-
1
-
-
0025530315
-
The structured design of cryptographically good S-boxes
-
Adams C.M., Tavares S.E. The structured design of cryptographically good S-boxes. J Cryptology 1990, 3:27-41.
-
(1990)
J Cryptology
, vol.3
, pp. 27-41
-
-
Adams, C.M.1
Tavares, S.E.2
-
4
-
-
84942059863
-
-
Federal Information Standard 197
-
Advanced Encryption Standard. Federal Information Standard 197, ; 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
-
-
-
5
-
-
84942039336
-
-
Third conference, attendee feedback form
-
Advanced Encryption Standard. Third conference, attendee feedback form, . http://csrc.nist.gov/encryption/aes/round2/conf3/AES3FeedbackForm-summary.pdf.
-
-
-
-
7
-
-
0023985196
-
RSA and Rabin functions: certain parts are as hard as the whole
-
Alexi W., Chor B., Goldreich O., Schnorr C. RSA and Rabin functions: certain parts are as hard as the whole. SIAM J Comput 1988, 17:194-209.
-
(1988)
SIAM J Comput
, vol.17
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
8
-
-
0000350565
-
Solving a class of stream ciphers
-
Anderson R.J. Solving a class of stream ciphers. Cryptologia 1990, 14:285-288.
-
(1990)
Cryptologia
, vol.14
, pp. 285-288
-
-
Anderson, R.J.1
-
9
-
-
0027634906
-
Faster attack on certain stream ciphers
-
Anderson R.J. Faster attack on certain stream ciphers. Electr Lett 1993, 29:1322-1323.
-
(1993)
Electr Lett
, vol.29
, pp. 1322-1323
-
-
Anderson, R.J.1
-
10
-
-
84948981360
-
Searching for the optimum correlation attack
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Anderson R. Searching for the optimum correlation attack. LNCS 1995, vol. 1008:137-143. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 137-143
-
-
Anderson, R.1
-
11
-
-
84948965108
-
On Fibonacci keystream generators
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Anderson R. On Fibonacci keystream generators. LNCS 1995, vol. 1008:346-352. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 346-352
-
-
Anderson, R.1
-
12
-
-
35048861887
-
Improving fast algebraic attacks
-
Springer, Berlin, Fast software encryption-Delhi 2004
-
Armknecht F. Improving fast algebraic attacks. LNCS 2004, vol. 3017:65-82. Springer, Berlin.
-
(2004)
LNCS
, vol.3017
, pp. 65-82
-
-
Armknecht, F.1
-
13
-
-
33746033761
-
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2006
-
Armknecht F., Carlet C., Gaborit P., Kuenzli S., Meier W., Ruatta O. Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. LNCS 2006, vol. 4004:147-164. Springer, Berlin.
-
(2006)
LNCS
, vol.4004
, pp. 147-164
-
-
Armknecht, F.1
Carlet, C.2
Gaborit, P.3
Kuenzli, S.4
Meier, W.5
Ruatta, O.6
-
15
-
-
84942016630
-
-
D.STVL.2-AES security report. ECRYPT report, January 2006
-
Augot D, Biryukov A, Canteaut A, Cid C, Courtois N, De Cannière C et al. D.STVL.2-AES security report. ECRYPT report, ; January 2006. http://www.ecrypt.eu.org/documents/D.STVL.2-1.0.pdf.
-
-
-
Augot, D.1
Biryukov, A.2
Canteaut, A.3
Cid, C.4
Courtois, N.5
De Cannière, C.6
-
16
-
-
0025399181
-
On the relevance of the strict avalanche criterion
-
Babbage S. On the relevance of the strict avalanche criterion. Electr Lett 1990, 26(7):461-462.
-
(1990)
Electr Lett
, vol.26
, Issue.7
, pp. 461-462
-
-
Babbage, S.1
-
17
-
-
0005314588
-
Cryptographic hash functions: a survey
-
Preprint 95-9. Department of Computer Science, The University of Wollongong
-
Bakhtiari S, Safavi-Naini R, Pieprzyk JP. Cryptographic hash functions: a survey, Preprint 95-9. Department of Computer Science, The University of Wollongong; 1995.
-
(1995)
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.P.3
-
18
-
-
85014258384
-
Results of an automated attack on the running key cipher
-
Bauer C., Gottlöb E.J. Results of an automated attack on the running key cipher. Cryptologia 2005, 29:248-254.
-
(2005)
Cryptologia
, vol.29
, pp. 248-254
-
-
Bauer, C.1
Gottlöb, E.J.2
-
21
-
-
84942065124
-
-
Introduction to modern cryptography (lecture notes)
-
Bellare M, Rogaway P. Introduction to modern cryptography (lecture notes), ; 2006. http://www-cse.ucsd.edu/users/mihir/cse207/classnotes.html.
-
(2006)
-
-
Bellare, M.1
Rogaway, P.2
-
22
-
-
84942028514
-
SDP designs and their automorphism groups.
-
Ph.D. thesis. University of London
-
Bending TD. Bent functions, SDP designs and their automorphism groups. Ph.D. thesis. University of London; 1993.
-
(1993)
-
-
-
23
-
-
84950117252
-
How to reduce your enemy's information
-
Springer, Berlin, Adv. in crypt.-Crypto '85
-
Bennett C.H., Brassard G., Robert J.-M. How to reduce your enemy's information. LNCS 1986, vol. 218:468-476. Springer, Berlin.
-
(1986)
LNCS
, vol.218
, pp. 468-476
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
25
-
-
84944812247
-
Factoring polynomials over finite fields
-
Berlekamp E.R. Factoring polynomials over finite fields. Bell System Tech J 1967, 1853-1859.
-
(1967)
Bell System Tech J
, pp. 1853-1859
-
-
Berlekamp, E.R.1
-
27
-
-
84968518238
-
Factoring polynomials over large finite fields
-
Berlekamp E.R. Factoring polynomials over large finite fields. Math Comput 1970, 24:713-735.
-
(1970)
Math Comput
, vol.24
, pp. 713-735
-
-
Berlekamp, E.R.1
-
28
-
-
0033098490
-
Spectral analysis of Boolean functions as a graph eigenvalue problem
-
Bernasconi A., Codenotti B. Spectral analysis of Boolean functions as a graph eigenvalue problem. IEEE Trans Comput 1999, 48:345-351.
-
(1999)
IEEE Trans Comput
, vol.48
, pp. 345-351
-
-
Bernasconi, A.1
Codenotti, B.2
-
29
-
-
0006010820
-
On Boolean functions associated to bipartite Cayley graphs.
-
Workshop on Boolean problems, Freiberg
-
Bernasconi A, Codenotti B. On Boolean functions associated to bipartite Cayley graphs. In: Workshop on Boolean problems, Freiberg; 2000, p. 167-174.
-
(2000)
, pp. 167-174
-
-
Bernasconi, A.1
Codenotti, B.2
-
30
-
-
0013362399
-
On the Fourier analysis of Boolean functions
-
preprint
-
Bernasconi A, Codenotti B, Simon J. On the Fourier analysis of Boolean functions, preprint, 1-24, ; 1996. http://www.imc.pi.cnr.it/~codenotti/ps_files/fourier.ps.
-
(1996)
, pp. 1-24
-
-
Bernasconi, A.1
Codenotti, B.2
Simon, J.3
-
31
-
-
0035440605
-
A characterization of bent functions in terms of strongly regular graphs
-
Bernasconi A., Codenotti B., VanderKam J.M. A characterization of bent functions in terms of strongly regular graphs. IEEE Trans Comput 2001, 50:984-985.
-
(2001)
IEEE Trans Comput
, vol.50
, pp. 984-985
-
-
Bernasconi, A.1
Codenotti, B.2
VanderKam, J.M.3
-
32
-
-
85014292709
-
Which eSTREAM ciphers have been broken?
-
Bernstein DJ. Which eSTREAM ciphers have been broken? manuscript; 2008.
-
(2008)
manuscript
-
-
Bernstein, D.J.1
-
33
-
-
85034420736
-
The stop-and-go generator
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '84
-
Beth T., Piper F. The stop-and-go generator. LNCS 1985, vol. 209:88-92. Springer, Berlin.
-
(1985)
LNCS
, vol.209
, pp. 88-92
-
-
Beth, T.1
Piper, F.2
-
34
-
-
0009209328
-
Untere Schranken für zwei diophantische Approximations-Funktionen
-
Betke U., Wills J.M. Untere Schranken für zwei diophantische Approximations-Funktionen. Monatsh Math 1972, 76:214-217.
-
(1972)
Monatsh Math
, vol.76
, pp. 214-217
-
-
Betke, U.1
Wills, J.M.2
-
35
-
-
0004242420
-
-
Cambridge University Press, 2nd ed.
