On algebraic immunity of Maiorana-McFarland like functions and applications of algebraic attacks to some stream cipher schemes
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[2] Kaoru Kurosawa,et al. Highly Nonlinear t-resilient Functions , 1997, J. Univers. Comput. Sci..
[3] Jovan Dj. Golic. Vectorial Boolean functions and induced algebraic equations , 2006, IEEE Transactions on Information Theory.
[4] Sangjin Lee,et al. On the Correlation Immune Functions and Their Nonlinearity , 1996, ASIACRYPT.
[5] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[6] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[7] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[8] Enes Pasalic,et al. Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class , 2003, IMACC.
[9] P. Sarkar,et al. Improved construction of nonlinear resilient S-boxes , 2002, IEEE Transactions on Information Theory.
[10] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[11] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[12] Lars R. Knudsen. Quadratic relations in Khazad and Whirlpool , 2002 .
[13] Yuliang Zheng,et al. Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] Enes Pasalic,et al. A construction of resilient functions with high nonlinearity , 2003, IEEE Trans. Inf. Theory.
[16] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[17] Subhamoy Maitra,et al. Linear codes in generalized construction of resilient functions with very high nonlinearity , 2002, IEEE Trans. Inf. Theory.
[18] Agnes Hui Chan,et al. Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers , 2000, CRYPTO.
[19] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.