{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:30:22Z","timestamp":1764981022745,"version":"3.46.0"},"reference-count":19,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    The authors introduced a new family of cryptographic schemes in a previous research article, which includes many practical encryption schemes, such as the Feistel family. Given a finite field of order\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_001.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi>q<\/m:mi>\n                        <\/m:math>\n                        <jats:tex-math>q<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , any\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_002.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:mi>n<\/m:mi>\n                          <m:mo>&gt;<\/m:mo>\n                          <m:mi>m<\/m:mi>\n                          <m:mo>\u2265<\/m:mo>\n                          <m:mn>0<\/m:mn>\n                        <\/m:math>\n                        <jats:tex-math>n\\gt m\\ge 0<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , the authors described a new way to extend discrete functions with domain size\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_003.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:msup>\n                            <m:mrow>\n                              <m:mi>q<\/m:mi>\n                            <\/m:mrow>\n                            <m:mrow>\n                              <m:mi>m<\/m:mi>\n                            <\/m:mrow>\n                          <\/m:msup>\n                        <\/m:math>\n                        <jats:tex-math>{q}^{m}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    and range size\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_004.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:msup>\n                            <m:mrow>\n                              <m:mi>q<\/m:mi>\n                            <\/m:mrow>\n                            <m:mrow>\n                              <m:mi>n<\/m:mi>\n                              <m:mo>\u2212<\/m:mo>\n                              <m:mi>m<\/m:mi>\n                            <\/m:mrow>\n                          <\/m:msup>\n                        <\/m:math>\n                        <jats:tex-math>{q}^{n-m}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    to a permutation over\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_005.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:msup>\n                            <m:mrow>\n                              <m:mi>q<\/m:mi>\n                            <\/m:mrow>\n                            <m:mrow>\n                              <m:mi>n<\/m:mi>\n                            <\/m:mrow>\n                          <\/m:msup>\n                        <\/m:math>\n                        <jats:tex-math>{q}^{n}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    elements using theory from linear error correcting codes. The authors previously showed that the knowledge about the differentials and correlations of the resulting permutation reduces solely to those of the extended discrete function. We show how the perfect secrecy of extended nonlinear functions transfers to the family of bijective linear extensions. We investigate how the concrete security of the family of nonlinear functions relates to the family of permutations obtained by such a type of linear extension. We also explore how the interplay between the entropy and the total variation distance (near-perfect secrecy with unbounded adversary) affects the mixing rate (number of iterations of the feedback linear extensions) with respect to the uniform distribution of the permutations over\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/j_jmc-2024-0010_eq_006.png\"\/>\n                        <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <m:msup>\n                            <m:mrow>\n                              <m:mi>q<\/m:mi>\n                            <\/m:mrow>\n                            <m:mrow>\n                              <m:mi>n<\/m:mi>\n                            <\/m:mrow>\n                          <\/m:msup>\n                        <\/m:math>\n                        <jats:tex-math>{q}^{n}<\/jats:tex-math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    elements. We give a new proof that a distribution close to the uniform distribution has a large entropy.\n                  <\/jats:p>","DOI":"10.1515\/jmc-2024-0010","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:51:23Z","timestamp":1733989883000},"source":"Crossref","is-referenced-by-count":1,"title":["Revisiting linearly extended discrete functions"],"prefix":"10.1515","volume":"18","author":[{"given":"Claude","family":"Gravel","sequence":"first","affiliation":[{"name":"Department of Computer Science, Toronto Metropolitan University , Toronto , Canada"}]},{"given":"Daniel","family":"Panario","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Carleton University , Ottawa , Canada"}]}],"member":"374","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"2025120600251193677_j_jmc-2024-0010_ref_001","doi-asserted-by":"crossref","unstructured":"Gravel C, Panario D. Feedback linearly extended discrete functions. J Algebra Appl. 2023;22(2):2350051. 