-
Biggs N. Algebraic graph theory 1993, Cambridge University Press. 2nd ed.
-
(1993)
Algebraic graph theory
-
-
Biggs, N.1
-
36
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '99
-
Biham E., Biryukov A., Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. LNCS 1999, vol. 1592:12-23. Springer, Berlin.
-
(1999)
LNCS
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
37
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
Springer, Berlin, Adv. in crypt.-Crypto '90
-
Biham E., Shamir A. Differential cryptanalysis of DES-like cryptosystems. LNCS 1991, vol. 537:2-21. Springer, Berlin.
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
39
-
-
0041854886
-
A lower bound on the number of functions satisfying the strict avalanche criterion
-
Biss D.K. A lower bound on the number of functions satisfying the strict avalanche criterion. Discrete Math 1998, 185:29-39.
-
(1998)
Discrete Math
, vol.185
, pp. 29-39
-
-
Biss, D.K.1
-
41
-
-
0033185033
-
The linear complexity of the self-shrinking generator
-
Blackburn S.R. The linear complexity of the self-shrinking generator. IEEE Trans Inform Theory 1999, 45:2073-2077.
-
(1999)
IEEE Trans Inform Theory
, vol.45
, pp. 2073-2077
-
-
Blackburn, S.R.1
-
42
-
-
84947928618
-
Fish: a fast software stream cipher
-
Springer, Berlin, Fast software encryption-Cambridge 1993
-
Blöcher U., Dichtl M. Fish: a fast software stream cipher. LNCS 1994, vol. 809:41-44. Springer, Berlin.
-
(1994)
LNCS
, vol.809
, pp. 41-44
-
-
Blöcher, U.1
Dichtl, M.2
-
43
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
Blum L., Blum M., Shub M. A simple unpredictable pseudo-random number generator. SIAM J Comput 1986, 15:364-383.
-
(1986)
SIAM J Comput
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
44
-
-
0020248370
-
How to generate cryptographically strong sequences of pseudo-random bits.
-
23rd IEEE symposium on foundations of computer science
-
Blum M, Micali S. How to generate cryptographically strong sequences of pseudo-random bits. In: Proc. 23rd IEEE symposium on foundations of computer science; 1982, p. 112-17.
-
(1982)
Proc.
, pp. 112-117
-
-
Blum, M.1
Micali, S.2
-
45
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum M., Micali S. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J Comput 1984, 13:850-864.
-
(1984)
SIAM J Comput
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
47
-
-
33646836818
-
On the algebraic immunity of symmetric Boolean functions
-
Springer, Berlin, Indocrypt 2005
-
Braeken A., Preneel B. On the algebraic immunity of symmetric Boolean functions. LNCS 2005, vol. 3797:35-48. Springer, Berlin.
-
(2005)
LNCS
, vol.3797
, pp. 35-48
-
-
Braeken, A.1
Preneel, B.2
-
48
-
-
0346796759
-
Cryptography, statistics and pseudo-randomness (part I)
-
Brands S., Gill R. Cryptography, statistics and pseudo-randomness (part I). Prob Math Stat 1995, 15:101-114.
-
(1995)
Prob Math Stat
, vol.15
, pp. 101-114
-
-
Brands, S.1
Gill, R.2
-
49
-
-
84875634542
-
-
Interim report, July 28
-
Brickell EF, Denning DE, Kent ST, Mahler DP, Tuchman W. SKIPJACK review. Interim report, July 28; 1993. 8 p.
-
(1993)
SKIPJACK review.
, pp. 8
-
-
Brickell, E.F.1
Denning, D.E.2
Kent, S.T.3
Mahler, D.P.4
Tuchman, W.5
-
51
-
-
84942060594
-
Introduction to Groebner bases, logic of computation (Marktoberdorf, 1995)
-
Springer, Berlin
-
Buchberger B. Introduction to Groebner bases, logic of computation (Marktoberdorf, 1995). NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci. 1997, vol. 157:35-66. Springer, Berlin.
-
(1997)
NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci.
, vol.157
, pp. 35-66
-
-
Buchberger, B.1
-
52
-
-
34247391120
-
Random strongly regular graphs?
-
Elsevier, Amsterdam, J. Nesetril, M. Noy, O. Serra (Eds.)
-
Cameron P. Random strongly regular graphs?. Electronic Notes in Discrete Mathematics 2001, vol. 10. Elsevier, Amsterdam. J. Nesetril, M. Noy, O. Serra (Eds.).
-
(2001)
Electronic Notes in Discrete Mathematics
, vol.10
-
-
Cameron, P.1
-
53
-
-
85002229923
-
On correlation-immune functions
-
Springer, Berlin, Adv. in crypt.-Crypto '91
-
Camion P., Carlet C., Charpin P., Sendrier N. On correlation-immune functions. LNCS 1992, vol. 576:86-100. Springer, Berlin.
-
(1992)
LNCS
, vol.576
, pp. 86-100
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
54
-
-
84962952893
-
DES is not a group
-
Springer, Berlin, Adv. in crypt.-Crypto '92
-
Campbell K.W., Wiener M.J. DES is not a group. LNCS 1992, vol. 740:512-520. Springer, Berlin.
-
(1992)
LNCS
, vol.740
, pp. 512-520
-
-
Campbell, K.W.1
Wiener, M.J.2
-
55
-
-
27244440344
-
A very compact S-box for AES
-
Springer, Berlin, Workshop on cryptographic hardware and embedded systems (CHES2005)
-
Canright D. A very compact S-box for AES. LNCS 2005, vol. 3659:441-455. Springer, Berlin.
-
(2005)
LNCS
, vol.3659
, pp. 441-455
-
-
Canright, D.1
-
57
-
-
33746667828
-
Open problems related to algebraic attacks on stream ciphers
-
Springer, Berlin, Coding and cryptography-WCC 2005
-
Canteaut A. Open problems related to algebraic attacks on stream ciphers. LNCS 2006, vol. 3969:120-134. Springer, Berlin.
-
(2006)
LNCS
, vol.3969
, pp. 120-134
-
-
Canteaut, A.1
-
58
-
-
77954757533
-
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
-
Canteaut A., Carlet C., Charpin P., Fontaine C. Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions. LNCS 2000, vol. 1807:507-522. Springer, Berlin.
-
(2000)
LNCS
, vol.1807
, pp. 507-522
-
-
Canteaut, A.1
Carlet, C.2
Charpin, P.3
Fontaine, C.4
-
59
-
-
1942480518
-
Normal and nonnormal bent functions.
-
Coding and cryptography-WCC 2003, INRIA.
-
Canteaut A, Daum H, Dobbertin H, Leander G. Normal and nonnormal bent functions. In: Coding and cryptography-WCC 2003, INRIA. p. 91-100.
-
-
-
Canteaut, A.1
Daum, H.2
Dobbertin, H.3
Leander, G.4
-
60
-
-
29244434843
-
Finding nonnormal bent functions
-
Canteaut A., Daum H., Dobbertin H., Leander G. Finding nonnormal bent functions. Discrete Appl Math 2006, 154:202-218.
-
(2006)
Discrete Appl Math
, vol.154
, pp. 202-218
-
-
Canteaut, A.1
Daum, H.2
Dobbertin, H.3
Leander, G.4
-
61
-
-
84948963512
-
Improved fast correlation attacks using parity check equations of weight 4 and 5
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
-
Canteaut A., Trabbia M. Improved fast correlation attacks using parity check equations of weight 4 and 5. LNCS 2000, vol. 1807:573-588. Springer, Berlin.
-
(2000)
LNCS
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
62
-
-
0041853219
-
Bounds on eigenvalues and chromatic numbers
-
Cao D. Bounds on eigenvalues and chromatic numbers. Linear Alg Appl 1998, 270:1-13.
-
(1998)
Linear Alg Appl
, vol.270
, pp. 1-13
-
-
Cao, D.1
-
63
-
-
85031937171
-
A transformation on Boolean functions, its consequences on some problems related to Reed-Muller codes
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '90
-
Carlet C. A transformation on Boolean functions, its consequences on some problems related to Reed-Muller codes. LNCS 1991, vol. 473:42-50. Springer, Berlin.
-
(1991)
LNCS
, vol.473
, pp. 42-50
-
-
Carlet, C.1
-
64
-
-
0002251636
-
Partially-bent functions
-
Carlet C. Partially-bent functions. Des Codes Cryptogr 1993, 3:135-145.
-
(1993)
Des Codes Cryptogr
, vol.3
, pp. 135-145
-
-
Carlet, C.1
-
65
-
-
84865472304
-
Two new classes of bent functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Carlet C. Two new classes of bent functions. LNCS 1994, vol. 765:77-101. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 77-101
-
-
Carlet, C.1
-
66
-
-
0029375797
-
Generalized partial spreads
-
Carlet C. Generalized partial spreads. IEEE Trans Inform Theory 1995, 41:1482-1487.
