{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:33:20Z","timestamp":1760524400984,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12095-022-00606-2","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T09:02:41Z","timestamp":1661504561000},"page":"351-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the equivalence between a new family of APN quadrinomials and the power APN functions"],"prefix":"10.1007","volume":"15","author":[{"given":"Chenmiao","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0704-3789","authenticated-orcid":false,"given":"Jie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Lijing","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shihao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"606_CR1","doi-asserted-by":"crossref","unstructured":"Beth,\u00a0T., Ding,\u00a0C.: On almost perfect nonlinear permutations, in Workshop on the Theory and Application of Cryptographic Techniques. Springer, pp. 65-76 (1993)","DOI":"10.1007\/3-540-48285-7_7"},{"issue":"1","key":"606_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"issue":"3","key":"606_CR3","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/j.ffa.2007.11.002","volume":"14","author":"C Bracken","year":"2008","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomias. Finite Fields Appl. 14(3), 703\u2013714 (2008)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"606_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12095-010-0038-7","volume":"3","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptogr. Commun. 3(1), 43\u201353 (2011)","journal-title":"Cryptogr. Commun."},{"key":"606_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49, 273\u2013288 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"606_CR6","unstructured":"Budaghyan, L.: On the equivalence between known power APN functions. Proc. Conference BFCA 2008, Copenhagen (2008)"},{"issue":"5","key":"606_CR7","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inf. Theory 54(5), 2354\u20132357 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"606_CR8","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S., Villa, I.: Constructing APN functions through isotopic shifts. IEEE Trans. Inf. Theory 66(8), 5299\u20135309 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"606_CR9","doi-asserted-by":"publisher","unstructured":"Budaghyan, L., Calderini, M., Villa, I.: On equivalence between known families of quadratic APN functions. Finite Fields Appl. 66, (2020). https:\/\/doi.org\/10.1016\/j.ffa.2020.101704","DOI":"10.1016\/j.ffa.2020.101704"},{"issue":"9","key":"606_CR10","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"606_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150\u2013159 (2009)","journal-title":"Finite Fields Appl."},{"key":"606_CR12","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In: Proceedings of IEEE Information Theory Workshop, pp. 374\u2013378. (2009)","DOI":"10.1109\/ITW.2009.5351383"},{"issue":"3","key":"606_CR13","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"606_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2020.3007513","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Trans. Inf. Theory (2020). https:\/\/doi.org\/10.1109\/tit.2020.3007513","journal-title":"IEEE Trans. Inf. Theory"},{"key":"606_CR15","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on $$\\mathbb{F}_{2}^{m}$$, and crosscorrelation of maximum-length sequences. SIAM J. Discrete Math. 13(1), 105\u2013138 (2000)","DOI":"10.1137\/S0895480198350057"},{"key":"606_CR16","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and coding theory, p. 562. Cambridge Univ. Press, Cambridge, U.K. (2021)","DOI":"10.1017\/9781108606806"},{"issue":"2","key":"606_CR17","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptsystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"606_CR18","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s10623-017-0350-8","volume":"86","author":"U Dempwolff","year":"2018","unstructured":"Dempwolff, U.: CCZ equivalence of power functions. Des. Codes Cryptogr. 86(3), 665\u2013692 (2018)","journal-title":"Des. Codes Cryptogr."},{"key":"606_CR19","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF($$2^{n}$$): the Welch case. IEEE Trans. Inf. Theory 45(4), 1271\u20131275 (1999)","DOI":"10.1109\/18.761283"},{"key":"606_CR20","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF($$2^{n}$$): the Niho case. Inform. Comput. 