{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T08:06:49Z","timestamp":1759565209291,"version":"3.41.2"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1023\/a:1008359713877","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"45-63","source":"Crossref","is-referenced-by-count":18,"title":["Relating Differential Distribution Tables to Other Properties of of Substitution Boxes"],"prefix":"10.1007","volume":"19","author":[{"given":"Xian-Mo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"202745_CR1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0020-0190(92)90258-W","volume":"41","author":"C. M. Adams","year":"1992","unstructured":"C. M. Adams, On immunity against Biham and Shamir's \u201cdifferential cryptanalysis, Information Processing Letters, Vol. 41 (1992) pp. 77\u201380.","journal-title":"Information Processing Letters"},{"issue":"5","key":"202745_CR2","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1109\/18.57222","volume":"IT-36","author":"C. M. Adams","year":"1990","unstructured":"C. M. Adams and S. E. Tavares. Generating and counting binary bent sequences, IEEE Transactions on Information Theory, Vol. IT-36 No. 5 (1990) pp. 1170\u20131173.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"202745_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No. 1 (1991) pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"202745_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, Heidelberg, Tokyo (1993)."},{"key":"202745_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-57332-1_3","volume-title":"Advances in Cryptology-ASIACRYPT'91, volume 739","author":"L. Brown","year":"1993","unstructured":"L. Brown, M. Kwan, J. Pieprzyk, and J. Seberry. Improving resistance to differential cryptanalysis and the redesign of LOKI. In Advances in Cryptology-ASIACRYPT'91, volume 739, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1993) pp. 36\u201350."},{"key":"202745_CR6","series-title":"Lecture Notes in Computer Science","first-page":"256","volume-title":"Advances in Cryptology-EUROCRYPT'94, volume 950","author":"F. Chabaud","year":"1995","unstructured":"Florent Chabaud and Serge Vaudenay. Links between differential and linear cryptanalysis. In Advances in Cryptology-EUROCRYPT'94, volume 950, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1995) pp. 256\u2013265."},{"key":"202745_CR7","series-title":"Lecture Notes in Computer Science","first-page":"275","volume-title":"Fast Software Encryption, volume 1008","author":"J. Daemen","year":"1994","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. Correlation matrices. In Fast Software Encryption, volume 1008, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1994) pp. 275\u2013285."},{"key":"202745_CR8","unstructured":"J. F. Dillon. A survey of bent functions. The NSA Technical Journal, (1972) pp. 191\u2013215. (unclassified)."},{"key":"202745_CR9","volume-title":"Differential And Integral Calculus","author":"F. Erwe","year":"1967","unstructured":"Friedhelm Erwe. Differential And Integral Calculus. Oliver And Boyd Ltd, Edinburgh And London (1967)."},{"key":"202745_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"T. Jakobsen","year":"1997","unstructured":"T. Jakobsen and L. Knudsen. The interpolation attack on block ciphers. In Fast Software Encryption, Lecture Notes in Computer Science, Springer-Verlag, Berlin, New York, Tokyo (1997)."},{"key":"202745_CR11","unstructured":"Rudoff Lidl and Harald Niederreiter. Finite Fields, Encyclopedia of Mathematics and Its Applications. Cambridge University Press (1983)."},{"key":"202745_CR12","unstructured":"F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, New York, Oxford (1978)."},{"key":"202745_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology-EUROCRYPT'93, volume 765","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptology-EUROCRYPT'93, volume 765, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1994) pp. 386\u2013397."},{"key":"202745_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology-EUROCRYPT'89, volume 434","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology-EUROCRYPT'89, volume 434, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1990), pp. 549\u2013562."},{"key":"202745_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology-EUROCRYPT'91, volume 547","author":"K. Nyberg","year":"1991","unstructured":"K. Nyberg. Perfect nonlinear S-boxes. In Advances in Cryptology-EUROCRYPT'91, volume 547, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1991) pp. 378\u2013386."