-
(1995)
IEEE Trans Inform Theory
, vol.41
, pp. 1482-1487
-
-
Carlet, C.1
-
67
-
-
0039822239
-
A construction of bent functions
-
Carlet C. A construction of bent functions. Finite Fields Appl 1996, 233:47-58.
-
(1996)
Finite Fields Appl
, vol.233
, pp. 47-58
-
-
Carlet, C.1
-
68
-
-
35048886223
-
Recent results on binary bent functions
-
Carlet C. Recent results on binary bent functions. J Combin Inform System Sci 2000, 25:133-149.
-
(2000)
J Combin Inform System Sci
, vol.25
, pp. 133-149
-
-
Carlet, C.1
-
69
-
-
84942025295
-
-
Private communication
-
Carlet C. Private communication; 1997.
-
(1997)
-
-
Carlet, C.1
-
70
-
-
84957358188
-
More correlation-immune and resilient functions over Galois fields and Galois rings
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '97
-
Carlet C. More correlation-immune and resilient functions over Galois fields and Galois rings. LNCS 1997, vol. 1233:422-433. Springer, Berlin.
-
(1997)
LNCS
, vol.1233
, pp. 422-433
-
-
Carlet, C.1
-
71
-
-
0032041678
-
Sur le critère de propagation de degré l et d'ordre k
-
Carlet C. Sur le critère de propagation de degré l et d'ordre k. C R Acad Sci Paris Sr I Math 1998, 326:891-896.
-
(1998)
C R Acad Sci Paris Sr I Math
, vol.326
, pp. 891-896
-
-
Carlet, C.1
-
72
-
-
84957632021
-
On the propagation criterion of degree l and order k
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '98
-
Carlet C. On the propagation criterion of degree l and order k. LNCS 1998, vol. 1403:462-474. Springer, Berlin.
-
(1998)
LNCS
, vol.1403
, pp. 462-474
-
-
Carlet, C.1
-
73
-
-
0003089234
-
On cryptographic propagation criteria for Boolean functions
-
Carlet C. On cryptographic propagation criteria for Boolean functions. Inform Comput 1999, 151:32-56.
-
(1999)
Inform Comput
, vol.151
, pp. 32-56
-
-
Carlet, C.1
-
74
-
-
0034370089
-
On the divisibility properties and nonlinearity of resilient functions
-
Carlet C. On the divisibility properties and nonlinearity of resilient functions. C R Acad Sci Paris Sr I Math 2000, 331:917-922.
-
(2000)
C R Acad Sci Paris Sr I Math
, vol.331
, pp. 917-922
-
-
Carlet, C.1
-
75
-
-
84937394144
-
A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction
-
Springer, Berlin, Adv. in crypt.-Crypto 2002
-
Carlet C. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. LNCS 2002, vol. 2442:549-564. Springer, Berlin.
-
(2002)
LNCS
, vol.2442
, pp. 549-564
-
-
Carlet, C.1
-
76
-
-
0009963317
-
On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions
-
Springer, London, Sequences and their applications (Bergen, 2001)
-
Carlet C. On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. Discrete math. theor. comput. sci. 2002, 131-144. Springer, London.
-
(2002)
Discrete math. theor. comput. sci.
, pp. 131-144
-
-
Carlet, C.1
-
77
-
-
4544224587
-
On the complexity of cryptographic Boolean functions
-
Springer, Berlin
-
Carlet C. On the complexity of cryptographic Boolean functions. Finite fields with applications to coding theory, cryptography and related areas, Oaxaca, 2001 2002, 53-69. Springer, Berlin.
-
(2002)
Finite fields with applications to coding theory, cryptography and related areas, Oaxaca, 2001
, pp. 53-69
-
-
Carlet, C.1
-
78
-
-
4544343250
-
On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions
-
Carlet C. On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions. IEEE Trans Inform Theory 2004, 50:2178-2185.
-
(2004)
IEEE Trans Inform Theory
, vol.50
, pp. 2178-2185
-
-
Carlet, C.1
-
79
-
-
8144223025
-
On the secondary constructions of resilient and bent functions
-
Birkhäuser, Basel, Coding, cryptography and combinatorics
-
Carlet C. On the secondary constructions of resilient and bent functions. Progr. Comput. Sci. Appl. Logic 2004, vol. 2:3-28. Birkhäuser, Basel.
-
(2004)
Progr. Comput. Sci. Appl. Logic
, vol.2
, pp. 3-28
-
-
Carlet, C.1
-
80
-
-
1942539819
-
On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
-
Carlet C. On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions. J Complexity 2004, 20:182-204.
-
(2004)
J Complexity
, vol.20
, pp. 182-204
-
-
Carlet, C.1
-
81
-
-
33744736426
-
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
-
Carlet C. Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions, . http://eprint.iacr.org/2004/276.
-
-
-
Carlet, C.1
-
82
-
-
84942016793
-
-
Boolean functions for cryptography and error correcting codes.
-
Carlet C. Boolean functions for cryptography and error correcting codes. Available at . http://www.rocg.inria.fr/secret/Claude.Carlet/pubs.html.
-
-
-
Carlet, C.1
-
83
-
-
0000805465
-
Codes bent functions and permutations suitable for DES-like cryptosystems
-
Carlet C., Charpin P., Zinoviev V. Codes bent functions and permutations suitable for DES-like cryptosystems. Des Codes Cryptogr 1998, 15:125-156.
-
(1998)
Des Codes Cryptogr
, vol.15
, pp. 125-156
-
-
Carlet, C.1
Charpin, P.2
Zinoviev, V.3
-
84
-
-
33746350122
-
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
-
Carlet C., Dalai D.K., Gupta K.C., Maitra S. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans Inform Theory 2006, 52:3105-3121.
-
(2006)
IEEE Trans Inform Theory
, vol.52
, pp. 3105-3121
-
-
Carlet, C.1
Dalai, D.K.2
Gupta, K.C.3
Maitra, S.4
-
85
-
-
1942507994
-
Highly nonlinear mappings
-
Carlet C., Ding C. Highly nonlinear mappings. J Complexity 2004, 20:205-244.
-
(2004)
J Complexity
, vol.20
, pp. 205-244
-
-
Carlet, C.1
Ding, C.2
-
87
-
-
1942544407
-
On generalized bent and q-ary perfect nonlinear functions
-
Springer, Berlin
-
Carlet C., Dubuc S. On generalized bent and q-ary perfect nonlinear functions. Finite fields and applications, Augsburg, 1999 2001, 81-94. Springer, Berlin.
-
(2001)
Finite fields and applications, Augsburg, 1999
, pp. 81-94
-
-
Carlet, C.1
Dubuc, S.2
-
88
-
-
84859757328
-
An upper bound on the number of m-resilient Boolean functions
-
Springer, Berlin, Adv. in crypt.-Asiacrypt 2002
-
Carlet C., Gouget A. An upper bound on the number of m-resilient Boolean functions. LNCS 2002, vol. 2501:484-496. Springer, Berlin.
-
(2002)
LNCS
, vol.2501
, pp. 484-496
-
-
Carlet, C.1
Gouget, A.2
-
89
-
-
0001371135
-
A characterization of binary bent functions
-
Carlet C., Guillot P. A characterization of binary bent functions. J Combin Theory A 1996, 76:328-335.
-
(1996)
J Combin Theory A
, vol.76
, pp. 328-335
-
-
Carlet, C.1
Guillot, P.2
-
90
-
-
0007109121
-
An alternate characterization of the bentness of binary functions with uniqueness
-
Carlet C., Guillot P. An alternate characterization of the bentness of binary functions with uniqueness. Des Codes Cryptogr 1998, 14:133-140.
-
(1998)
Des Codes Cryptogr
, vol.14
, pp. 133-140
-
-
Carlet, C.1
Guillot, P.2
-
91
-
-
13844267292
-
Bent, resilient functions and the numerical normal form
-
Amer. Math. Soc., Providence, RI, Codes and association schemes (Piscataway, NJ, 1999)
-
Carlet C, Guillot P Bent, resilient functions and the numerical normal form. DIMACS ser. discrete math. theoret. comput. sci. 2001, vol. 56:87-96. Amer. Math. Soc., Providence, RI.
-
(2001)
DIMACS ser. discrete math. theoret. comput. sci.
, vol.56
, pp. 87-96
-
-
Carlet, C.1
Guillot, P.2
-
92
-
-
1942480547
-
Upper bounds on the number of resilient functions and of bent functions.
