-
1
-
-
0038579951
-
Various techniques for use in connection with random digits
-
J. von Neumann, "Various techniques for use in connection with random digits," J. Von Neumann's Collected Works, vol. 5, pp. 768-770, 1963.
-
(1963)
J. Von Neumann's Collected Works
, vol.5
, pp. 768-770
-
-
von Neumann, J.1
-
2
-
-
51249178917
-
Independent unbiased coin flips from a correlated biased source: A finite markov chain
-
M. Blum, "Independent unbiased coin flips from a correlated biased source: A finite markov chain," Combinatorica, vol. 6, no. 2, pp. 97-108, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.2
, pp. 97-108
-
-
Blum, M.1
-
3
-
-
33745861377
-
True random generator in a changing environement
-
Proc. CHES'03
-
B. Barak, R. Shaltiel, and U. Tromer, "True random generator in a changing environement," in Proc. CHES'03, LNCS 2779, 2003, pp. 166-180.
-
(2003)
LNCS
, vol.2779
, pp. 166-180
-
-
Barak, B.1
Shaltiel, R.2
Tromer, U.3
-
4
-
-
38149100519
-
Bad and good ways of post-processing biased physical random numbers
-
Proc. FSE'07
-
M. Dichtl, "Bad and good ways of post-processing biased physical random numbers," in Proc. FSE'07, 2007, vol. 4593, Lecture Notes in Computer Science, pp. 127-152.
-
(2007)
Lecture Notes in Computer Science
, vol.4593
, pp. 127-152
-
-
Dichtl, M.1
-
5
-
-
50249087449
-
Post processing functions for a biased physical random number generator
-
Proc. FSE'08
-
P. Lacharme, "Post processing functions for a biased physical random number generator," in Proc. FSE'08, 2008, vol. 5086, Lecture Notes in Computer Science, pp. 334-342.
-
(2008)
Lecture Notes in Computer Science
, vol.5086
, pp. 334-342
-
-
Lacharme, P.1
-
6
-
-
70349626557
-
Bounds on fixed input/output length post-processing functions for biased physical random number generators
-
K. Suzuki and T. Iwata, "Bounds on fixed input/output length post-processing functions for biased physical random number generators," in Proc. SAC'08.
-
Proc. SAC'08
-
-
Suzuki, K.1
Iwata, T.2
-
7
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
T. Sigenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications," IEEE Trans. Inf. Theory, vol. 30, pp. 776-780, 1984.
-
(1984)
IEEE Trans. Inf. Theory
, vol.30
, pp. 776-780
-
-
Sigenthaler, T.1
-
8
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich, and R. Smolensky, "The bit extraction problem or t-resilient functions," in Proc. 26th IEEE Symp. Found. Comput. Sci., 1985, pp. 396-407.
-
(1985)
Proc. 26th IEEE Symp. Found. Comput. Sci
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Freidmann, J.4
Rudich, S.5
Smolensky, R.6
-
9
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J. M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
10
-
-
0029327136
-
An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions
-
D. Stinson and J. L. Massey, "An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions," J. Cryptol. vol. 8, pp. 167-173, 1995.
-
(1995)
J. Cryptol
, vol.8
, pp. 167-173
-
-
Stinson, D.1
Massey, J.L.2
-
11
-
-
0001689688
-
Highly nonlinear t-resilient functions
-
K.Kurosawa, T. Satoh, and K. Yamamoto, "Highly nonlinear t-resilient functions," J. Universal Comput. Sci., vol. 3, no. 6, pp. 721-729.
