A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function
暂无分享,去创建一个
Chik How Tan | Qichun Wang | Timothy Foo | C. H. Tan | C. Tan | Qichun Wang | Timothy Foo
[1] David Thomas,et al. The Art in Computer Programming , 2001 .
[2] Donald E. Knuth,et al. The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations (Art of Computer Programming) , 2005 .
[3] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[4] Wen-Feng Qi,et al. Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity , 2006, ASIACRYPT.
[5] O. S. Rothaus,et al. On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.
[6] Xiaohu Tang,et al. Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks , 2013, IEEE Transactions on Information Theory.
[7] Martijn Stam,et al. Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.
[8] Yongzhuang Wei,et al. On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces , 2012, IEEE Transactions on Information Theory.
[9] Jing Yang,et al. Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..
[10] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[11] Chao Li,et al. Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Claude Carlet,et al. Cryptographic properties of the hidden weighted bit function , 2014, Discret. Appl. Math..
[13] Pantelimon Stanica,et al. Concatenations of the hidden weighted bit function and their cryptographic properties , 2014, Adv. Math. Commun..
[14] Na Li,et al. On the Construction of Boolean Functions With Optimal Algebraic Immunity , 2008, IEEE Transactions on Information Theory.
[15] Claude Carlet,et al. An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.
[16] Panagiotis Rizomiliotis,et al. On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation , 2010, IEEE Transactions on Information Theory.
[17] Lei Hu,et al. More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks , 2011, IEEE Transactions on Information Theory.
[18] Claude Carlet,et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction , 2006, IEEE Transactions on Information Theory.
[19] Qichun Wang,et al. A Note on Fast Algebraic Attacks and Higher Order Nonlinearities , 2010, Inscrypt.
[20] Haibin Kan,et al. Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials , 2010, IEEE Transactions on Information Theory.
[21] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[22] Philip Hawkes,et al. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.
[23] Chik How Tan,et al. A new method to construct Boolean functions with good cryptographic properties , 2013, Inf. Process. Lett..
[24] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[25] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[26] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[27] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[28] Subhamoy Maitra,et al. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..
[29] Harald Niederreiter,et al. Introduction to finite fields and their applications: Preface , 1994 .
[30] Yingpu Deng,et al. A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity , 2011, Des. Codes Cryptogr..
[31] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[32] Dongdai Lin,et al. Perfect Algebraic Immune Functions , 2012, ASIACRYPT.
[33] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[34] Subhamoy Maitra,et al. Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity , 2005, FSE.
[35] Randal E. Bryant,et al. On the Complexity of VLSI Implementations and Graph Representations of Boolean Functions with Application to Integer Multiplication , 1991, IEEE Trans. Computers.
[36] Lei Hu,et al. Further properties of several classes of Boolean functions with optimum algebraic immunity , 2009, Des. Codes Cryptogr..
[37] Enes Pasalic,et al. Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis , 2009, ICISC.
[38] Peter L. Hammer,et al. Boolean Models and Methods in Mathematics, Computer Science, and Engineering , 2010, Boolean Models and Methods.
[39] Chik How Tan,et al. Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity , 2014, Discret. Appl. Math..
[40] Pantelimon Stanica,et al. Cryptographic Boolean Functions and Applications , 2009 .
[41] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[42] Chik How Tan,et al. Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..