-
23rd symposium on inform. theory in the Benelux
-
Carlet C, Klapper A. Upper bounds on the number of resilient functions and of bent functions. In: Proc. 23rd symposium on inform. theory in the Benelux; 2002. p. 307-14.
-
(2002)
Proc.
, pp. 307-314
-
-
Carlet, C.1
Klapper, A.2
-
93
-
-
24944514161
-
On a new notion of nonlinearity relevant to multioutput pseudo-random generators
-
Springer, Berlin, Selected areas crypt. 2003
-
Carlet C., Prouff E. On a new notion of nonlinearity relevant to multioutput pseudo-random generators. LNCS 2004, vol. 3006:291-305. Springer, Berlin.
-
(2004)
LNCS
, vol.3006
, pp. 291-305
-
-
Carlet, C.1
Prouff, E.2
-
94
-
-
35048896411
-
Vectorial functions and covering sequences
-
Springer, Berlin, Finite fields and applications
-
Carlet C., Prouff E. Vectorial functions and covering sequences. LNCS 2004, vol. 2948:215-248. Springer, Berlin.
-
(2004)
LNCS
, vol.2948
, pp. 215-248
-
-
Carlet, C.1
Prouff, E.2
-
95
-
-
0036160819
-
Spectral domain analysis of correlation immune and resilient Boolean functions
-
Carlet C., Sarkar P. Spectral domain analysis of correlation immune and resilient Boolean functions. Finite Fields Appl 2002, 8:120-130.
-
(2002)
Finite Fields Appl
, vol.8
, pp. 120-130
-
-
Carlet, C.1
Sarkar, P.2
-
96
-
-
31244432494
-
Covering sequences of Boolean functions and their cryptographic significance
-
Carlet C., Tarannikov Y. Covering sequences of Boolean functions and their cryptographic significance. Des Codes Cryptogr 2002, 25:263-279.
-
(2002)
Des Codes Cryptogr
, vol.25
, pp. 263-279
-
-
Carlet, C.1
Tarannikov, Y.2
-
97
-
-
84948990962
-
Links between differential and linear cryptanalysis
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '94
-
Chabaud F., Vaudenay S. Links between differential and linear cryptanalysis. LNCS 1995, vol. 950:363-374. Springer, Berlin.
-
(1995)
LNCS
, vol.950
, pp. 363-374
-
-
Chabaud, F.1
Vaudenay, S.2
-
98
-
-
0023862702
-
Clock-controlled shift registers in binary sequence generators
-
Chambers W.G. Clock-controlled shift registers in binary sequence generators. IEE Proc E 1988, 135:17-24.
-
(1988)
IEE Proc E
, vol.135
, pp. 17-24
-
-
Chambers, W.G.1
-
99
-
-
33747612098
-
Lock-in effect in cascades of clock controlled shift-registers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '88
-
Chambers W.G., Gollmann D. Lock-in effect in cascades of clock controlled shift-registers. LNCS 1988, vol. 330:331-343. Springer, Berlin.
-
(1988)
LNCS
, vol.330
, pp. 331-343
-
-
Chambers, W.G.1
Gollmann, D.2
-
100
-
-
0021519766
-
Linear equivalence of certain BRM shift-register sequences
-
Chambers W.G., Jennings S.M. Linear equivalence of certain BRM shift-register sequences. Electr Lett 1984, 20:1018-1019.
-
(1984)
Electr Lett
, vol.20
, pp. 1018-1019
-
-
Chambers, W.G.1
Jennings, S.M.2
-
101
-
-
84955590872
-
Linear nonequivalence versus nonlinearity
-
Springer, Berlin, Adv. in crypt.-Auscrypt '92
-
Charnes C., Pieprzyk J.P. Linear nonequivalence versus nonlinearity. LNCS 1993, vol. 718:156-164. Springer, Berlin.
-
(1993)
LNCS
, vol.718
, pp. 156-164
-
-
Charnes, C.1
Pieprzyk, J.P.2
-
102
-
-
84974663228
-
On homogeneous bent functions
-
Springer, Berlin, Proceedings of applied algebra, algebraic algorithms and error correcting codes (AAECC-14)
-
Charnes C., Rötteler M., Beth T. On homogeneous bent functions. LNCS 2001, vol. 2227:249-259. Springer, Berlin.
-
(2001)
LNCS
, vol.2227
, pp. 249-259
-
-
Charnes, C.1
Rötteler, M.2
Beth, T.3
-
103
-
-
84884039585
-
Homogeneous bent functions, invariants and designs
-
Charnes C., Rötteler M., Beth T. Homogeneous bent functions, invariants and designs. Des Codes Cryptogr 2002, 26:139-154.
-
(2002)
Des Codes Cryptogr
, vol.26
, pp. 139-154
-
-
Charnes, C.1
Rötteler, M.2
Beth, T.3
-
104
-
-
1942507984
-
Normal Boolean functions
-
Charpin P. Normal Boolean functions. J Complexity 2004, 20:245-265.
-
(2004)
J Complexity
, vol.20
, pp. 245-265
-
-
Charpin, P.1
-
105
-
-
35248894976
-
On propagation characteristics of resilient functions
-
Springer, Berlin, Selected areas crypt. 2002
-
Charpin P., Pasalic E. On propagation characteristics of resilient functions. LNCS 2003, vol. 2595:175-195. Springer, Berlin.
-
(2003)
LNCS
, vol.2595
, pp. 175-195
-
-
Charpin, P.1
Pasalic, E.2
-
106
-
-
84955619208
-
Semi-bent functions
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '94
-
Chee S., Lee S., Kim K. Semi-bent functions. LNCS 1995, vol. 917:107-118. Springer, Berlin.
-
(1995)
LNCS
, vol.917
, pp. 107-118
-
-
Chee, S.1
Lee, S.2
Kim, K.3
-
107
-
-
0031332525
-
Correlation immune functions with controllable nonlinearity
-
Chee S., Lee S., Kim K., Kim D. Correlation immune functions with controllable nonlinearity. ETRI J 1997, 19:389-401.
-
(1997)
ETRI J
, vol.19
, pp. 389-401
-
-
Chee, S.1
Lee, S.2
Kim, K.3
Kim, D.4
-
108
-
-
84955576233
-
On the correlation immune functions and their nonlinearity
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '96
-
Chee S., Lee S., Lee D., Sung S.H. On the correlation immune functions and their nonlinearity. LNCS 1996, vol. 1123:232-243. Springer, Berlin.
-
(1996)
LNCS
, vol.1123
, pp. 232-243
-
-
Chee, S.1
Lee, S.2
Lee, D.3
Sung, S.H.4
-
109
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Springer, Berlin, Fast software encryption-New York 2000
-
Chepyzhov V., Johansson T., Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. LNCS 2001, vol. 1978:181-195. Springer, Berlin.
-
(2001)
LNCS
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
110
-
-
85030473541
-
On a fast correlation attack on certain stream ciphers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '91
-
Chepyzhov V., Smeets B. On a fast correlation attack on certain stream ciphers. LNCS 1992, vol. 547:176-185. Springer, Berlin.
-
(1992)
LNCS
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
111
-
-
0022198802
-
The bit extraction problem or t-resilient functions.
-
26th IEEE symposium on foundations of computer science
-
Chor B, Goldreich O, Håstad J, Friedman J, Rudich S, Smolensky R. The bit extraction problem or t-resilient functions. In: Proc. 26th IEEE symposium on foundations of computer science; 1985, p. 396-407.
-
(1985)
Proc.
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Håstad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
112
-
-
0002241889
-
On recursions connected with symmetric groups I
-
Chowla S., Herstein I.N., Moore K. On recursions connected with symmetric groups I. Canadian J Math 1951, 3:328-334.
-
(1951)
Canadian J Math
, vol.3
, pp. 328-334
-
-
Chowla, S.1
Herstein, I.N.2
Moore, K.3
-
113
-
-
33646852443
-
An algebraic framework for cipher embeddings
-
Springer, Berlin, Proc. of 10th IMA international conference on coding and cryptography
-
Cid C., Murphy S., Robshaw M. An algebraic framework for cipher embeddings. LNCS 2005, vol. 3796:278-289. Springer, Berlin.
-
(2005)
LNCS
, vol.3796
, pp. 278-289
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.3
-
115
-
-
84958950262
-
A comparison of fast correlation attacks
-
Springer, Berlin, Fast software encryption-Cambridge 1996
-
Clark A., Golić J.D., Dawson E. A comparison of fast correlation attacks. LNCS 1997, vol. 1039:145-157. Springer, Berlin.
