Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
暂无分享,去创建一个
[1] Qichun Wang,et al. A Note on Fast Algebraic Attacks and Higher Order Nonlinearities , 2010, Inscrypt.
[2] H. Niederreiter,et al. Finite Fields: Encyclopedia of Mathematics and Its Applications. , 1997 .
[3] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[4] Tor Helleseth,et al. A New Attack on the Filter Generator , 2007, IEEE Transactions on Information Theory.
[5] Yingpu Deng,et al. Boolean functions with all main cryptographic properties , 2010, IACR Cryptol. ePrint Arch..
[6] Risto M. Hakala,et al. On the Nonlinearity of Discrete Logarithm in \mathbb F2n\mathbb F_{2^n} , 2010, SETA.
[7] M. R. Spiegel. Mathematical handbook of formulas and tables , 1968 .
[8] Hugues Randriam,et al. On the Number of Carries Occuring in an Addition mod 2k-1 , 2011, IACR Cryptol. ePrint Arch..
[9] Claude Carlet. On a weakness of the Tu-Deng function and its repair , 2009, IACR Cryptol. ePrint Arch..
[10] Claude Carlet,et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction , 2006, IEEE Transactions on Information Theory.
[11] Wen-Feng Qi,et al. Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity , 2006, ASIACRYPT.
[12] Frederik Armknecht,et al. Improving Fast Algebraic Attacks , 2004, FSE.
[13] K. Nyberg,et al. On the nonlinearity of discrete logarithm in F2n , 2010 .
[14] Lei Hu,et al. Further properties of several classes of Boolean functions with optimum algebraic immunity , 2009, Des. Codes Cryptogr..
[15] Hans Dobbertin,et al. Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.
[16] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[17] Philip Hawkes,et al. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.
[18] Yingpu Deng,et al. A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity , 2011, Des. Codes Cryptogr..
[19] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[20] Gérard D. Cohen,et al. On a Conjecture about Binary Strings Distribution , 2010, SETA.
[21] Na Li,et al. On the Construction of Boolean Functions With Optimal Algebraic Immunity , 2008, IEEE Transactions on Information Theory.
[22] Frederik Armknecht,et al. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks , 2006, EUROCRYPT.
[23] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[24] Lei Hu,et al. Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity , 2010, IACR Cryptol. ePrint Arch..
[25] LI YUAN,et al. ON A COMBINATORIC CONJECTURE , 2009 .
[26] Claude Carlet,et al. An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.
[27] Haibin Kan,et al. Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials , 2010, IEEE Transactions on Information Theory.
[28] Panagiotis Rizomiliotis,et al. On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation , 2010, IEEE Transactions on Information Theory.
[29] Lei Hu,et al. More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks , 2011, IEEE Transactions on Information Theory.
[30] Lei Hu,et al. Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[31] Seokhie Hong,et al. A note on "Improved Fast Correlation Attacks on Stream Ciphers" , 2010, IACR Cryptol. ePrint Arch..
[32] Subhamoy Maitra,et al. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..
[33] Mikhail Lobanov. Tight bound between nonlinearity and algebraic immunity , 2005, IACR Cryptol. ePrint Arch..
[34] Lei Hu,et al. Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity , 2010, IACR Cryptol. ePrint Arch..
[35] Tanja Lange,et al. On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two , 2005, WCC.
[36] Claude Carlet. Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials" , 2011, IEEE Trans. Inf. Theory.
[37] Jing Yang,et al. Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..
[38] Yingpu Deng,et al. A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity , 2009, IACR Cryptol. ePrint Arch..
[39] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.
[40] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[41] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[42] Gérard Cohen,et al. On a generalized combinatorial conjecture involving addition mod 2 k -1. , 2011 .
[43] Hugues Randriam,et al. On the Number of Carries Occurring in an Addition Mod , 2012 .