P. Thierry, A. Berger, P. Canteaut, Y. Charpin, and . Laigle-chapuy, On almost perfect nonlinear functions over F 2, IEEE Trans. Inf. Theory, vol.52, issue.9, pp.4160-4170, 2006.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, CRYPTO'90, vol.537, pp.2-21, 1991.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, J. Cryptology, vol.4, issue.1, pp.3-72, 1991.

K. A. Browning, J. F. Dillon, M. T. Mcquistan, and A. J. Wolfe, An APN permutation in dimension six, Finite Fields: Theory and Applications -FQ9, vol.518, pp.33-42, 2010.

A. Canteaut, S. Duval, and L. Perrin, A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size 2 4 +2, IEEE Trans. Inf. Theory, vol.63, issue.11, pp.7575-7591, 2017.

C. Carlet, P. Charpin, and V. A. Zinoviev, Codes, bent functions and permutations suitable for DES-like cryptosystems, Des. Codes Cryptogr, vol.15, issue.2, pp.125-156, 1998.

F. Chabaud and S. Vaudenay, Links between differential and linear cryptanalysis, LNCS, vol.94, pp.356-365, 1995.

S. Fu, X. Feng, and B. Wu, Differentially 4-uniform permutations with the best known nonlinearity from butterflies, IACR Trans. Symm. Cryptol, vol.2017, issue.2, pp.228-249, 2017.

T. Helleseth and A. Kholosha, On the equation 2 +1 + + = 0 over

, Finite Fields Appl, vol.14, issue.1, pp.159-176, 2008.

X. Hou, Affinity of permutations of F 2, Discrete Appl. Math, vol.154, issue.2, pp.313-325, 2006.

Y. Li, S. Tian, Y. Yu, and M. Wang, On the generalization of butterfly structure, IACR Trans. Symm. Cryptol, vol.2018, issue.1, pp.160-179, 2018.

Y. Li and M. Wang, Constructing S-boxes for lightweight cryptography with Feistel structure, LNCS, vol.8731, pp.127-146, 2014.

M. Matsui, Linear cryptanalysis method for DES cipher, LNCS, vol.93, pp.386-397, 1994.

K. Nyberg, Differentially uniform mappings for cryptography, LNCS, vol.765, issue.93, pp.55-64, 1994.

K. Nyberg and L. R. Knudsen, Provable security against differential cryptanalysis (rump session), LNCS, vol.740, pp.566-574, 1993.

L. Perrin, A. Udovenko, and A. Biryukov, Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem, CRYPTO 2016, Part II, vol.9815, pp.93-122, 2016.

Y. Yu, M. Wang, and Y. Li, A matrix approach for constructing quadratic APN functions, Des. Codes and Cryptogr, vol.73, issue.2, pp.587-600, 2014.