{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T04:13:58Z","timestamp":1686802438764},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s12095-023-00646-2","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T16:01:50Z","timestamp":1686153710000},"page":"831-844","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic functions with interesting properties from CCZ-equivalence"],"prefix":"10.1007","volume":"15","author":[{"given":"Yanjun","family":"Li","sequence":"first","affiliation":[]},{"given":"Haibin","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Lijing","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"646_CR1","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1137\/060677768","volume":"22","author":"P Charpin","year":"2008","unstructured":"Charpin, P., Kyureghyan, G.: Cubic monomial bent functions: a subclass of $$\\cal{M} ^*$$. SIAM J. of Discrete Math. 22, 650\u2013665 (2008)","journal-title":"SIAM J. of Discrete Math."},{"issue":"2","key":"646_CR2","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/TIT.2005.862121","volume":"52","author":"NG Leander","year":"2006","unstructured":"Leander, N.G.: Monomial Bent Functions. IEEE Trans. Inf. Theory 52(2), 738\u2013743 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"646_CR3","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2022.3140180","volume":"68","author":"Y Li","year":"2022","unstructured":"Li, Y., Kan, H., Mesnager, S., Peng, J., Tan, C.H., Zheng, L.: Generic constructions of (Boolean and vectorial) bent functions and their consequences. IEEE Trans. Inf. Theory 68(4), 2735\u20132751 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2020.105974","volume":"161","author":"Y Li","year":"2020","unstructured":"Li, Y., Peng, J., Tan, C.H.: An answer to an open problem of Mesnager on bent functions. Inf. Process. Lett. 161, 105974 (2020)","journal-title":"Inf. Process. Lett."},{"key":"646_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/ise2.12006","volume":"15","author":"Y Li","year":"2021","unstructured":"Li, Y., Peng, J., Tan, C.H., Kan, H., Zheng, L.: Further constructions of bent functions and their duals. IET Inf. Secur. 15, 87\u201397 (2021)","journal-title":"IET Inf. Secur."},{"issue":"7","key":"646_CR6","doi-asserted-by":"publisher","first-page":"4397","DOI":"10.1109\/TIT.2014.2320974","volume":"60","author":"S Mesnager","year":"2014","unstructured":"Mesnager, S.: Several new infinite families of bent functions and their duals. IEEE Trans. Inf. Theory 60(7), 4397\u20134407 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32595-8","volume-title":"Bent Functions: Fundamentals and Results","author":"S Mesnager","year":"2016","unstructured":"Mesnager, S.: Bent Functions: Fundamentals and Results. Springer, Switzerland (2016)"},{"key":"646_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O Rothaus","year":"1976","unstructured":"Rothaus, O.: On \u201cbent\u2019\u2019 functions. J. Combin. Theory Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Combin. Theory Ser. A"},{"key":"646_CR9","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s12095-020-00436-0","volume":"12","author":"L Zheng","year":"2020","unstructured":"Zheng, L., Peng, J., Kan, H., Li, Y.: Several new infinite families of bent functions via second order derivatives. Cryptogr. Commun. 12, 1143\u20131160 (2020)","journal-title":"Cryptogr. Commun."},{"key":"646_CR10","doi-asserted-by":"crossref","unstructured":"Browning, K.A., Dillon, J.F., McQuistan, M.T.: An APN permutation in dimension six. In: Contemporary Mathematics, (Post Proceedings of the Ninth International Conference on Finite Fields and Their Applications-Fq9), Journal of the American Mathematical Society, vol. 518, pp. 33\u201342 (2010)","DOI":"10.1090\/conm\/518\/10194"},{"issue":"2","key":"646_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150\u2013159 (2009)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"646_CR12","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear functions. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR13","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in Cryptography. EUROCRYPT\u201993 (Lecture Notes in Computer Science), T. Helleseth, Ed. New York: Springer-Verlag, vol. 765, pp. 55\u201364 (1993)","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"7","key":"646_CR14","doi-asserted-by":"publisher","first-page":"4891","DOI":"10.1109\/TIT.2021.3079223","volume":"67","author":"N Anbar","year":"2021","unstructured":"Anbar, N., Kalayc\u0131, T., Meidl, W.: Analysis of $$(n, n)$$-functions obtained from the Maiorana-McFarland class. IEEE Trans. Inf. Theory 67(7), 4891\u20134901 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"646_CR15","doi-asserted-by":"publisher","first-page":"6174","DOI":"10.1109\/TIT.2022.3174672","volume":"68","author":"N Anbar","year":"2022","unstructured":"Anbar, N., Kalayc\u0131, T., Meidl, W.: On a class of functions with the maximal number of bent components. IEEE Trans. Inf. Theory 68(9), 6174\u20136186 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR16","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1007\/s10623-021-00930-3","volume":"89","author":"A Bapi\u0107","year":"2021","unstructured":"Bapi\u0107, A., Pasalic, E.: A new method for secondary constructions of vectorial bent functions. Des. Codes Cryptogr. 