151(1), 57\u201372 (1999)","DOI":"10.1006\/inco.1998.2764"},{"key":"606_CR21","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF($$2^{n}$$): a new case for $$n$$ divisible by 5. In: Proceedings of Finite Fields and Applications, pp. 113-121. Springer, Berlin, Heidelberg (2001)","DOI":"10.1007\/978-3-642-56755-1_11"},{"issue":"1","key":"606_CR22","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"606_CR23","doi-asserted-by":"crossref","unstructured":"Janwa, H., Wiison, R.M.: Hyperplane sections of Fermat varieties in $$P^{3}$$ in char. 2 and some applications to cyclic codes. International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes., pp. 180\u2013194. Springer (1993)","DOI":"10.1007\/3-540-56686-4_43"},{"issue":"4","key":"606_CR24","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T Kasami","year":"1971","unstructured":"Kasami, T.: The weight enumerators for several classes of subcodes of the 2nd order binary reed-muller codes. Inf. Control 18(4), 369\u2013394 (1971)","journal-title":"Inf. Control"},{"key":"606_CR25","doi-asserted-by":"publisher","unstructured":"Kaspers, C., Zhou, Y.: The number of almost perfect nonlinear functions grows exponentially, J. Cryptol. 34(4), (2021). https:\/\/doi.org\/10.1007\/s00145-020-09373-w","DOI":"10.1007\/s00145-020-09373-w"},{"issue":"3","key":"606_CR26","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/18.54892","volume":"36","author":"G Lachaud","year":"1990","unstructured":"Lachaud, G., Wolfmann, J.: The weights of the orthogonals of the extended quadraic binary Goppa codes. IEEE Trans. Inf. Theory 36(3), 686\u2013692 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"606_CR27","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differential uniform mappings for cryptography. In: Helleseth, T. (eds.) Advances in Cryptography. EUROCRYPT\u201993 (Lecture Notes in Computer Science), vol. 765, pp. 55\u201364. New York: Springer-Verlag (1993)","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"9","key":"606_CR28","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s10623-018-00598-2","volume":"87","author":"H Taniguchi","year":"2019","unstructured":"Taniguchi, H.: On some quadratic APN functions. Des. Codes Cryptogr. 87(9), 1973\u20131983 (2019)","journal-title":"Des. Codes Cryptogr."},{"key":"606_CR29","doi-asserted-by":"publisher","unstructured":"Wan, Q., Qu, L., Li, C.: On equivalence between known polynomial APN functions and power APN functions. Finite Fields Appl. 71, (2021). https:\/\/doi.org\/10.1016\/j.ffa.2020.101762","DOI":"10.1016\/j.ffa.2020.101762"},{"issue":"3","key":"606_CR30","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10801-011-0309-1","volume":"35","author":"S Yoshiara","year":"2012","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35(3), 461\u2013475 (2012)","journal-title":"J. Algebraic Comb."},{"issue":"3","key":"606_CR31","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10801-016-0680-z","volume":"44","author":"S Yoshiara","year":"2016","unstructured":"Yoshiara, S.: Equivalences of power APN functions with power or quadratic APN functions. J. Algebraic Comb. 44(3), 561\u2013585 (2016)","journal-title":"J. Algebraic Comb."},{"key":"606_CR32","doi-asserted-by":"publisher","unstructured":"Yu, Y., Kaleyski, N., Budaghyan, L., Li, Y.: Classification of quadratic APN functions with coefficients in $$\\mathbb{F} _{2}$$ for dimensions up to 9. Finite Fields Appl. 68, (2020). https:\/\/doi.org\/10.1016\/j.ffa.2020.101733","DOI":"10.1016\/j.ffa.2020.101733"},{"key":"606_CR33","unstructured":"Zheng, L., Kan, H., Li, Y., Peng, J., Tang, D.: Constructing new APN functions through relative trace functions. arXiv: 210111535v1 [IEEE Trans. Inf. Theory] (2021)"},{"key":"606_CR34","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.aim.2012.10.014","volume":"234","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Adv. Math. 234, 43\u201360 (2013)","journal-title":"Adv. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00606-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00606-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00606-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:13:51Z","timestamp":1676304831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00606-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["606"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00606-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2022,8,26]]},"assertion":[{"value":"16 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}