{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:43:38Z","timestamp":1774907018673,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/tit.2015.2481384","type":"journal-article","created":{"date-parts":[[2015,9,23]],"date-time":"2015-09-23T20:01:50Z","timestamp":1443038510000},"page":"6272-6289","source":"Crossref","is-referenced-by-count":60,"title":["Boolean and Vectorial Plateaued Functions and APN Functions"],"prefix":"10.1109","volume":"61","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2009.3.59","article-title":"A new almost perfect nonlinear function which is not quadratic","volume":"3","author":"edel","year":"2009","journal-title":"Adv Math Commun"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(96)00163-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/15598608.2012.647479"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/625\/12496"},{"key":"ref31","first-page":"356","article-title":"Links between differential and linear cryptanalysis","author":"chabaud","year":"1995","journal-title":"Proc EUROCRYPT"},{"key":"ref30","first-page":"54","article-title":"On plateaued functions and their constructions","author":"carlet","year":"2003","journal-title":"Proc 10th Int Workshop Fast Softw"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(02)00606-4"},{"key":"ref36","first-page":"133","article-title":"Kasami power functions, permutation polynomials and cyclic difference sets","author":"dobbertin","year":"1998","journal-title":"Difference Sets Sequences and their Correlation Properties"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2003.09.003"},{"key":"ref34","first-page":"237","article-title":"Elementary Hadamard difference sets","author":"dillon","year":"1975","journal-title":"Proc 6th S-E Conf Combinat Graph Theory Comput"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.06.024"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-47942-0_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/IJICOT.2010.032131"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-0022-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0145-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.880036"},{"key":"ref1","first-page":"119","article-title":"Multiplier theorem for a difference list","volume":"22","author":"arasu","year":"1986","journal-title":"Ars Combinatoria"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2003.08.013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.011"},{"key":"ref24","first-page":"203","article-title":"Open problems on binary bent functions","author":"carlet","year":"2013","journal-title":"International Journal of Open Problems in Computer Science and Mathematics"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10623-010-9468-7","article-title":"Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions","volume":"59","author":"carlet","year":"2010","journal-title":"Designs Codes Cryptogr"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008344232130"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-16277-5_5","article-title":"Open questions on nonlinearity and on APN functions","volume":"9061","author":"carlet","year":"2014","journal-title":"Proc Arithmetic Finite Fields 5th Int Workshop WAIFI"},{"key":"ref50","author":"mesnager","year":"2015","journal-title":"Bent Functions Fundamentals and Results"},{"key":"ref51","first-page":"378","article-title":"Perfect nonlinear S-boxes","author":"nyberg","year":"1992","journal-title":"Proc EUROCRYPT"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145130"},{"key":"ref58","first-page":"48","article-title":"On quadratic almost perfect nonlinear functions and their related algebraic object","author":"weng","year":"2013","journal-title":"Proc Int Workshop Coding Cryptogr"},{"key":"ref57","first-page":"39","article-title":"A matrix approach for constructing quadratic APN functions","author":"yu","year":"2013","journal-title":"Proc Int Workshop Coding Cryptogr"},{"key":"ref56","article-title":"Plateaudness of Kasami APN functions","author":"yoshiara","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.894690"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47555-9_8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928275"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(96)00164-4"},{"key":"ref12","first-page":"49","article-title":"Another class of quadratic APN binomials over $\\mathbb {F}_{2^{n}}$ : The case n divisible by 4","author":"budaghyan","year":"2007","journal-title":"Proc Workshop on Coding and Cryptography (WCC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2008.10.001"},{"key":"ref14","first-page":"306","article-title":"New classes of almost bent and almost perfect nonlinear polynomials","author":"budaghyan","year":"2005","journal-title":"Workshop on Coding and Cryptography"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864481"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54303-1_116"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01388412"},{"key":"ref19","first-page":"549","article-title":"A larger class of cryptographic Boolean functions via a study of the Maiorana&#x2013;McFarland construction","author":"carlet","year":"2002","journal-title":"Proc Crypto"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9157-3"},{"key":"ref6","first-page":"200","author":"budaghyan","year":"2014","journal-title":"Construction and Analysis of Cryptographic Functions"},{"key":"ref5","first-page":"33","article-title":"An APN permutation in dimension six","author":"browning","year":"2009","journal-title":"Proc Int Conf Finite Fields Appl"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/518\/10195"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920246"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10683-0_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9466-9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"ref45","volume":"20","author":"lidl","year":"1983","journal-title":"Finite Fields"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12325-7_6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","article-title":"Truncated and higher order differentials","author":"knudsen","year":"1995","journal-title":"Proc Int Workshop Fast Software Encrypt"},{"key":"ref41","author":"gerlich","year":"2007","journal-title":"List Classes and Difference Lists A New Approach to Difference Lists and Difference Sets in Abelian Groups"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"ref43","first-page":"167","article-title":"Crooked maps in finite fields","author":"kyureghyan","year":"2005","journal-title":"Proc Eur Conf Combinat Graph Theory Appl (EuroComb)"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7299738\/07274748.pdf?arnumber=7274748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:45:42Z","timestamp":1642005942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7274748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":61,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tit.2015.2481384","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11]]}}}