暂无分享,去创建一个
[1] R. A. Rueppel. Analysis and Design of Stream Ciphers , 2012 .
[2] Hu Chuan-Gan,et al. On The Shift Register Sequences , 2004 .
[3] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[4] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[5] Douglas R. Stinson,et al. Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds , 1996, SIAM J. Discret. Math..
[6] Xi Chen,et al. Constructing Low-Weight $d$ th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform , 2018, IEEE Transactions on Information Theory.
[7] Anne Canteaut,et al. Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography , 1999, Des. Codes Cryptogr..
[8] Serge Vaudenay,et al. Black Box Cryptanalysis of Hash Networks Based on Multipermutations , 1994, EUROCRYPT.
[9] R. McEliece. Finite field for scientists and engineers , 1987 .
[10] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[11] Guang Gong,et al. Discrete Fourier Transform of Boolean Functions over the Complex Field and Its Applications , 2018, IEEE Transactions on Information Theory.
[12] Claude Carlet,et al. On Correlation-Immune Functions , 1991, CRYPTO.
[13] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[14] Anne Canteaut,et al. Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations , 1996, CRYPTO.
[15] Kai-Uwe Schmidt,et al. Quaternary Constant-Amplitude Codes for Multicode CDMA , 2006, IEEE Transactions on Information Theory.
[16] Solomon W. Golomb,et al. On the classification of Boolean functions , 1959, IRE Trans. Inf. Theory.
[17] Lennart Brynielsson. A short proof of the Xiao-Massey lemma , 1989, IEEE Trans. Inf. Theory.
[18] Guang Gong,et al. The Fourier spectral characterization for the correlation-immune functions over Fp$\phantom {\dot {i}\!}\mathbb {F}_{p}$ , 2019, Cryptogr. Commun..
[19] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[20] Qichun Wang. Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights , 2018, IACR Cryptol. ePrint Arch..
[21] Victor K.-W. Wei,et al. On the constructions and nonlinearity of binary vector-output correlation-immune functions , 2004, J. Complex..
[22] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[23] Solomon W. Golomb,et al. On the Cryptanalysis of Nonlinear Sequences , 1999, IMACC.
[24] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[25] Guang Gong,et al. Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar , 2005 .
[26] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[27] Douglas R. Stinson,et al. Three characterizations of non-binary correlation-immune and resilient functions , 1995, Des. Codes Cryptogr..
[28] Claude Carlet,et al. Boolean Functions for Cryptography and Coding Theory , 2020 .
[29] Sylvain Guilley,et al. Correlation-immune Boolean functions for easing counter measures to side-channel attacks , 2014 .