Further study on the maximum number of bent components of vectorial functions
暂无分享,去创建一个
Sihem Mesnager | Yong Zhou | Chunming Tang | Fengrong Zhang | Chun-ming Tang | S. Mesnager | Fengrong Zhang | Yong Zhou
[1] Sihem Mesnager,et al. Four decades of research on bent functions , 2016, Des. Codes Cryptogr..
[2] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[3] Claude Carlet. Boolean and Vectorial Plateaued Functions and APN Functions , 2015, IEEE Transactions on Information Theory.
[4] Claude Carlet,et al. On CCZ-equivalence and its use in secondary constructions of bent functions , 2009, IACR Cryptol. ePrint Arch..
[5] Enes Pasalic,et al. On multiple output bent functions , 2012, Inf. Process. Lett..
[6] Claude Carlet,et al. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems , 1998, Des. Codes Cryptogr..
[7] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[8] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[9] Sihem Mesnager,et al. Bent Functions , 2016, Springer International Publishing.
[10] Maozhi Xu,et al. New quadratic bent functions in polynomial forms with coefficients in extension fields , 2019, Applicable Algebra in Engineering, Communication and Computing.
[11] Enes Pasalic,et al. On the Maximum Number of Bent Components of Vectorial Functions , 2018, IEEE Transactions on Information Theory.
[12] Sihem Mesnager,et al. On the construction of bent vectorial functions , 2010, Int. J. Inf. Coding Theory.
[13] O. S. Rothaus,et al. On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.
[14] Wang Xuan-ming,et al. An Optimized Method for Multiple Output Bent Functions , 2005 .
[15] Sihem Mesnager,et al. Bent Functions: Fundamentals and Results , 2016 .
[16] S. Mesnager,et al. Bent vectorial functions and linear codes from o-polynomials , 2015, Des. Codes Cryptogr..
[17] Jing Yang,et al. Vectorial Boolean Functions with Good Cryptographic Properties , 2011, Int. J. Found. Comput. Sci..
[18] Kaoru Kurosawa,et al. On Cryptographically Secure Vectorial Boolean Functions , 1999, ASIACRYPT.
[19] Serge Vaudenay,et al. Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.