Affine Equivalency and Nonlinearity Preserving Bijective Mappings over 𝔽2
暂无分享,去创建一个
Osmanbey Uzunkol | Mehmet Sabir Kiraz | Isa Sertkaya | Ali Doganaksoy | M. Kiraz | I. Sertkaya | A. Doganaksoy | Osmanbey Uzunkol
[1] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[2] James A. Maiorana. A classification of the cosets of the Reed-Muller code R(1, 6) , 1991 .
[3] Isa Sertkaya,et al. NONLINEARITY PRESERVING POST-TRANSFORMATIONS , 2004 .
[4] J. Sylvester. LX. Thoughts on inverse orthogonal matrices, simultaneous signsuccessions, and tessellated pavements in two or more colours, with applications to Newton's rule, ornamental tile-work, and the theory of numbers , 1867 .
[5] Philippe Langevin,et al. Counting all bent functions in dimension eight 99270589265934370305785861242880 , 2011, Des. Codes Cryptogr..
[6] Harold S. Stone,et al. Structures of the Affine Families of Switching Functions , 1969, IEEE Transactions on Computers.
[7] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[8] Warwick de Launey,et al. Algebraic Design Theory , 2011 .
[9] Sihem Mesnager,et al. On Dillon's class H of bent functions, Niho bent functions and o-polynomials , 2011, J. Comb. Theory, Ser. A.
[10] Xiang-dong Hou. AGL(m, 2) Acting on R(r, m)/R(s, m) , 1995 .
[11] Peter L. Hammer,et al. Boolean Models and Methods in Mathematics, Computer Science, and Engineering , 2010, Boolean Models and Methods.
[12] Peter L. Hammer,et al. Boolean Models and Methods in Mathematics, Computer Science, and Engineering: Contents , 2010 .
[13] Michael A. Harrison,et al. The Number of Classes of Invertible Boolean Functions , 1963, JACM.
[14] Natalia N. Tokareva. Automorphism group of the set of all bent functions , 2010, IACR Cryptol. ePrint Arch..
[15] Bart Preneel,et al. Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties , 2005, ICALP.
[16] Josef Pieprzyk,et al. Towards effective nonlinear cryptosystem design , 1988 .
[17] W. J. Thron,et al. Encyclopedia of Mathematics and its Applications. , 1982 .
[18] Willi Meier,et al. Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.
[19] Marshall Hall. Note on the Mathieu group M12 , 1962 .
[20] Jean-Jacques Quisquater,et al. Advances in Cryptology — EUROCRYPT ’89 , 1991, Lecture Notes in Computer Science.
[21] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[22] Claude Carlet,et al. On CCZ-equivalence and its use in secondary constructions of bent functions , 2009, IACR Cryptol. ePrint Arch..
[23] I. Strazdins,et al. Universal Affine Classification of Boolean Functions , 1997 .
[24] Isa Sertkaya,et al. On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings , 2010, IACR Cryptol. ePrint Arch..
[25] Jennifer Seberry,et al. Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion , 1992, AUSCRYPT.
[26] Joanne Fuller,et al. Analysis of affine equivalent boolean functions for cryptography , 2003 .
[27] Vladimir D. Tonchev,et al. On the number of equivalence classes of Boolean functions under a transformation group (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[28] M. Harrison. On the Classification of Boolean Functions by the General Linear and Affine Groups , 1964 .
[29] Claude Carlet,et al. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems , 1998, Des. Codes Cryptogr..
[30] Claude Carlet,et al. CCZ-equivalence and Boolean functions , 2009, IACR Cryptol. ePrint Arch..
[31] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[32] Jeffrey S. Leon,et al. An Algorithm for Computing the Automorphism Group of a Hadamard Matrix , 1979, J. Comb. Theory, Ser. A.
[33] O. S. Rothaus,et al. On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.