},{"key":"202745_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advances in Cryptology-EUROCRYPT'92, volume 658","author":"K. Nyberg","year":"1993","unstructured":"K. Nyberg. On the construction of highly nonlinear permutations. In Advances in Cryptology-EUROCRYPT'92, volume 658, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1993) pp. 92\u201398."},{"key":"202745_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology-EUROCRYPT'93, volume 765","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg. Differentially uniform mappings for cryptography. In Advances in Cryptology-EUROCRYPT'93, volume 765, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1994) pp. 55\u201365."},{"key":"202745_CR18","series-title":"Lecture Notes in Computer Science","first-page":"360","volume-title":"Advances in Cryptology-EUROCRYPT'93, volume 765","author":"L. J. O'Connor","year":"1994","unstructured":"L. J. O'Connor. On the distribution of characteristics in bijective mappings. In Advances in Cryptology-EUROCRYPT'93, volume 765, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1994) pp. 360\u2013370."},{"key":"202745_CR19","series-title":"Lecture Notes in Computer Science","first-page":"155","volume-title":"Advances in Cryptology-EUROCRYPT'90, volume 437","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, W. V. Leekwijck, L. V. Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of boolean functions. In Advances in Cryptology-EUROCRYPT'90, volume 437, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1991) pp. 155\u2013165."},{"key":"202745_CR20","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus. On \u201cbent\u201d functions. Journal of Combinatorial Theory, Ser. A, Vol. 20 (1976) pp. 300\u2013305.","journal-title":"Journal of Combinatorial Theory, Ser. A"},{"key":"202745_CR21","first-page":"172","volume-title":"Proceedings of the first ACM Conference on Computer and Communications Security","author":"J. Seberry","year":"1993","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng. Systematic generation of cryptographically robust S-boxes. In Proceedings of the first ACM Conference on Computer and Communications Security, The Association for Computing Machinery, New York (1993) pp. 172\u2013182."},{"key":"202745_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-48285-7_16","volume-title":"Advances in Cryptology-EUROCRYPT'93, volume 765","author":"J. Seberry","year":"1994","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng, On constructions and nonlinearity of correlation immune functions. In Advances in Cryptology-EUROCRYPT'93, volume 765, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1994) pp. 181\u2013199."},{"issue":"1","key":"202745_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/inco.1995.1073","volume":"119","author":"J. Seberry","year":"1995","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng, Nonlinearity and propagation characteristics of balanced boolean functions. Information and Computation, Vol. 119, No. 1 (1995) pp. 1\u201313.","journal-title":"Information and Computation"},{"key":"202745_CR24","unstructured":"T. Shimoyama, S. Moriai, and T. Kaneko, Cryptanalysis of the cipher KN, May 1997, presented at the rump session of Eurocrypt'97."},{"key":"202745_CR25","doi-asserted-by":"crossref","unstructured":"H. Tapia-Recillas, E. Daltabuit, and G. Vega, Some results on regular mappings, preprint, 1996.","DOI":"10.1007\/3-540-63163-1_25"},{"key":"202745_CR26","first-page":"112","volume":"136","author":"R. Yarlagadda","year":"1989","unstructured":"R. Yarlagadda and J. E. Hershey, Analysis and synthesis of bent sequences. IEE Proceedings (Part E), Vol. 136 (1989) pp. 112\u2013123.","journal-title":"IEE Proceedings (Part E)"},{"key":"202745_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-68339-9_26","volume-title":"Advances in Cryptology-EUROCRYPT'96, volume 1070","author":"X. M. Zhang","year":"1996","unstructured":"X. M. Zhang and Y. Zheng, Auto-correlations and new bounds on the nonlinearity of boolean functions. In Advances in Cryptology-EUROCRYPT'96, volume 1070, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York (1996) pp. 294\u2013306."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008359713877.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008359713877\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008359713877.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:19:01Z","timestamp":1753759141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008359713877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["202745"],"URL":"https:\/\/doi.org\/10.1023\/a:1008359713877","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}