-
(1997)
LNCS
, vol.1039
, pp. 145-157
-
-
Clark, A.1
Golić, J.D.2
Dawson, E.3
-
116
-
-
4344630715
-
Almost Boolean functions: the design of Boolean functions by spectral inversion
-
Clark J.A., Jacob J.L., Maitra S., Stănică P. Almost Boolean functions: the design of Boolean functions by spectral inversion. Comput Intelligence 2004, 20:450-462.
-
(2004)
Comput Intelligence
, vol.20
, pp. 450-462
-
-
Clark, J.A.1
Jacob, J.L.2
Maitra, S.3
Stănică, P.4
-
117
-
-
0003938168
-
-
CRC Press, Boca Raton, C.J. Colbourn, J. Dinitz (Eds.)
-
CRC handbook of combinatorial design 1996, CRC Press, Boca Raton. C.J. Colbourn, J. Dinitz (Eds.).
-
(1996)
CRC handbook of combinatorial design
-
-
-
118
-
-
0028428941
-
The Data Encryption Standard (DES) and its strength against attacks
-
Coppersmith D. The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Develop 1994, 38:243-250.
-
(1994)
IBM J Res Develop
, vol.38
, pp. 243-250
-
-
Coppersmith, D.1
-
119
-
-
84974670663
-
The shrinking generator
-
Springer, Berlin, Adv. in crypt.-Crypto '93
-
Coppersmith D., Krawczyk H., Mansour Y. The shrinking generator. LNCS 1994, vol. 773:22-39. Springer, Berlin.
-
(1994)
LNCS
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
120
-
-
85023205150
-
Matrix multiplication via arithmetic progressions
-
Coppersmith D., Winograd S. Matrix multiplication via arithmetic progressions. J Symbolic Comput 1990, 9:251-280.
-
(1990)
J Symbolic Comput
, vol.9
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
121
-
-
35048865807
-
Higher order correlation attacks
-
XL algorithm and cryptanalysis of Toyocrypt
-
Courtois N. Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt, . http://eprint.iacr.org/2002/087.
-
-
-
Courtois, N.1
-
122
-
-
65149087270
-
Algebraic cryptanalysis of the Data Encryption Standard
-
Courtois N, Bard G. Algebraic cryptanalysis of the Data Encryption Standard, . http://eprint.iacr.org/2006/402.
-
-
-
Courtois, N.1
Bard, G.2
-
123
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2003
-
Courtois N., Meier W. Algebraic attacks on stream ciphers with linear feedback. LNCS 2003, vol. 2656:345-359. Springer, Berlin.
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
124
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Springer, Berlin, Adv. in crypt.-Asiacrypt 2002
-
Courtois N., Pieprzyk J.P. Cryptanalysis of block ciphers with overdefined systems of equations. LNCS 2002, vol. 2501:267-287. Springer, Berlin.
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.P.2
-
125
-
-
27944467381
-
Algebraic attacks on stream ciphers with linear feedback
-
(extended version of [123])
-
Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback (extended version of [123]), . http://www.cryptosystem.net/stream/.
-
-
-
Courtois, N.1
Meier, W.2
-
126
-
-
84858666096
-
Boolean functions satisfying a higher order strict avalanche criterion
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Cusick T.W. Boolean functions satisfying a higher order strict avalanche criterion. LNCS 1994, vol. 765:102-117. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 102-117
-
-
Cusick, T.W.1
-
127
-
-
0012978565
-
Bounds on the number of functions satisfying the strict avalanche criterion
-
Cusick T.W. Bounds on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1996, 57:261-263.
-
(1996)
Inform Process Lett
, vol.57
, pp. 261-263
-
-
Cusick, T.W.1
-
128
-
-
1942544421
-
On constructing balanced correlation immune functions
-
Springer, London, Sequences and their applications (Singapore, 1998)
-
Cusick T.W. On constructing balanced correlation immune functions. Springer ser. discrete math. theor. comput. sci. 1999, 184-190. Springer, London.
-
(1999)
Springer ser. discrete math. theor. comput. sci.
, pp. 184-190
-
-
Cusick, T.W.1
-
130
-
-
0030288222
-
Bounds on the number of functions satisfying the strict avalanche criterion
-
Cusick T.W., Stănică P. Bounds on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1996, 60:215-219.
-
(1996)
Inform Process Lett
, vol.60
, pp. 215-219
-
-
Cusick, T.W.1
Stănică, P.2
-
131
-
-
0037032959
-
Fast evaluation, weights and nonlinearity of rotation-symmetric functions
-
Cusick T.W., Stănică P. Fast evaluation, weights and nonlinearity of rotation-symmetric functions. Discrete Math 2002, 258:289-301.
-
(2002)
Discrete Math
, vol.258
, pp. 289-301
-
-
Cusick, T.W.1
Stănică, P.2
-
133
-
-
33745451168
-
The Design of Rijndael. AES-the Advanced Encryption Standard
-
Springer, Berlin
-
Daemen J., Rijmen V. The Design of Rijndael. AES-the Advanced Encryption Standard. Information security and cryptography 2002, Springer, Berlin.
-
(2002)
Information security and cryptography
-
-
Daemen, J.1
Rijmen, V.2
-
134
-
-
33646038313
-
Basic theory in construction of Boolean functions with maximum possible annihilator immunity
-
Dalai D.K., Maitra S., Sarkar P. Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des Codes Cryptogr 2006, 40:41-58.
-
(2006)
Des Codes Cryptogr
, vol.40
, pp. 41-58
-
-
Dalai, D.K.1
Maitra, S.2
Sarkar, P.3
-
135
-
-
77649261653
-
Reducing the number of homogeneous linear equations in finding annihilators
-
Dalai DK, Maitra S. Reducing the number of homogeneous linear equations in finding annihilators, . http://eprint.iacr.org/2006/032.
-
-
-
Dalai, D.K.1
Maitra, S.2
-
136
-
-
33749971600
-
National Bureau of Standards
-
Federal Information Standard 46, USA
-
Data Encryption Standard. National Bureau of Standards, Federal Information Standard 46, USA; 1977.
-
(1977)
-
-
-
137
-
-
1942544390
-
An algorithm for checking normality of Boolean functions.
-
Coding and cryptography-WCC 2003, INRIA
-
Daum M, Dobbertin H, Leander G. An algorithm for checking normality of Boolean functions. Coding and cryptography-WCC 2003, INRIA, p. 133-42.
-
-
-
Daum, M.1
Dobbertin, H.2
Leander, G.3
-
139
-
-
84956864850
-
Propagation characteristics of the DES
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '84
-
Davio M., Desmedt Y., Quisquater J.-J. Propagation characteristics of the DES. LNCS 1985, vol. 209:62-73. Springer, Berlin.
-
(1985)
LNCS
, vol.209
, pp. 62-73
-
-
Davio, M.1
Desmedt, Y.2
Quisquater, J.-J.3
-
141
-
-
33847538049
-
Cryptanalysis of summation generator
-
Springer, Berlin, Adv. in crypt.-Auscrypt '92
-
Dawson E. Cryptanalysis of summation generator. LNCS 1993, vol. 718:209-215. Springer, Berlin.
-
(1993)
LNCS
, vol.718
, pp. 209-215
-
-
Dawson, E.1
-
142
-
-
0011043342
-
Divide and conquer attacks on certain classes of stream ciphers
-
Dawson E., Clark A. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia 1994, 18:25-40.
-
(1994)
Cryptologia
, vol.18
, pp. 25-40
-
-
Dawson, E.1
Clark, A.2
-
143
-
-
67349176399
-
Automated cryptanalysis of XOR plaintext strings
-
Dawson E., Nielsen L. Automated cryptanalysis of XOR plaintext strings. Cryptologia 1996, 20:165-181.
-
(1996)
Cryptologia
, vol.20
, pp. 165-181
-
-
Dawson, E.1
Nielsen, L.2
-
144
-
-
0000262264
-
A combinatorial problem
-
or Indagationes Math 1946;8:461-7
-
de Bruijn N.G. A combinatorial problem. Nederl Akad Wetensch Proc 1946, 49:758-764. or Indagationes Math 1946;8:461-7.
-
(1946)
Nederl Akad Wetensch Proc
, vol.49
, pp. 758-764
-
-
de Bruijn, N.G.1
-
145
-
-
31344454613
-
An introduction to block cipher cryptanalysis
-
de Cannière C., Biryukov A., Preneel B. An introduction to block cipher cryptanalysis. Proc IEEE 2006, 94:346-356.
-
(2006)
Proc IEEE
, vol.94
, pp. 346-356
-
-
de Cannière, C.1
Biryukov, A.2
Preneel, B.3
-
146
-
-
56349117175
-
Trivium specifications.
-
de Cannière C, Preneel B. Trivium specifications. http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf.
