{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:59:30Z","timestamp":1765357170976,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100021171","name":"GuangDong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["2021A1515011904"],"award-info":[{"award-number":["2021A1515011904"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2021YFB3100200"],"award-info":[{"award-number":["2021YFB3100200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12095-022-00598-z","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T23:03:24Z","timestamp":1656457404000},"page":"1359-1369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Constructing more quadratic APN functions with the QAM method"],"prefix":"10.1007","volume":"14","author":[{"given":"Yuyin","family":"Yu","sequence":"first","affiliation":[]},{"given":"L\u00e9o","family":"Perrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,29]]},"reference":[{"issue":"7","key":"598_CR1","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1109\/TIT.2021.3071533","volume":"67","author":"C Beierle","year":"2021","unstructured":"Beierle, C., Brinkmann, M., Leander, G.: Linearly self-equivalent APN permutations in small dimension. IEEE Trans. Inf. Theory 67(7), 4863\u20134875 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"598_CR2","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions, pp. 1\u2013168. Springer (2014) ISBN 978-3-319-12990-7"},{"issue":"1","key":"598_CR3","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TIT.2021.3120698","volume":"68","author":"C Beierle","year":"2022","unstructured":"Beierle, C., Leander, G.: New instances of quadratic APN functions. IEEE Trans. Inf. Theory 68(1), 670\u2013678 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3\u20134","key":"598_CR4","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language[J]. J. Symb. Comput. 24(3\u20134), 235\u2013265 (1997)","journal-title":"J. Symb. Comput."},{"key":"598_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1090\/conm\/518\/10194","volume":"58","author":"K Browning","year":"2010","unstructured":"Browning, K., Dillon, J.F., McQuistan, M.T., Wolfe, A.J.: An APN permutation in dimension six. Contemp. Math. 58, 33\u201342 (2010)","journal-title":"Contemp. Math."},{"key":"598_CR6","doi-asserted-by":"publisher","unstructured":"Canteaut, A., Couvreur, A., Perrin, L.: Recovering or testing extended-affine equivalence. IEEE Trans. Inf. Theory. https:\/\/doi.org\/10.1109\/TIT.2022.3166692","DOI":"10.1109\/TIT.2022.3166692"},{"key":"598_CR7","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory, pp. 369-424. Cambridge University Press (2021) ISBN 978-1-108-47380-4 (Chapter 11)"},{"issue":"2","key":"598_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.A.: Codes, bent functions and permutations suitable for des-like cryptosystems. Des Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des Codes Cryptogr."},{"issue":"1","key":"598_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009)","journal-title":"Adv. Math. Commun."},{"key":"598_CR10","first-page":"1","volume":"27","author":"N Kaleyski","year":"2021","unstructured":"Kaleyski, N.: Deciding EA-equivalence via invariants. Cryptograp. Commun. 27, 1\u201320 (2021)","journal-title":"Cryptograp. Commun."},{"key":"598_CR11","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s10623-018-00598-2","volume":"87","author":"H Taniguchi","year":"2019","unstructured":"Taniguchi, H.: On some quadratic APN functions. Des. Codes Crypt. 87, 1973\u20131983 (2019)","journal-title":"Des. Codes Crypt."},{"key":"598_CR12","unstructured":"Weng, G., Tan, Y., Gong, G.: On quadratic almost perfect nonlinear functions and their related algebraic object. In: Workshop on Coding and Cryptography, WCC (2013)"},{"key":"598_CR13","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10801-011-0309-1","volume":"35","author":"S Yoshiara","year":"2011","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebr. Comb. 35, 461\u2013475 (2011)","journal-title":"J. Algebr. Comb."},{"key":"598_CR14","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions. Des. Codes Cryptog. 73, 587\u2013600 (2014)","journal-title":"Des. Codes Cryptog."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00598-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00598-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00598-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T16:23:22Z","timestamp":1717431802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00598-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":14,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["598"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00598-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2022,6,29]]},"assertion":[{"value":"19 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}