonlinear functions over GFGF(2n): the Niho case. Inform. Comput. 151, 57\u201372 (1999)","journal-title":"Inform. Comput."},{"key":"588_CR29","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions over GF(2n): a new case for n divisible by 5. Proceedings of Finite Fields and Applications FQ5, pp. 113\u2013121 (2000)","DOI":"10.1007\/978-3-642-56755-1_11"},{"issue":"1","key":"588_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009)","journal-title":"Adv. Math. Commun."},{"issue":"2","key":"588_CR31","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIT.2005.862128","volume":"52","author":"Y Edel","year":"2006","unstructured":"Edel, Y., Kyureghyan, G., Pott, A.: A new APN function which is not equivalent to a power mapping. IEEE Trans. Inf. Theory 52(2), 744\u2013747 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"588_CR32","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive crosscorrelation functions. IEEE Trans. Inform. Theory 14, 154\u2013156 (1968)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"588_CR33","unstructured":"G\u00f6lo\u011flu, F.: Gold-hybrid APN functions. Preprint (2020)"},{"key":"588_CR34","doi-asserted-by":"crossref","unstructured":"Gorodilova, A.A.: Characterization of almost perfect nonlinear functions in terms of subfunctions. Diskr. Mat. 27(3), 3\u201316; Discrete Math. Appl. 26(4), 193\u2013202 (2016) (2015)","DOI":"10.1515\/dma-2016-0017"},{"key":"588_CR35","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/s12095-018-0329-y","volume":"11","author":"A Gorodilova","year":"2019","unstructured":"Gorodilova, A.: On the differential equivalence of APN functions. Cryptogr. Commun. 11, 793\u2013813 (2019)","journal-title":"Cryptogr. Commun."},{"issue":"4","key":"588_CR36","doi-asserted-by":"crossref","first-page":"29","DOI":"10.4213\/mvk202","volume":"7","author":"MM Glukhov","year":"2016","unstructured":"Glukhov, M.M.: On the approximation of discrete functions by linear functions. Matematicheskie Vopr. Kriptografii 7(4), 29\u201350 (2016). (in Russian)","journal-title":"Matematicheskie Vopr. Kriptografii"},{"key":"588_CR37","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1006\/ffta.2000.0281","volume":"7","author":"H Hollmann","year":"2001","unstructured":"Hollmann, H., Xiang, Q.: A proof of the Welch and Niho conjectures on crosscorrelations of binary m-sequences. Finite Fields Appl. 7, 253\u2013286 (2001)","journal-title":"Finite Fields Appl."},{"key":"588_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s12095-018-0310-9","volume":"11","author":"V Idrisova","year":"2019","unstructured":"Idrisova, V.: On an algorithm generating 2-to-1 APN functions and its applications to \u201cthe big APN problem\u201d. Cryptogr. Commun. 11, 21\u201339 (2019)","journal-title":"Cryptogr. Commun."},{"key":"588_CR39","doi-asserted-by":"crossref","unstructured":"Janwa, H., Wilson, R.: Hyperplane sections of Fermat varieties in P3 in char. 2 and some applications to cyclic codes. Proceedings of AAECC-10, Lecture Notes in Computer Science, vol. 673, Berlin, Springer-Verlag, pp. 180\u2013194 (1993)","DOI":"10.1007\/3-540-56686-4_43"},{"key":"588_CR40","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s12095-019-00366-6","volume":"11","author":"NS Kaleyski","year":"2019","unstructured":"Kaleyski, N.S.: Changing APN functions at two points. Cryptogr. Commun. 11, 1165\u20131184 (2019)","journal-title":"Cryptogr. Commun."},{"key":"588_CR41","unstructured":"Kalgin, K., Idrisova, V.: On secondary and cyclic approaches to search for quadratic APN functions. Proceedings of the 11th international conference on sequences and their applications \u2014 SETA-2020 (Saint-Petersburg, Russia, September 22\u201325) (2020)"},{"key":"588_CR42","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T Kasami","year":"1971","unstructured":"Kasami, T.: The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Inform. and Control. 18, 369\u2013394 (1971)","journal-title":"Inform. and Control."},{"key":"588_CR43","doi-asserted-by":"crossref","unstructured":"Kaspers, C., Zhou, Y.: The number of almost perfect nonlinear functions grows exponentially. J. Cryptol. 34(4) published online (2021)","DOI":"10.1007\/s00145-020-09373-w"},{"key":"588_CR44","unstructured":"Langevin, P., Saygi, Z., Saygi, E.: Classification of APN cubics in dimension 6 over GF(2): http:\/\/langevin.univ-tln.fr\/project\/apn-6\/apn-6.html"},{"key":"588_CR45","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. Advances in Cryptography, EUROCRYPT\u201993, Lecture Notes in Computer Science vol. 765, pp. 55\u201364 (1994)","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"1","key":"588_CR46","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10623-015-0151-x","volume":"78","author":"A Pott","year":"2016","unstructured":"Pott, A.: Almost perfect and planar functions. Des. Codes Crypt. 78(1), 141\u2013195 (2016)","journal-title":"Des. Codes Crypt."},{"key":"588_CR47","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s10623-018-00598-2","volume":"87","author":"H Taniguchi","year":"2019","unstructured":"Taniguchi, H.: On some quadratic APN functions. Des. Codes Crypt. 87, 1973\u20131983 (2019)","journal-title":"Des. Codes Crypt."},{"key":"588_CR48","doi-asserted-by":"publisher","first-page":"14","DOI":"10.17223\/20710410\/5\/2","volume":"3","author":"ME Tuzhilin","year":"2009","unstructured":"Tuzhilin, M.E.: APN functions. Prikl. Diskretnaya Matematika 3, 14\u201320 (2009). (in Russian)","journal-title":"Prikl. Diskretnaya Matematika"},{"key":"588_CR49","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10801-011-0309-1","volume":"35","author":"S Yoshiara","year":"2012","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35, 461\u2013475 (2012)","journal-title":"J. Algebraic Comb."},{"key":"588_CR50","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions. Des. Codes Cryptogr. 73, 587\u2013600 (2014)","journal-title":"Des. Codes Cryptogr."},{"key":"588_CR51","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ffa.2020.101733","volume":"68","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Kaleyski, N.S., Budaghyan, L., Li, Y.: Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9. Finite Fields Appl. 68, 101\u2013733 (2020)","journal-title":"Finite Fields Appl."},{"key":"588_CR52","unstructured":"Yu, Y., Perrin, L.: Constructing more quadratic APN functions with the QAM method. Cryptology ePrint Archive Report 2021\/574 (2021)"},{"key":"588_CR53","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.aim.2012.10.014","volume":"234","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Adv. Math. 234, 43\u201360 (2013)","journal-title":"Adv. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00588-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00588-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00588-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:12:48Z","timestamp":1676304768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00588-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["588"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00588-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,29]]},"assertion":[{"value":"1 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}