{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T13:34:24Z","timestamp":1745933664717},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["21K03343"],"award-info":[{"award-number":["21K03343"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12095-023-00627-5","type":"journal-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:22:46Z","timestamp":1676377366000},"page":"627-647","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["D-property for APN functions from $\\mathbb {F}_{2}^{n}$ to $\\mathbb {F}_{2}^{n+1}$"],"prefix":"10.1007","volume":"15","author":[{"given":"Hiroaki","family":"Taniguchi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,14]]},"reference":[{"issue":"1","key":"627_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3934\/amc.2019004","volume":"13","author":"R Aragona","year":"2019","unstructured":"Aragona, R., Calderini, M., Civino, R., Sala, M., Zappatore, I.: Wave-shaped round functions and primitive groups. Adv. Math. Commun. 13(1), 67\u201388 (2019)","journal-title":"Adv. Math. Commun."},{"key":"627_CR2","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields Their Appl. 15, 150\u2013159 (2009)","journal-title":"Finite Fields Their Appl."},{"key":"627_CR3","doi-asserted-by":"crossref","unstructured":"Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other. In: Proceedings of the 20th Central European Conference on Cryptography, Matematicke znanosti, vol. 25, pp. 79\u2013105 (2021)","DOI":"10.21857\/ygjwrcdkgy"},{"key":"627_CR4","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"key":"627_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Parameterization of Boolean functions by vectorial functions and associated constructions. To Appear Adv. Math. Commun. https:\/\/www.aimsciences.org\/article\/doi\/10.3934\/amc.2022013 (2022)","DOI":"10.3934\/amc.2022013"},{"key":"627_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3, 59\u201381 (2009)","journal-title":"Adv. Math. Commun."},{"key":"627_CR7","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10623-012-9760-9","volume":"72","author":"Y Li","year":"2014","unstructured":"Li, Y., Wang, M.: Constructing differentially 4-uniform permutations over GF(22m) from quadratic APN functions over GF(22m+\u20091). Designs Codes Cryptography 72, 249\u2013264 (2014)","journal-title":"Designs Codes Cryptography"},{"key":"627_CR8","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/S0304-3975(99)00073-0","volume":"226","author":"Y Zheng","year":"1999","unstructured":"Zheng, Y., Zhang, X., Imai, H.: Restrictions, terms and nonlinearity of Boolean functions. Theor. Comput. Sci. 226, 207\u2013223 (1999)","journal-title":"Theor. Comput. Sci."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00627-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00627-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00627-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T07:08:37Z","timestamp":1680073717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00627-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,14]]},"references-count":8,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["627"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00627-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,14]]},"assertion":[{"value":"10 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}