89, 2463\u20132475 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"646_CR17","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1007\/s10623-019-00639-4","volume":"87","author":"S Mesnager","year":"2019","unstructured":"Mesnager, S., Zhang, F., Tang, C., Zhou, Y.: Further study on the maximum number of bent components of vectorial functions. Des. Codes Cryptogr. 87, 2597\u20132610 (2019)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"646_CR18","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TIT.2017.2749421","volume":"64","author":"A Pott","year":"2018","unstructured":"Pott, A., Pasalic, E., Muratovi\u0107-Ribi\u0107, A., Bajri\u0107, S.: On the maximum number of bent components of vectorial functions. IEEE Trans. Inf. Theory 64(1), 403\u2013411 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR19","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1007\/s10623-020-00770-7","volume":"88","author":"L Zheng","year":"2020","unstructured":"Zheng, L., Peng, J., Kan, H., Li, Y., Luo, J.: On constructions and properties of $$(n, m)$$-functions with maximal number of bent components. Des. Codes Cryptogr. 88, 2171\u20132186 (2020)","journal-title":"Des. Codes Cryptogr."},{"key":"646_CR20","unstructured":"Budaghyan, L.: The equivalence of AB and APN functions and their generalizations. VDM Verlag (2008)"},{"key":"646_CR21","doi-asserted-by":"crossref","unstructured":"Budaghyan, L.: Construction and analysis of cryptographic functions. Springer Verlag (2014)","DOI":"10.1007\/978-3-319-12991-4"},{"key":"646_CR22","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"issue":"2","key":"646_CR23","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, Bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"646_CR24","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C.: CCZ-equivalence of single and multi output Boolean functions. Postproceedings of the 9th International Conference on Finite Fields and their Applications Fq\u20199, Contemporary Mathematics Journal of American Mathematical Society, vol. 518, pp. 43\u201354 (2010)","DOI":"10.1090\/conm\/518\/10195"},{"key":"646_CR25","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.cogsys.2018.09.024","volume":"57","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhou, M.: Construction of CCZ transform for quadratic APN functions. Cogn. Syst. Res. 57, 41\u201345 (2019)","journal-title":"Cogn. Syst. Res."},{"key":"646_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10623-010-9466-9","volume":"59","author":"L Budaghyan","year":"2011","unstructured":"Budaghyan, L., Carlet, C.: CCZ-equivalence of bent vectorial functions and related constructions. Des. Codes Cryptogr. 59, 69\u201387 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"646_CR27","doi-asserted-by":"crossref","unstructured":"Perrin, L., Udovenko, A., Biryukov, A.: Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem. Annual International Cryptology Conference. Springer, Berlin, Heidelberg, pp. 93\u2013122 (2016)","DOI":"10.1007\/978-3-662-53008-5_4"},{"issue":"11","key":"646_CR28","doi-asserted-by":"publisher","first-page":"7575","DOI":"10.1109\/TIT.2017.2676807","volume":"63","author":"A Canteaut","year":"2017","unstructured":"Canteaut, A., Duval, A., Perrin, P.: A generalisation of Dillon\u2019s APN permutation with the best known differential and nonlinear properties for all fields of size $$2^{4k+2}$$. IEEE Trans. Inf. Theory 63(11), 7575\u20137591 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"646_CR29","doi-asserted-by":"publisher","first-page":"160","DOI":"10.46586\/tosc.v2018.i1.160-179","volume":"2018","author":"Y Li","year":"2018","unstructured":"Li, Y., Tian, S., Yu, Y., Wang, M.: On the generalization of butterfly structure. IACR Transactions on Symmetric Cryptology 2018(1), 160\u2013179 (2018)","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"1","key":"646_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"issue":"4","key":"646_CR31","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIT.2016.2526022","volume":"62","author":"P Charpin","year":"2016","unstructured":"Charpin, P., Mesnager, S., Sarkar, S.: Involutions over the Galois field $$\\mathbb{F} _{2^n}$$. IEEE Trans. Inf. Theory 62(4), 2266\u20132276 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"646_CR32","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.ffa.2018.11.008","volume":"56","author":"A Canteaut","year":"2019","unstructured":"Canteaut, A., Perrin, L.: On CCZ-equivalence, extended-affine equivalence, and function twisting. Finite Fields Appl. 56, 209\u2013246 (2019)","journal-title":"Finite Fields Appl."},{"key":"646_CR33","doi-asserted-by":"crossref","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.) IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","DOI":"10.1109\/TIT.1968.1054106"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00646-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00646-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00646-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T09:05:15Z","timestamp":1686733515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00646-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,7]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["646"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00646-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,7]]},"assertion":[{"value":"28 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"The results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. Written informed consent for publication was obtained from all participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}