-
1
-
-
77954757533
-
-
A. Canteaut, C. Carlet, P. Charpin and C. Fontaine, 'Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions, LNCS 1807, Eurocrypt'2000, pp. 507-522, Springer-Verlag, 2000.
-
A. Canteaut, C. Carlet, P. Charpin and C. Fontaine, 'Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions", LNCS 1807, Eurocrypt'2000, pp. 507-522, Springer-Verlag, 2000.
-
-
-
-
2
-
-
0033882818
-
Binary m-sequences with three-valued cross correlation: A proof of Welch's conjecture
-
A. Canteaut, P. Charpin and H. Dobbertin, "Binary m-sequences with three-valued cross correlation: a proof of Welch's conjecture", IEEE Trans. Inform. Theory, vol. 46 no. 1, pp. 4-8, 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.1
, pp. 4-8
-
-
Canteaut, A.1
Charpin, P.2
Dobbertin, H.3
-
3
-
-
84937394144
-
-
C. Carlet, A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction, LNCS 2442, Crypto'2002, pp. 549-564, Springer-Verlag, 2002.
-
C. Carlet, "A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction", LNCS 2442, Crypto'2002, pp. 549-564, Springer-Verlag, 2002.
-
-
-
-
4
-
-
84948983734
-
-
H. Dobbertin, Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity, LNCS 1008, Fast Software Encryption, pp. 61-74, Springer Verlag, 1994.
-
H. Dobbertin, "Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity", LNCS 1008, Fast Software Encryption, pp. 61-74, Springer Verlag, 1994.
-
-
-
-
5
-
-
0029770924
-
Q-ary Cascaded GMW Sequences
-
Jan
-
G. Gong, "Q-ary Cascaded GMW Sequences", IEEE Trans. Inform. Theory, vol.42 no.1, pp. 263-267, Jan 1996.
-
(1996)
IEEE Trans. Inform. Theory
, vol.42
, Issue.1
, pp. 263-267
-
-
Gong, G.1
-
6
-
-
0036845302
-
Cryptographic Properties of the Welch-Gong Transformation Sequence Generators
-
Nov
-
G. Gong and A.M. Youssef, "Cryptographic Properties of the Welch-Gong Transformation Sequence Generators", IEEE Trans. Inform. Theory, vol.48 no.11, pp. 2837-2846, Nov 2002.
-
(2002)
IEEE Trans. Inform. Theory
, vol.48
, Issue.11
, pp. 2837-2846
-
-
Gong, G.1
Youssef, A.M.2
-
7
-
-
84947929289
-
The Interpolation Attack on Block Ciphers, LNCS 1267
-
T. Jacobsen, L. Knudsen, "The Interpolation Attack on Block Ciphers", LNCS 1267, Fast Software Encryption, pp.28-40, 1997.
-
(1997)
Fast Software Encryption
, pp. 28-40
-
-
Jacobsen, T.1
Knudsen, L.2
-
9
-
-
84957365641
-
-
K. Kurosawa and T. Satoh, Design of SACj PC'(Z) of Order κ Boolean Functions and Three Other Cryptographic Poperties, pp. 434-449, LNCS 1233, Eurocrypt'97, Springer-Verlag, 1997.
-
K. Kurosawa and T. Satoh, "Design of SACj PC'(Z) of Order κ Boolean Functions and Three Other Cryptographic Poperties", pp. 434-449, LNCS 1233, Eurocrypt'97, Springer-Verlag, 1997.
-
-
-
-
10
-
-
0027283207
-
Cascaded GMW sequence
-
A. Klapper, A.H. Chan and M. Goresky, "Cascaded GMW sequence", IEEE Transactions on Information Theory, vol. 39 no. 1, pp. 177-183, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.1
, pp. 177-183
-
-
Klapper, A.1
Chan, A.H.2
Goresky, M.3
-
11
-
-
63449140554
-
A New Cryptanalytic Attack for PN-Generators Filtered by a Boolean Function
-
S. Leveiller, G. Zemor, P. Guillot,J. Boutros, "A New Cryptanalytic Attack for PN-Generators Filtered by a Boolean Function", Proceedings of Selected Areas of Cryptography 2002, 2002.
-
(2002)
Proceedings of Selected Areas of Cryptography 2002
-
-
Leveiller, S.1
Zemor, G.2
Guillot, P.3
Boutros, J.4
-
12
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
M. Matsui, "Linear cryptanalysis method for DES cipher", LNCS 765, Eurocrypt'93, pp. 386-397, 1994.
-
(1994)
Eurocrypt'93
, vol.LNCS 765
, pp. 386-397
-
-
Matsui, M.1
-
14
-
-
84957625510
-
Heuristic Design of Cryptographically Strong Balanced Boolean Functions
-
Springer-Verlag
-
W. Millan, A. Clark and E. Dawson, "Heuristic Design of Cryptographically Strong Balanced Boolean Functions", LNCS 1403, Eurocrypt'98, Springer-Verlag, 1998.
