{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T14:37:27Z","timestamp":1777041447975,"version":"3.51.4"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T00:00:00Z","timestamp":1685491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T00:00:00Z","timestamp":1685491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s12095-023-00647-1","type":"journal-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T07:02:27Z","timestamp":1685516547000},"page":"1117-1127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Further constructions and characterizations of generalized almost perfect nonlinear functions"],"prefix":"10.1007","volume":"15","author":[{"given":"Ana","family":"S\u0103l\u0103gean","sequence":"first","affiliation":[]},{"given":"Ferruh","family":"\u00d6zbudak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"647_CR1","doi-asserted-by":"publisher","first-page":"102050","DOI":"10.1016\/j.ffa.2022.102050","volume":"82","author":"D Bartoli","year":"2022","unstructured":"Bartoli, D., Giulietti, M., Peraro, G., Zini, G.: On monomial generalized almost perfect nonlinear functions. Finite Fields and their Applications 82, 102050 (2022)","journal-title":"Finite Fields and their Applications"},{"key":"647_CR2","doi-asserted-by":"publisher","first-page":"4160","DOI":"10.1109\/TIT.2006.880036","volume":"52","author":"TP Berger","year":"2006","unstructured":"Berger, T.P., Canteaut, A., Charpin, P., Laigle-Chapuy, Y.: On almost perfect nonlinear functions over $$\\mathbb{F} _{2}^\\mathit{n}$$. IEEE Transactions on Information Theory 52, 4160\u20134170 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"647_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"key":"647_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ffa.2014.10.007","volume":"32","author":"C Blondeau","year":"2015","unstructured":"Blondeau, C., Nyberg, K.: Perfect nonlinear functions and cryptography. Finite Fields and Their Applications 32, 120\u2013147 (2015)","journal-title":"Finite Fields and Their Applications"},{"key":"647_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, (2021)","DOI":"10.1017\/9781108606806"},{"key":"647_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/S0002-9939-03-07240-X","volume":"132","author":"XD Hou","year":"2003","unstructured":"Hou, X.D.: Solution to a problem of S. Payne. Proceedings of the American Mathematical Society 132, 1\u20136 (2003)","journal-title":"Proceedings of the American Mathematical Society"},{"issue":"3","key":"647_CR7","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1142\/S0129054120500161","volume":"31","author":"M Kuroda","year":"2020","unstructured":"Kuroda, M.: Monomial generalized almost perfect nonlinear functions. Int. J. Found. Comput. Sci. 31(3), 411\u2013419 (2020)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"647_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ffa.2017.05.001","volume":"47","author":"M Kuroda","year":"2017","unstructured":"Kuroda, M., Tsujie, J.: A generalization of APN functions for odd characteristic. Finite Fields and their Applications 47, 64\u201384 (2017)","journal-title":"Finite Fields and their Applications"},{"key":"647_CR9","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In R. E. Blahut, D.J. Costello, Jr., U. Maurer, and T. Mittelholzer, editors, Communications and Cryptography The Springer International Series in Engineering and Computer Science, 276, 227\u2013233, Springer (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"647_CR10","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. in:T. Helleseth (Ed.), Advances in Cryptology - EUROCRYPT\u201993: Workshop on the Theory and Application of Cryptographic Techniques, (Lofthus, Norway, May 23-27, 1993), Lecture Notes in Comput. Sci. Springer, Berlin, 765, 55\u201364 (1994)"},{"key":"647_CR11","doi-asserted-by":"crossref","first-page":"101892","DOI":"10.1016\/j.ffa.2021.101892","volume":"75","author":"F \u00d6zbudak","year":"2021","unstructured":"\u00d6zbudak, F., S\u0103l\u0103gean, A.: New generalized almost perfect nonlinear functions. Finite Fields and Their Applications 75, 101892 (2021)","journal-title":"Finite Fields and Their Applications"},{"key":"647_CR12","doi-asserted-by":"crossref","unstructured":"Pott, A.: Almost perfect and planar functions. Designs, Codes and Cryptography, 78, 141\u2013195 (2016)","DOI":"10.1007\/s10623-015-0151-x"},{"key":"647_CR13","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10623-019-00687-w","volume":"88","author":"A S\u0103l\u0103gean","year":"2020","unstructured":"S\u0103l\u0103gean, A.: Discrete antiderivatives for functions over $$\\mathbb{F} _{p}^{n}$$. Designs, Codes and Cryptography 88, 471\u2013486 (2020)","journal-title":"Designs, Codes and Cryptography"},{"key":"647_CR14","unstructured":"Weng, G., Tan, Y., Gong, G.: On quadratic almost perfect nonlinear functions and their related algebraic object. In Workshop on Coding and Cryptography, 57\u201368 (2013)"},{"issue":"2","key":"647_CR15","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions. Designs, Codes and Cryptography 73(2), 587\u2013600 (2014)","journal-title":"Designs, Codes and Cryptography"},{"key":"647_CR16","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.ffa.2018.06.011","volume":"53","author":"Z Zha","year":"2018","unstructured":"Zha, Z., Hu, L., Zhang, Z.: Three new classes of generalized almost perfect nonlinear power functions. Finite Fields and Their Applications 53, 254\u2013266 (2018)","journal-title":"Finite Fields and Their Applications"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00647-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00647-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00647-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T16:23:36Z","timestamp":1717431816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00647-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,31]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["647"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00647-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,31]]},"assertion":[{"value":"20 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}