Linear Codes in Constructing Resilient Functions with High Nonlinearity
暂无分享,去创建一个
[1] Joel Friedman,et al. On the bit extraction problem , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[2] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[3] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[4] Jung Hee Cheon,et al. Nonlinear Vector Resilient Functions , 2001, CRYPTO.
[5] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[6] T. Johansson,et al. A construction of resilient functions with high nonlinearity , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[7] Tom Verhoeff,et al. An updated table of minimum-distance bounds for binary linear codes , 1987, IEEE Trans. Inf. Theory.
[8] Kaisa Nyberg,et al. Constructions of Bent Functions and Difference Sets , 1991, EUROCRYPT.
[9] K. Gopalakrishnan. A study of correlation-immune, resilient and related cryptographic functions , 1994 .
[10] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Palash Sarkar,et al. Construction of Nonlinear Boolean Functions with Important Cryptographic Properties , 2000, EUROCRYPT.
[13] Kaoru Kurosawa,et al. Highly Nonlinear t-resilient Functions , 1997, J. Univers. Comput. Sci..
[14] Jung Hee Cheon,et al. Elliptic Curves and Resilient Functions , 2000, ICISC.
[15] Douglas R. Stinson,et al. Bounds for Resilient Functions and Orthogonal Arrays , 1994, CRYPTO.
[16] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[17] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[18] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[19] D. Stinson,et al. Resilient functions and large sets of orthogonal arrays , 2022 .
[20] Yuliang Zheng,et al. Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.
[21] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[22] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[23] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[24] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.