메뉴 건너뛰기




Volumn 151, Issue 1-2, 1999, Pages 57-72

Almost Perfect Nonlinear Power Functions on GF(2n): The Niho Case

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0042571298     PISSN: 08905401     EISSN: None     Source Type: Journal    
DOI: 10.1006/inco.1998.2764     Document Type: Article
Times cited : (156)

References (14)
  • 1
    • 85028761102 scopus 로고
    • On almost perfect nonlinear permutations
    • "Advances in Cryptology, EUROCRYPT '93" (T. Helleseth, Ed.), Springer-Verlag, New York/Berlin
    • Beth, T., and Ding, C. (1994), On almost perfect nonlinear permutations, in "Advances in Cryptology, EUROCRYPT '93" (T. Helleseth, Ed.), Lecture Notes in Computer Science, Vol. 765, pp. 65-76, Springer-Verlag, New York/Berlin.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 65-76
    • Beth, T.1    Ding, C.2
  • 2
    • 84948990962 scopus 로고
    • Links between differential and linear cryptanalysis
    • "Advances in Cryptology, EUROCRYPT '94" (A. De Santis, Ed.), Springer-Verlag, New York/Berlin
    • Chabaud, F., and Vaudenay, S. (1995), Links between differential and linear cryptanalysis, in "Advances in Cryptology, EUROCRYPT '94" (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 356-365, Springer-Verlag, New York/Berlin.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 356-365
    • Chabaud, F.1    Vaudenay, S.2
  • 3
    • 0030190485 scopus 로고    scopus 로고
    • Some new 3-valued crosscorrelation functions of binary m-sequences
    • Cusick, T., and Dobbertin, H. (1996), Some new 3-valued crosscorrelation functions of binary m-sequences, IEEE Trans. Inf. Theory 42, 1238-1240.
    • (1996) IEEE Trans. Inf. Theory , vol.42 , pp. 1238-1240
    • Cusick, T.1    Dobbertin, H.2
  • 7
    • 84937741493 scopus 로고
    • Maximal recursive sequences with 3-valued recursive crosscorrelation functions
    • Gold, R. (1968), Maximal recursive sequences with 3-valued recursive crosscorrelation functions, IEEE Trans. Inf. Theory 14, 154-156.
    • (1968) IEEE Trans. Inf. Theory , vol.14 , pp. 154-156
    • Gold, R.1
  • 10
    • 85026907169 scopus 로고
    • 3 in characteristic 2 and some applications to cyclic codes
    • "Proceedings AAECC-10" (G. Cohen, T. Mora, and O. Moreno, Eds.), Springer-Verlag, New York/Berlin
    • 3 in characteristic 2 and some applications to cyclic codes, in "Proceedings AAECC-10" (G. Cohen, T. Mora, and O. Moreno, Eds.), Lecture Notes in Computer Science, Vol. 673, pp. 180-194, Springer-Verlag, New York/Berlin.
    • (1993) Lecture Notes in Computer Science , vol.673 , pp. 180-194
    • Janwa, H.1    Wilson, R.M.2
  • 11
    • 0001059304 scopus 로고
    • The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes
    • Kasami, T. (1971), The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes, Information and Control 18, 369-394.
    • (1971) Information and Control , vol.18 , pp. 369-394
    • Kasami, T.1
  • 12
    • 0025432647 scopus 로고
    • The weights of the orthogonals of the extended quadratic binary Goppa codes
    • Lachaud, G., and Wolfmann, J. (1971), The weights of the orthogonals of the extended quadratic binary Goppa codes, IEEE Trans. Inf. Theory 36, 686-692.
    • (1971) IEEE Trans. Inf. Theory , vol.36 , pp. 686-692
    • Lachaud, G.1    Wolfmann, J.2
  • 14
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • "Advances in Cryptology, EUROCRYPT '93" (T. Helleseth, Ed.), Springer-Verlag, New York/Berlin
    • Nyberg, K. (1994), Differentially uniform mappings for cryptography, in "Advances in Cryptology, EUROCRYPT '93" (T. Helleseth, Ed.), Lecture Notes in Computer Science, Vol. 765, pp. 55-64, Springer-Verlag, New York/Berlin.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 55-64
    • Nyberg, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.