E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, CRYPTO'90, pp.2-21, 1991.
DOI : 10.1007/3-540-38424-3_1

URL : http://www.crypto.nkfu.edu.tw/CRYPTO/biham.pdf

C. Blondeau, A. Canteaut, and P. Charpin, Differential properties of power functions, International Journal of Information and Coding Theory, vol.1, issue.2, pp.149-170, 2010.
DOI : 10.1504/IJICOT.2010.032132

URL : https://hal.archives-ouvertes.fr/hal-00610092

C. Blondeau and B. Gérard, Multiple Differential Cryptanalysis: Theory and Practice, LNCS, vol.21, pp.35-54, 2011.
DOI : 10.1007/978-3-540-71039-4_23

URL : https://hal.archives-ouvertes.fr/hal-00610107

M. Brinkmann and G. Leander, On the classification of APN functions up to dimension five, Designs, Codes and Cryptography, vol.2, issue.1-3, pp.273-288, 2008.
DOI : 10.1007/s10623-008-9194-6

K. Browning, J. Dillon, M. Mcquistan, and A. Wolfe, An APN permutation in dimension six, Contemporary Mathematics. AMS, vol.518, pp.33-42, 2010.
DOI : 10.1090/conm/518/10194

A. Canteaut and J. Roué, On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, EUROCRYPT 2015, Part I, pp.45-74, 2015.
DOI : 10.1007/978-3-662-46800-5_3

URL : https://hal.archives-ouvertes.fr/hal-01104051

C. Carlet, Open Questions on Nonlinearity and on APN Functions, Arithmetic of Finite Fields -WAIFI 2014, pp.83-107, 2015.
DOI : 10.1007/978-3-319-16277-5_5

C. Carlet, P. Charpin, and V. Zinoviev, Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems, Designs, Codes and Cryptography, vol.15, issue.2, pp.125-156, 1998.
DOI : 10.1023/A:1008344232130

F. Chabaud and S. Vaudenay, Links between differential and linear cryptoanalysis, EUROCRYPT'94, pp.356-365, 1995.
DOI : 10.1007/bfb0053450

URL : http://umjy.chonnam.ac.kr/~journey/cs/crypto/papers/liens-94-3_a4.ps

H. Dobbertin, Almost perfect nonlinear power functions on GF(2/sup n/): the Welch case, IEEE Transactions on Information Theory, vol.45, issue.4, pp.1271-1275, 1999.
DOI : 10.1109/18.761283

Y. Edel, G. M. Kyureghyan, and A. Pott, A new APN function which is not equivalent to a power mapping, IEEE Transactions on Information Theory, vol.52, issue.2, pp.744-747, 2006.
DOI : 10.1109/TIT.2005.862128

URL : http://arxiv.org/pdf/math/0506420

A. Gorodilova, On a remarkable property of APN Gold functions, Cryptology ePrint Archive Report, vol.2016, p.286, 2016.

F. Hernando and G. Mcguire, Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions, Journal of Algebra, vol.343, issue.1, pp.78-92, 2011.
DOI : 10.1016/j.jalgebra.2011.06.019

L. R. Knudsen, Truncated and higher order differentials, FSE'94, pp.196-211, 1995.
DOI : 10.1007/3-540-60590-8_16

URL : ftp://ftp.esat.kuleuven.ac.be/cosic/knudsen/trunc.ps.Z

L. R. Knudsen, G. Leander, A. Poschmann, and M. J. Robshaw, PRINTcipher: A Block Cipher for IC-Printing, LNCS, vol.6225, pp.16-32, 2010.
DOI : 10.1007/978-3-642-15031-9_2

G. Leander and A. Poschmann, On the Classification of 4 Bit S-Boxes, Proceedings. Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007.
DOI : 10.1007/978-3-540-73074-3_13

K. Nyberg, Differentially uniform mappings for cryptography, EUROCRYPT'93, pp.55-64, 1994.
DOI : 10.1007/3-540-48285-7_6

K. Nyberg and L. R. Knudsen, Provable security against differential cryptanalysis (rump session), LNCS, vol.740, pp.566-574, 1993.
DOI : 10.1007/3-540-48071-4_41

S. Park, S. H. Sung, S. Lee, and J. Lim, Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES, LNCS, vol.2887, pp.247-260, 2003.
DOI : 10.1007/978-3-540-39887-5_19

V. Suder, Antiderivative functions over F2n, Workshop on Coding and Cryptography -WCC 2015, 2015.
DOI : 10.1007/s10623-016-0186-7

URL : https://hal.archives-ouvertes.fr/hal-01275708

V. Suder, Antiderivative functions over $$\mathbb {F}_{2^n}$$ F 2 n, Designs, Codes and Cryptography, vol.82, issue.1-2, pp.435-447, 2017.
DOI : 10.1007/s00200-014-0220-9

Y. Yu, M. Wang, and Y. Li, A matrix approach for constructing quadratic APN functions, Designs, Codes and Cryptography, vol.73, issue.2, pp.587-600, 2014.
DOI : 10.1016/j.ffa.2011.06.002

URL : http://eprint.iacr.org/2013/007.pdf