{"id":"https://openalex.org/W3112085881","doi":"https://doi.org/10.1515/jmc-2020-0004","title":"On cryptographic properties of ( <i>n</i> + 1)-bit S-boxes constructed by known <i>n</i> -bit S-boxes","display_name":"On cryptographic properties of ( <i>n</i> + 1)-bit S-boxes constructed by known <i>n</i> -bit S-boxes","publication_year":2020,"publication_date":"2020-12-08","ids":{"openalex":"https://openalex.org/W3112085881","doi":"https://doi.org/10.1515/jmc-2020-0004","mag":"3112085881"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2020-0004","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0004","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0004/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0004/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041316526","display_name":"Yu Zhou","orcid":"https://orcid.org/0000-0003-1777-9439"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yu Zhou","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065924708","display_name":"Daoguang Mu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daoguang Mu","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100862227","display_name":"Xinfeng Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinfeng Dong","raw_affiliation_strings":["Center for Cyber Security, School of Computer Science and Engineering , University of Electronic Science and Technology of China , Chengdu , 611731 , China","Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, School of Computer Science and Engineering , University of Electronic Science and Technology of China , Chengdu , 611731 , China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory , Chengdu , 610041 , China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041316526"],"corresponding_institution_ids":[],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17257024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"15","issue":"1","first_page":"258","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7243850231170654},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.6422410011291504},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.572917640209198},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.5175796747207642},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4917598068714142},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.46778404712677},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4585764706134796},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.45185887813568115},{"id":"https://openalex.org/keywords/bit-field","display_name":"Bit field","score":0.43742355704307556},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3570879101753235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3095889091491699},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.17031139135360718},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.13555705547332764},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.049070149660110474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.04789632558822632}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7243850231170654},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.6422410011291504},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.572917640209198},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.5175796747207642},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4917598068714142},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.46778404712677},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4585764706134796},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.45185887813568115},{"id":"https://openalex.org/C183383400","wikidata":"https://www.wikidata.org/wiki/Q2374485","display_name":"Bit field","level":3,"score":0.43742355704307556},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3570879101753235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3095889091491699},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.17031139135360718},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.13555705547332764},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.049070149660110474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.04789632558822632},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2020-0004","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0004","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0004/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d2d0380aee294ff4ba5a54bce3061bd3","is_oa":true,"landing_page_url":"https://doaj.org/article/d2d0380aee294ff4ba5a54bce3061bd3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 258-265 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2020-0004","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0004","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0004/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3112085881.pdf","grobid_xml":"https://content.openalex.org/works/W3112085881.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1553753418","https://openalex.org/W1571317543","https://openalex.org/W1629301835","https://openalex.org/W1866546768","https://openalex.org/W1906499095","https://openalex.org/W1918243660","https://openalex.org/W1959383191","https://openalex.org/W1966164580","https://openalex.org/W1967942908","https://openalex.org/W1980279697","https://openalex.org/W2020797783","https://openalex.org/W2031521404","https://openalex.org/W2109394932","https://openalex.org/W2512656041","https://openalex.org/W2548651356","https://openalex.org/W2588456215","https://openalex.org/W2795283078","https://openalex.org/W4241072010"],"related_works":["https://openalex.org/W2954599081","https://openalex.org/W1656395319","https://openalex.org/W2349647033","https://openalex.org/W4388441189","https://openalex.org/W2257409576","https://openalex.org/W4212913304","https://openalex.org/W3180134152","https://openalex.org/W4385194751","https://openalex.org/W2997069489","https://openalex.org/W2756048476"],"abstract_inverted_index":{"Abstract":[0],"S-box":[1,103,112],"is":[2,115],"the":[3,21,28,34,49,96,107],"basic":[4],"component":[5],"of":[6,20,30,36,51,63,79,95],"symmetric":[7],"cryptographic":[8,12],"algorithms,":[9],"and":[10,33,57,60,106],"its":[11],"properties":[13],"play":[14],"a":[15],"key":[16],"role":[17],"in":[18,45],"security":[19],"algorithms.":[22],"In":[23],"this":[24],"paper":[25],"we":[26,74,91],"give":[27,76,92],"distributions":[29,35],"Walsh":[31],"spectrum":[32],"autocorrelation":[37],"functions":[38],"for":[39],"(":[40,52,64,80,108],"n":[41,53,65,81,101,109],"+":[42,54,66,82,110],"1)-bit":[43,55,67,83,111],"S-boxes":[44,68,84],"[12].":[46],"We":[47],"obtain":[48],"nonlinearity":[50],"S-boxes,":[56],"one":[58,77,93],"necessary":[59],"sufficient":[61],"conditions":[62],"satisfying":[69,85],"m":[70],"-order":[71,87],"resilient.":[72],"Meanwhile,":[73],"also":[75],"characterization":[78],"t":[86],"propagation":[88],"criterion.":[89],"Finally,":[90],"relationship":[94],"sum-of-squares":[97],"indicators":[98],"between":[99],"an":[100],"-bit":[102],"S":[104,113,118],"0":[105,119],"(which":[114],"constructed":[116],"by":[117],").":[120]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-12-21T00:00:00"}