-
-
-
de Cannière, C.1
Preneel, B.2
-
147
-
-
0015735548
-
Four fundamental parameters of a code and their combinatorial significance
-
Delsarte P. Four fundamental parameters of a code and their combinatorial significance. Inform Control 1973, 23:407-438.
-
(1973)
Inform Control
, vol.23
, pp. 407-438
-
-
Delsarte, P.1
-
148
-
-
29444436294
-
An asymptotic formula for the number of correlation immune of order k Boolean functions
-
[translation of Russian article in Diskretnaya Matematika 3 (1991), 25-46]
-
Denisov O.V. An asymptotic formula for the number of correlation immune of order k Boolean functions. Discrete Math Appl 1992, 2:407-426. [translation of Russian article in Diskretnaya Matematika 3 (1991), 25-46].
-
(1992)
Discrete Math Appl
, vol.2
, pp. 407-426
-
-
Denisov, O.V.1
-
149
-
-
29444447107
-
A local limit theorem for the distribution of a part of the spectrum of a random binary function
-
[translation of Russian article in Diskretnaya Matematika 12 (2000), 82-95]
-
Denisov O.V. A local limit theorem for the distribution of a part of the spectrum of a random binary function. Discrete Math Appl 2000, 12:87-101. [translation of Russian article in Diskretnaya Matematika 12 (2000), 82-95].
-
(2000)
Discrete Math Appl
, vol.12
, pp. 87-101
-
-
Denisov, O.V.1
-
152
-
-
0003797192
-
Elementary Hadamard difference sets.
-
Ph.D. thesis. University of Maryland
-
Dillon JF. Elementary Hadamard difference sets. Ph.D. thesis. University of Maryland; 1974.
-
(1974)
-
-
Dillon, J.F.1
-
154
-
-
84942036058
-
-
Private communication
-
Dillon JF. Private communication; 1997.
-
(1997)
-
-
Dillon, J.F.1
-
155
-
-
3242719285
-
New cyclic difference sets with Singer parameters
-
Dillon J.F., Dobbertin H. New cyclic difference sets with Singer parameters. Finite Fields Appl 2004, 10:342-389.
-
(2004)
Finite Fields Appl
, vol.10
, pp. 342-389
-
-
Dillon, J.F.1
Dobbertin, H.2
-
156
-
-
0003323628
-
The stability theory of stream ciphers
-
Springer, Berlin
-
Ding C., Xiao G., Shan W. The stability theory of stream ciphers. LNCS 1991, vol. 561. Springer, Berlin.
-
(1991)
LNCS
, vol.561
-
-
Ding, C.1
Xiao, G.2
Shan, W.3
-
157
-
-
84948983734
-
Construction of bent functions and balanced Boolean functions with high nonlinearity
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Dobbertin H. Construction of bent functions and balanced Boolean functions with high nonlinearity. LNCS 1995, vol. 1008:61-74. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 61-74
-
-
Dobbertin, H.1
-
158
-
-
24944578285
-
A survey of some recent results on bent functions
-
Springer, Berlin, Sequences and their applications-SETA 2004
-
Dobbertin H., Leander G. A survey of some recent results on bent functions. LNCS 2005, vol. 3486:1-29. Springer, Berlin.
-
(2005)
LNCS
, vol.3486
, pp. 1-29
-
-
Dobbertin, H.1
Leander, G.2
-
159
-
-
84942037407
-
-
Cryptographer's toolkit for construction of 8-bit bent functions
-
Dobbertin H, Leander G. Cryptographer's toolkit for construction of 8-bit bent functions, . http://eprint.iacr.org/2005/089.
-
-
-
Dobbertin, H.1
Leander, G.2
-
160
-
-
4544352431
-
Etude des propriétés de dégénérescence et de normalité des fonctions booléennes et construction de fonctions q-aires parfaitement nonlinéaires.
-
Ph.D. thesis. Université de Caen
-
Dubuc S. Etude des propriétés de dégénérescence et de normalité des fonctions booléennes et construction de fonctions q-aires parfaitement nonlinéaires. Ph.D. thesis. Université de Caen; 2001.
-
(2001)
-
-
Dubuc, S.1
-
161
-
-
84942035605
-
-
eCRYPT-European Network of Excellence for Cryptology
-
eCRYPT-European Network of Excellence for Cryptology, . http://www.ecrypt.eu.org/index.html.
-
-
-
-
162
-
-
0010174973
-
Asymptotic enumeration of Kn-free graphs.
-
Tomo II, 19-27. Atti dei Convegni Lincei, No. 17, Accad. Naz. Lincei
-
Erdös P, Kleitman DJ, Rothschild BL. Asymptotic enumeration of Kn-free graphs. In: Colloquio Internazionale sulle Teorie Combinatorie (Rome, 1976), Tomo II, 19-27. Atti dei Convegni Lincei, No. 17, Accad. Naz. Lincei.
-
Colloquio Internazionale sulle Teorie Combinatorie (Rome, 1976)
-
-
Erdös, P.1
Kleitman, D.J.2
Rothschild, B.L.3
-
163
-
-
84977806870
-
Linear structures in block ciphers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '87
-
Evertse J.-H. Linear structures in block ciphers. LNCS 1988, vol. 304:249-266. Springer, Berlin.
-
(1988)
LNCS
, vol.304
, pp. 249-266
-
-
Evertse, J.-H.1
-
164
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
Faugère J.-C. A new efficient algorithm for computing Gröbner bases (F4). J Pure Appl Alg 1999, 139:61-88.
-
(1999)
J Pure Appl Alg
, vol.139
, pp. 61-88
-
-
Faugère, J.-C.1
-
165
-
-
84974705196
-
On the constructing of highly nonlinear resilient Boolean functions by means of special matrices
-
Springer, Berlin, Indocrypt 2001
-
Fedorova M., Tarannikov Y. On the constructing of highly nonlinear resilient Boolean functions by means of special matrices. LNCS 2001, vol. 2247:254-266. Springer, Berlin.
-
(2001)
LNCS
, vol.2247
, pp. 254-266
-
-
Fedorova, M.1
Tarannikov, Y.2
-
166
-
-
0001820140
-
Cryptography and computer privacy
-
Feistel H. Cryptography and computer privacy. Scientific American 1973, 228:15-23.
-
(1973)
Scientific American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
167
-
-
84974678303
-
Improved cryptanalysis of Rijndael
-
Springer, Berlin, Fast software encryption-New York 2000
-
Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., et al. Improved cryptanalysis of Rijndael. LNCS 2001, vol. 1978:213-230. Springer, Berlin.
-
(2001)
LNCS
, vol.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
-
168
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
Springer, Berlin, Selected areas crypt. 2001
-
Ferguson N., Schroeppel R., Whiting D. A simple algebraic representation of Rijndael. LNCS 2001, vol. 2259:149-165. Springer, Berlin.
-
(2001)
LNCS
, vol.2259
, pp. 149-165
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
169
-
-
84957676126
-
Highly nonlinear balanced Boolean functions with a good correlation immunity
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '98
-
Filiol E., Fontaine C. Highly nonlinear balanced Boolean functions with a good correlation immunity. LNCS 1998, vol. 1403:475-488. Springer, Berlin.
-
(1998)
LNCS
, vol.1403
, pp. 475-488
-
-
Filiol, E.1
Fontaine, C.2
-
170
-
-
33745748352
-
Computer data authentication.
-
Federal Information Processing Standards Publication 113, National Bureau of Standards. Springfield, Virginia
-
FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, National Bureau of Standards. Springfield, Virginia; 1994.
-
(1994)
-
-
-
171
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '96
-
Fischer J.-B., Stern J. An efficient pseudo-random generator provably as secure as syndrome decoding. LNCS 1996, vol. 1070:245-255. Springer, Berlin.
-
(1996)
LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
172
-
-
85011285633
-
The strict avalanche criterion: spectral properties of Boolean functions and an extended definition
-
Springer, Berlin, Adv. in crypt.-Crypto '88
-
Forré R. The strict avalanche criterion: spectral properties of Boolean functions and an extended definition. LNCS 1990, vol. 403:450-468. Springer, Berlin.
-
(1990)
LNCS
, vol.403
, pp. 450-468
-
-
Forré, R.1
-
173
-
-
84929185964
-
A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '89
-
Forré R. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. LNCS 1990, vol. 434:586-595. Springer, Berlin.
-
(1990)
LNCS
, vol.434
, pp. 586-595
-
-
Forré, R.1
-
174
-
-
0025638337
-
Methods and instruments for designing S-boxes
-
Forré R. Methods and instruments for designing S-boxes. J Cryptology 1990, 2:115-130.
-
(1990)
J Cryptology
, vol.2
, pp. 115-130
-
-
Forré, R.1
-
175
-
-
58149413994
-
The lexicographically least de Bruijn cycle
-
Fredricksen H. The lexicographically least de Bruijn cycle. J Combin Theory A 1970, 9:1-5.
