Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions
暂无分享,去创建一个
[1] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[2] Jean-Pierre Tillich,et al. Computing the Algebraic Immunity Efficiently , 2006, FSE.
[3] Na Li,et al. On the Construction of Boolean Functions With Optimal Algebraic Immunity , 2008, IEEE Transactions on Information Theory.
[4] Subhamoy Maitra,et al. Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity , 2005, FSE.
[5] Claude Carlet,et al. An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity , 2008, ASIACRYPT.
[6] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[7] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[8] V. Strassen. Gaussian elimination is not optimal , 1969 .
[9] Deepak Kumar Dalai. On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks , 2006 .
[10] I. Duff,et al. Direct Methods for Sparse Matrices , 1987 .
[11] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[12] Timothy A. Davis,et al. Direct methods for sparse linear systems , 2006, Fundamentals of algorithms.
[13] Frédéric Didier. Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks , 2006, INDOCRYPT.
[14] Subhamoy Maitra,et al. Results on Algebraic Immunity for Cryptographically Significant Boolean Functions , 2004, INDOCRYPT.
[15] R. McEliece. The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes , 2003 .
[16] Lei Hu,et al. Further properties of several classes of Boolean functions with optimum algebraic immunity , 2009, Des. Codes Cryptogr..
[17] Guang Gong,et al. Upper Bounds on Algebraic Immunity of Boolean Power Functions , 2006, FSE.
[18] Subhamoy Maitra,et al. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..
[19] Frederik Armknecht,et al. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks , 2006, EUROCRYPT.
[20] Subhamoy Maitra,et al. Reducing the Number of Homogeneous Linear Equations in Finding Annihilators , 2006, SETA.