10.1142\/S0219498823500512.","DOI":"10.1142\/S0219498823500512"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_002","unstructured":"Feller W. An introduction to probability theory and its applications. vol. 1 of probability and mathematical statistics. 3rd ed. New York: John Wiley and Sons Inc.; 1968."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_003","unstructured":"Feller W. An introduction to probability theory and its applications. vol. 2 of probability and mathematical statistics. 2nd ed. New York: John Wiley and Sons Inc.; 1971."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_004","unstructured":"Katz J, Lindell Y. Introduction to modern cryptography. Chapman & Hall\/CRC Cryptography and Network Security Series. New York (US): CRC Press; 2020."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_005","unstructured":"Lindell Y, editor. Tutorials on the foundations of cryptography. Cham (Switzerland): Springer International Publishing; 2017. 10.1007\/978-3-319-57048-8."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_006","doi-asserted-by":"crossref","unstructured":"Mullen GL, Panario D. Handbook of finite fields. New York (US): Chapman & Hall\/CRC; 2013.","DOI":"10.1201\/b15006"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_007","unstructured":"Godement R. Cours d\u2019alg\u00e8bre. 3rd ed. Paris (France): Hermann; 1997."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_008","doi-asserted-by":"crossref","unstructured":"Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J. 1949;28(4):656\u2013715.","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_009","doi-asserted-by":"crossref","unstructured":"Goldreich O, Goldwasser S, Micali S. How to construct random functions. J ACM. 1986;33(4):792\u2013807.","DOI":"10.1145\/6490.6503"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_010","doi-asserted-by":"crossref","unstructured":"Dodis Y. Shannon impossibility, Revisited. In: Smith A, editor. Information theoretic security. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012. p. 100\u201310.","DOI":"10.1007\/978-3-642-32284-6_6"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_011","doi-asserted-by":"crossref","unstructured":"Morris B. Improved mixing time bounds for the Thorp shuffle. Combinatorics Probability Comput. 2013;22(1):118\u201332.","DOI":"10.1017\/S0963548312000478"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_012","doi-asserted-by":"crossref","unstructured":"Morris B, Rogaway P, Stegers T. Deterministic Encryption with the Thorp Shuffle. J Cryptol. 2018;31(2):521\u201336.","DOI":"10.1007\/s00145-017-9262-z"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_013","doi-asserted-by":"crossref","unstructured":"Thorp EO. Nonrandom shuffling with applications to the game of Faro. J Amer Stat Assoc. 1973;68(344):842\u20137.","DOI":"10.1080\/01621459.1973.10481434"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_014","doi-asserted-by":"crossref","unstructured":"Diaconis P, Fulman J. The mathematics of shuffling cards. Providence (Rhode Island state, US): American Mathematical Society; 2023.","DOI":"10.1090\/mbk\/146"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_015","doi-asserted-by":"crossref","unstructured":"Hoang VT, Rogaway P. On generalized Feistel networks. Santa Barbara: IACR Cryptol ePrint Arch. 2010. p. 301.","DOI":"10.1007\/978-3-642-14623-7_33"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_016","doi-asserted-by":"crossref","unstructured":"Lai X, Massey JL. A proposal for a new block encryption standard. In: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. EUROCRYPT \u201990. Berlin, Heidelberg: Springer-Verlag; 1991. p. 389\u2013404.","DOI":"10.1007\/3-540-46877-3_35"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_017","unstructured":"Junod P, Vaudenay S. FOX Specifications Version 1.2. Switzerland: \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne; 2005."},{"key":"2025120600251193677_j_jmc-2024-0010_ref_018","doi-asserted-by":"crossref","unstructured":"von zur Gathen J, Gerhard J. Modern computer algebra. 3rd ed. USA: Cambridge University Press; 2013.","DOI":"10.1017\/CBO9781139856065"},{"key":"2025120600251193677_j_jmc-2024-0010_ref_019","unstructured":"Hill R. A first course in coding theory. Oxford applied mathematics and computing science series. Oxford (UK): Clarendon Press; 1991."}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2024-0010\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2024-0010\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:25:27Z","timestamp":1764980727000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2024-0010\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":19,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,2,14]]},"published-print":{"date-parts":[[2024,2,14]]}},"alternative-id":["10.1515\/jmc-2024-0010"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2024-0010","relation":{},"ISSN":["1862-2984"],"issn-type":[{"type":"electronic","value":"1862-2984"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20240010"}}