-
(1970)
J Combin Theory A
, vol.9
, pp. 1-5
-
-
Fredricksen, H.1
-
176
-
-
33646278638
-
A class of nonlinear de Bruijn cycles
-
Fredricksen H. A class of nonlinear de Bruijn cycles. J Combin Theory A 1975, 19:192-199.
-
(1975)
J Combin Theory A
, vol.19
, pp. 192-199
-
-
Fredricksen, H.1
-
177
-
-
0000881136
-
A survey of full length nonlinear shift register cycle algorithms
-
Fredricksen H. A survey of full length nonlinear shift register cycle algorithms. SIAM Review 1982, 24:195-221.
-
(1982)
SIAM Review
, vol.24
, pp. 195-221
-
-
Fredricksen, H.1
-
178
-
-
38249040050
-
An algorithm for generating necklaces of beads in two colors
-
Fredricksen H., Kessler I.J. An algorithm for generating necklaces of beads in two colors. Discrete Math 1986, 61:181-188.
-
(1986)
Discrete Math
, vol.61
, pp. 181-188
-
-
Fredricksen, H.1
Kessler, I.J.2
-
179
-
-
0008782949
-
Necklaces of beads in k colors and k-ary de Bruijn sequences
-
Fredricksen H., Maiorana J. Necklaces of beads in k colors and k-ary de Bruijn sequences. Discrete Math 1978, 23:207-210.
-
(1978)
Discrete Math
, vol.23
, pp. 207-210
-
-
Fredricksen, H.1
Maiorana, J.2
-
180
-
-
85024964126
-
On the bit extraction problem.
-
33rd IEEE symposium on foundations of computer science
-
Friedman J. On the bit extraction problem. In: Proc. 33rd IEEE symposium on foundations of computer science; 1992. p. 314-19.
-
(1992)
In: Proc.
, pp. 314-319
-
-
Friedman, J.1
-
183
-
-
0015913785
-
How to protect data with ciphers that are really hard to break
-
Geffe P.R. How to protect data with ciphers that are really hard to break. Electronics 1973, 46:99-101.
-
(1973)
Electronics
, vol.46
, pp. 99-101
-
-
Geffe, P.R.1
-
184
-
-
84974622962
-
An improved pseduo-random generator based on discrete log
-
Springer, Berlin, Adv. in crypt.-Crypto 2000
-
Gennaro R. An improved pseduo-random generator based on discrete log. LNCS 2000, vol. 1880:469-481. Springer, Berlin.
-
(2000)
LNCS
, vol.1880
, pp. 469-481
-
-
Gennaro, R.1
-
185
-
-
0001389453
-
Symmetry types of periodic sequences
-
Gilbert E.N., Riordan J. Symmetry types of periodic sequences. Illinois J Math 1961, 5:657-665.
-
(1961)
Illinois J Math
, vol.5
, pp. 657-665
-
-
Gilbert, E.N.1
Riordan, J.2
-
186
-
-
0038557148
-
A specification for Rijndael
-
the AES algorithm
-
Gladman B. A specification for Rijndael, the AES algorithm, . http://www.techheap.com/cryptography/encryption/spec.v36.pdf.
-
-
-
Gladman, B.1
-
187
-
-
0010276081
-
Fast encryption and authentication
-
XCBC Encryption and XECB Authentication Modes, Submission to NIST
-
Gligor VD, Donescu P. Fast encryption and authentication: XCBC Encryption and XECB Authentication Modes, Submission to NIST, . http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/index.html.
-
-
-
Gligor, V.D.1
Donescu, P.2
-
188
-
-
0007823441
-
Problems in algebraic combinatorics
-
# F1
-
Godsil C.D. Problems in algebraic combinatorics. Elec J Combin 1995, # F1.
-
(1995)
Elec J Combin
-
-
Godsil, C.D.1
-
189
-
-
84955576147
-
On the security of shift register based keystream generators
-
Springer, Berlin, Fast software encryption-Cambridge 1993
-
Golić J.D. On the security of shift register based keystream generators. LNCS 1994, vol. 809:90-100. Springer, Berlin.
-
(1994)
LNCS
, vol.809
, pp. 90-100
-
-
Golić, J.D.1
-
190
-
-
84955594784
-
Intrinsic statistical weakness of keystream generators
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '94
-
Golić J.D. Intrinsic statistical weakness of keystream generators. LNCS 1995, vol. 917:91-103. Springer, Berlin.
-
(1995)
LNCS
, vol.917
, pp. 91-103
-
-
Golić, J.D.1
-
191
-
-
84948958360
-
Linear cryptanalysis of stream ciphers
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Golić J.D. Linear cryptanalysis of stream ciphers. LNCS 1995, vol. 1008:154-169. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 154-169
-
-
Golić, J.D.1
-
192
-
-
84958983180
-
On the security of nonlinear filter generators
-
Springer, Berlin, Fast software encryption-Cambridge 1996
-
Golić J.D. On the security of nonlinear filter generators. LNCS 1997, vol. 1039:173-188. Springer, Berlin.
-
(1997)
LNCS
, vol.1039
, pp. 173-188
-
-
Golić, J.D.1
-
193
-
-
84880855404
-
Correlation analysis of the shrinking generator
-
Springer, Berlin, Adv. in crypt.-Crypto 2001
-
Golić J.D. Correlation analysis of the shrinking generator. LNCS 2001, vol. 2139:440-457. Springer, Berlin.
-
(2001)
LNCS
, vol.2139
, pp. 440-457
-
-
Golić, J.D.1
-
194
-
-
31744445021
-
Vectorial Boolean functions and induced algebraic equations
-
Golić J.D. Vectorial Boolean functions and induced algebraic equations. IEEE Trans Inform Theory 2006, 52:528-537.
-
(2006)
IEEE Trans Inform Theory
, vol.52
, pp. 528-537
-
-
Golić, J.D.1
-
195
-
-
23744501115
-
Embedding probabilities for the alternating step generator
-
Golić J.D. Embedding probabilities for the alternating step generator. IEEE Trans Inform Theory 2005, 51:2543-2553.
-
(2005)
IEEE Trans Inform Theory
, vol.51
, pp. 2543-2553
-
-
Golić, J.D.1
-
196
-
-
84958673691
-
Edit distance correlation attack on the alternating step generator
-
Springer, Berlin, Adv. in crypt.-Crypto '97
-
Golić J.D., Menicocci R. Edit distance correlation attack on the alternating step generator. LNCS 1997, vol. 1294:499-512. Springer, Berlin.
-
(1997)
LNCS
, vol.1294
, pp. 499-512
-
-
Golić, J.D.1
Menicocci, R.2
-
197
-
-
24044535056
-
Edit probability correlation attacks on stop/go clocked keystream generators
-
Golić J.D., Menicocci R. Edit probability correlation attacks on stop/go clocked keystream generators. J Cryptology 2003, 16:41-68.
-
(2003)
J Cryptology
, vol.16
, pp. 41-68
-
-
Golić, J.D.1
Menicocci, R.2
-
198
-
-
0742321821
-
Correlation analysis of the alternating step generator
-
Golić J.D., Menicocci R. Correlation analysis of the alternating step generator. Des Codes Cryptogr 2004, 31:51-74.
-
(2004)
Des Codes Cryptogr
, vol.31
, pp. 51-74
-
-
Golić, J.D.1
Menicocci, R.2
-
199
-
-
0025824847
-
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
-
Golić J.D., Mihaljević M.J. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. J Cryptology 1991, 3:201-212.
-
(1991)
J Cryptology
, vol.3
, pp. 201-212
-
-
Golić, J.D.1
Mihaljević, M.J.2
-
200
-
-
85014175279
-
Vectorial fast correlation attacks
-
Golić JD, Morgari G. Vectorial fast correlation attacks, . http://eprint.iacr.org/2004/247.
-
-
-
Golić, J.D.1
Morgari, G.2
-
201
-
-
84948975118
-
Embedding and probabilistic correlation attacks on clock-controlled shift registers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '94
-
Golić J.D., O'Connor L. Embedding and probabilistic correlation attacks on clock-controlled shift registers. LNCS 1995, vol. 950:230-243. Springer, Berlin.
-
(1995)
LNCS
, vol.950
, pp. 230-243
-
-
Golić, J.D.1
O'Connor, L.2
-
202
-
-
0008772856
-
A generalized correlation attack with a probabilistic constrained edit distance
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '92
-
Golić J.D., Petrović S.V. A generalized correlation attack with a probabilistic constrained edit distance. LNCS 1993, vol. 658:472-476. Springer, Berlin.