-
J. Universal Comput. Sci
, vol.3
, Issue.6
, pp. 721-729
-
-
Kurosawa, K.1
Satoh, T.2
Yamamoto, K.3
-
12
-
-
84958755583
-
Improved constructions of nonlinear resilient S-boxes
-
Proc. Asiacrypt'02
-
K. C. Gupta and P. Sarkar, "Improved constructions of nonlinear resilient S-boxes," in Proc. Asiacrypt'02, 2002, vol. 2501, Lecture Notes in Computer Science, pp. 466-483.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 466-483
-
-
Gupta, K.C.1
Sarkar, P.2
-
13
-
-
24944507616
-
Highly nonlinear resilient functions through disjoint codes in projective spaces
-
P. Charpin and E. Pasalic, "Highly nonlinear resilient functions through disjoint codes in projective spaces," Designs, Codes, Cryptogr., vol. 37, pp. 319-346, 2005.
-
(2005)
Designs, Codes, Cryptogr
, vol.37
, pp. 319-346
-
-
Charpin, P.1
Pasalic, E.2
-
14
-
-
79953279133
-
Vectorials boolean functions for cryptography
-
Y. Crama and P. Hammer, Eds. Cambridge, U.K, Cambridge University Press
-
C. Carlet, "Vectorials boolean functions for cryptography," in Chapter of Boolean Methods and Models, Y. Crama and P. Hammer, Eds. Cambridge, U.K.: Cambridge University Press.
-
Chapter of Boolean Methods and Models
-
-
Carlet, C.1
-
15
-
-
35048894397
-
How far can we go beyond linear cryptanalysis
-
Proc. Asiacrypt'04
-
T. Baignères, P. Junod, and S. Vaudenay, "How far can we go beyond linear cryptanalysis," in Proc. Asiacrypt'04, 2004, vol. 3329, Lecture Notes in Computer Science, pp. 432-450.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 432-450
-
-
Baignères, T.1
Junod, P.2
Vaudenay, S.3
-
16
-
-
0024001951
-
A spectral characterization of correlation immune functions
-
G. Xiao and J. L. Massey, "A spectral characterization of correlation immune functions," IEEE Trans. Inf. Theory, vol. 34, pp. 569-571, 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, pp. 569-571
-
-
Xiao, G.1
Massey, J.L.2
-
17
-
-
0000371364
-
Resilient functions and large sets of orthogonal arrays
-
D. Stinson, "Resilient functions and large sets of orthogonal arrays," Congressus Numeranitium, vol. 92, pp. 105-110, 1993.
-
(1993)
Congressus Numeranitium
, vol.92
, pp. 105-110
-
-
Stinson, D.1
-
18
-
-
85002229923
-
On correlation-immune functions
-
Proc. Crypto'91
-
P. Camion, C. Carlet, P. Charpin, and N. Sendrier, "On correlation-immune functions," in Proc. Crypto'91, 1992, vol. 576, Lecture Notes in Computer Science, pp. 424-452.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 424-452
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
19
-
-
0030365320
-
Orthogonal arrays, resilient functions, error correcting codes and linear programming bounds
-
J. Bierbrauer, K. Gopalakrishnan, and D. Stinson, "Orthogonal arrays, resilient functions, error correcting codes and linear programming bounds," SIAM J. Discr. Math., vol. 9, no. 3, pp. 424-452, 1996.
-
(1996)
SIAM J. Discr. Math
, vol.9
, Issue.3
, pp. 424-452
-
-
Bierbrauer, J.1
Gopalakrishnan, K.2
Stinson, D.3
-
21
-
-
0031238366
-
Cryptographically resilient functions
-
X. M. Zhang and Y. Zheng, "Cryptographically resilient functions," IEEE Trans. Inf. Theory, vol. 43, no. 5, pp. 1740-1747, 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.5
, pp. 1740-1747
-
-
Zhang, X.M.1
Zheng, Y.2
-
22
-
-
85025704284
-
Linear cryptanalysis method of DES cipher
-
Proc. Eurocrypt' 93
-
M. Matsui, "Linear cryptanalysis method of DES cipher," in Proc. Eurocrypt' 93, 1993, vol. 765, Lecture Notes in Computer Science, pp. 386-397.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
|