-
(1998)
Eurocrypt'98
, vol.LNCS 1403
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
15
-
-
84961295363
-
-
E. Pasalic and T. Johansson, Further Results on the Relationship between Non-linearity and Resiliency of Boolean Functions, LNCS, IMA Conference on Coding and Cryptography 1999, Springer Verlag, 1999.
-
E. Pasalic and T. Johansson, "Further Results on the Relationship between Non-linearity and Resiliency of Boolean Functions", LNCS, IMA Conference on Coding and Cryptography 1999, Springer Verlag, 1999.
-
-
-
-
16
-
-
0020748803
-
-
15,16) Reed-Muller Code is at least 16276, IEEE Trans. Inform. Theory, 29 no. 3, pp. 354-356, May 1983.
-
15,16) Reed-Muller Code is at least 16276", IEEE Trans. Inform. Theory, vol. 29 no. 3, pp. 354-356, May 1983.
-
-
-
-
17
-
-
63449120542
-
-
15,16) Reed-Muller Code is at least 16276, IEEE Trans. Inform. Theory, 36 no. 2, pp. 443, Mar 1990.
-
15,16) Reed-Muller Code is at least 16276", IEEE Trans. Inform. Theory, vol. 36 no. 2, pp. 443, Mar 1990.
-
-
-
-
18
-
-
84948968383
-
-
P. Sarkar and S. Maitra, Construction of Nonlinear Boolean Functions with Important Cryptographic Properties, LNCS 1807, Eurocrypt'2000, pp. 485-506,Springer-Verlag, 2000.
-
P. Sarkar and S. Maitra, "Construction of Nonlinear Boolean Functions with Important Cryptographic Properties", LNCS 1807, Eurocrypt'2000, pp. 485-506,Springer-Verlag, 2000.
-
-
-
-
19
-
-
0036158533
-
Modifications of Patterson-Wiedemann Functions for Cryptographic Applications
-
S. Maitra and P. Sarkar, "Modifications of Patterson-Wiedemann Functions for Cryptographic Applications", IEEE Trans, on Inform. Theory, vol. 48, pp. 278-284, 2002.
-
(2002)
IEEE Trans, on Inform. Theory
, vol.48
, pp. 278-284
-
-
Maitra, S.1
Sarkar, P.2
-
20
-
-
84961389779
-
-
J. Seberry, X.M. Zhang, Y. Zheng, Nonlinearly Balanced Boolean Functions and their Propagation Characteristics, LNCS 773, Crypto'93, pp. 49-60, Springer-Verlag, 1993.
-
J. Seberry, X.M. Zhang, Y. Zheng, "Nonlinearly Balanced Boolean Functions and their Propagation Characteristics", LNCS 773, Crypto'93, pp. 49-60, Springer-Verlag, 1993.
-
-
-
-
21
-
-
84955559535
-
-
J. Seberry, X.M. Zhang and Y. Zheng, Structures of Cryptographic Functions with Strong Avalanche Characteristics, LNCS 917, Asiacrypt'94, pp. 119-132, Springer-Verlag, 1994.
-
J. Seberry, X.M. Zhang and Y. Zheng, "Structures of Cryptographic Functions with Strong Avalanche Characteristics", LNCS 917, Asiacrypt'94, pp. 119-132, Springer-Verlag, 1994.
-
-
-
-
22
-
-
0021786321
-
Decrypting a Class of Stream Ciphers using Ciphertexts only
-
T. Siegenthaler, "Decrypting a Class of Stream Ciphers using Ciphertexts only", IEEE Trans. Computer, vol. C34 no. 1, pp. 81-85, 1985.
-
(1985)
IEEE Trans. Computer
, vol.C34
, Issue.1
, pp. 81-85
-
-
Siegenthaler, T.1
-
23
-
-
84983158418
-
-
M. Zhang and A. Chan, Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers, LNCS 1880, Crypto'2000, pp. 501-514, Springer-Verlag, 2000.
-
M. Zhang and A. Chan, "Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers", LNCS 1880, Crypto'2000, pp. 501-514, Springer-Verlag, 2000.
-
-
-
-
24
-
-
63449091088
-
-
Y. Zheng and X.M. Zhang, Relationships between Bent Functions and Complementary Plateaued Functions, LNCS 1787, ICISC'99, pp. 60-75, Springer-Verlag, 1999.
-
Y. Zheng and X.M. Zhang, "Relationships between Bent Functions and Complementary Plateaued Functions", LNCS 1787, ICISC'99, pp. 60-75, Springer-Verlag, 1999.
-
-
-
-
25
-
-
84937399833
-
-
Y. Zheng and X.M. Zhang, On Relationship among Avalanche, Nonlinearity and Correlation Immunity, LNCS 1976, Asiacrypt'2000, pp. 470-482, Springer-Verlag, 2000.
-
Y. Zheng and X.M. Zhang, "On Relationship among Avalanche, Nonlinearity and Correlation Immunity", LNCS 1976, Asiacrypt'2000, pp. 470-482, Springer-Verlag, 2000.
-
-
-
|