-
(1993)
LNCS
, vol.658
, pp. 472-476
-
-
Golić, J.D.1
Petrović, S.V.2
-
203
-
-
33747462821
-
Correlation attacks on clock-controlled shift registers in keystream generators
-
Golić J.D., Petrović S.V. Correlation attacks on clock-controlled shift registers in keystream generators. IEEE Trans Comput 1996, 45:482-486.
-
(1996)
IEEE Trans Comput
, vol.45
, pp. 482-486
-
-
Golić, J.D.1
Petrović, S.V.2
-
204
-
-
0001120657
-
Fast correlation attacks on the summation generator
-
Golić J.D., Salmasizadeh M., Dawson E. Fast correlation attacks on the summation generator. J Cryptology 2000, 13:245-262.
-
(2000)
J Cryptology
, vol.13
, pp. 245-262
-
-
Golić, J.D.1
Salmasizadeh, M.2
Dawson, E.3
-
205
-
-
0039327868
-
Fast correlation attacks on nonlinear filter generators
-
Golić J.D., Salmasizadeh M., Simpson L., Dawson E. Fast correlation attacks on nonlinear filter generators. Inform Process Lett 1997, 64:37-42.
-
(1997)
Inform Process Lett
, vol.64
, pp. 37-42
-
-
Golić, J.D.1
Salmasizadeh, M.2
Simpson, L.3
Dawson, E.4
-
206
-
-
85034444570
-
Pseudo random properties of cascade connections of clock controlled shift registers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '84
-
Gollmann D. Pseudo random properties of cascade connections of clock controlled shift registers. LNCS 1985, vol. 209:93-98. Springer, Berlin.
-
(1985)
LNCS
, vol.209
, pp. 93-98
-
-
Gollmann, D.1
-
207
-
-
84942041180
-
Correlation analysis of cascaded sequences
-
Clarendon Press, Oxford, Cryptography and coding
-
Gollmann D. Correlation analysis of cascaded sequences. 1986 IMA conference 1989, 289-297. Clarendon Press, Oxford.
-
(1989)
1986 IMA conference
, pp. 289-297
-
-
Gollmann, D.1
-
208
-
-
84942019538
-
Transition matrices of clock-controlled shift registers
-
Clarendon Press, Oxford
-
Gollmann D. Transition matrices of clock-controlled shift registers. Cryptography and coding III. 1991 IMA conference 1993, 197-210. Clarendon Press, Oxford.
-
(1993)
Cryptography and coding III. 1991 IMA conference
, pp. 197-210
-
-
Gollmann, D.1
-
210
-
-
85032867322
-
A cryptanalysis of stepk,m cascades
-
Springer, Berlin, Adv. in crypt. Eurocrypt '89
-
Gollmann D., Chambers W.G. A cryptanalysis of stepk,m cascades. LNCS 1990, vol. 434:680-687. Springer, Berlin.
-
(1990)
LNCS
, vol.434
, pp. 680-687
-
-
Gollmann, D.1
Chambers, W.G.2
-
211
-
-
0004201481
-
-
Holden-Day, San Francisco, revised edition Laguna Hills, CA: Aegean Park Press; 1982
-
Golomb S.W. Shift register sequences 1967, Holden-Day, San Francisco, revised edition Laguna Hills, CA: Aegean Park Press; 1982.
-
(1967)
Shift register sequences
-
-
Golomb, S.W.1
-
212
-
-
85014225550
-
A short proof of the non-existence of certain cryptographic functions
-
Gopalakrishnan K., Stinson D.R. A short proof of the non-existence of certain cryptographic functions. J Combin Math Combin Comput 1996, 20:129-137.
-
(1996)
J Combin Math Combin Comput
, vol.20
, pp. 129-137
-
-
Gopalakrishnan, K.1
Stinson, D.R.2
-
214
-
-
33749669388
-
On the linear complexity of products of shift-register sequences
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Göttfert R., Niederreiter H. On the linear complexity of products of shift-register sequences. LNCS 1994, vol. 765:151-158. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 151-158
-
-
Göttfert, R.1
Niederreiter, H.2
-
215
-
-
85034847491
-
Alternating step generators controlled by de Bruijn sequences
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '87
-
Günther C.G. Alternating step generators controlled by de Bruijn sequences. LNCS 1988, vol. 304:5-14. Springer, Berlin.
-
(1988)
LNCS
, vol.304
, pp. 5-14
-
-
Günther, C.G.1
-
216
-
-
84942041367
-
Computing partial Walsh transform from the algebraic normal form of a Boolean function
-
preprint
-
Gupta KC, Sarkar P. Computing partial Walsh transform from the algebraic normal form of a Boolean function, preprint, ; 2006. http://www.cacr.math.uwaterloo.ca/techreports/2006/cacr2006-25.ps.
-
(2006)
-
-
Gupta, K.C.1
Sarkar, P.2
-
217
-
-
0009188489
-
Eigenvalue techniques in design and graph theory.
-
Ph.D. thesis. Eindhoven University of Technology;(also found in Math. Centre Tract 121, Mathematical Centre, Amsterdam, 1980)
-
Haemers WH. Eigenvalue techniques in design and graph theory. Ph.D. thesis. Eindhoven University of Technology; 1979 (also found in Math. Centre Tract 121, Mathematical Centre, Amsterdam, 1980).
-
(1979)
-
-
Haemers, W.H.1
-
219
-
-
84976659284
-
Approximate string matching
-
Hall P., Dowling G. Approximate string matching. Computing Surveys 1980, 12:381-402.
-
(1980)
Computing Surveys
, vol.12
, pp. 381-402
-
-
Hall, P.1
Dowling, G.2
-
221
-
-
0344056457
-
The discrete logarithm modulo a composite hides O(n) bits
-
Håstad J., Schrift A., Shamir A. The discrete logarithm modulo a composite hides O(n) bits. J Computer System Sci 1993, 47:376-404.
-
(1993)
J Computer System Sci
, vol.47
, pp. 376-404
-
-
Håstad, J.1
Schrift, A.2
Shamir, A.3
-
222
-
-
0043286525
-
The analysis of de Bruijn sequences of non-extremal weight
-
Hauge E.R., Mykkeltveit J. The analysis of de Bruijn sequences of non-extremal weight. Discrete Math 1998, 189:133-147.
-
(1998)
Discrete Math
, vol.189
, pp. 133-147
-
-
Hauge, E.R.1
Mykkeltveit, J.2
-
224
-
-
33746654569
-
Two new attacks on the self-shrinking generator
-
Hell M., Johansson T. Two new attacks on the self-shrinking generator. IEEE Trans Inform Theory 2006, 52:3837-3843.
-
(2006)
IEEE Trans Inform Theory
, vol.52
, pp. 3837-3843
-
-
Hell, M.1
Johansson, T.2
-
225
-
-
85032286198
-
On functions of linear shift register sequences
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '85
-
Herlestam T. On functions of linear shift register sequences. LNCS 1986, vol. 219:119-129. Springer, Berlin.
-
(1986)
LNCS
, vol.219
, pp. 119-129
-
-
Herlestam, T.1
-
226
-
-
0039818145
-
On eigenvalues and colorings of graphs
-
Academic Press, B. Harris (Ed.)
-
Hoffman A.J. On eigenvalues and colorings of graphs. Graph theory and its applications 1970, 78-91. Academic Press. B. Harris (Ed.).
-
(1970)
Graph theory and its applications
, pp. 78-91
-
-
Hoffman, A.J.1
-
227
-
-
0042555094
-
New constructions of bent functions
-
Hou X.-D. New constructions of bent functions. J Combin Inform System Sci 2000, 25:173-189.
-
(2000)
J Combin Inform System Sci
, vol.25
, pp. 173-189
-
-
Hou, X.-D.1
-
228
-
-
0031139263
-
On the norm and covering radius of the first-order Reed-Muller codes
-
Hou X.-D. On the norm and covering radius of the first-order Reed-Muller codes. IEEE Trans Inform Theory 1997, 43:1025-1027.
-
(1997)
IEEE Trans Inform Theory
, vol.43
, pp. 1025-1027
-
-
Hou, X.-D.1
-
229
-
-
0042527998
-
Cubic bent functions
-
Hou X.-D. Cubic bent functions. Discrete Math 1998, 189:149-161.
-
(1998)
Discrete Math
, vol.189
, pp. 149-161
-
-
Hou, X.-D.1
-
231
-
-
3543121915
-
Strongly regular graphs associated with bent functions.
-
7th internat. symp. parallel architect., algo. and networks
-
Huang T, You K-H. Strongly regular graphs associated with bent functions. In: Proc. 7th internat. symp. parallel architect., algo. and networks; 2004. p. 380-4.
-
(2004)
Proc.
, pp. 380-384
-
-
Huang, T.1
You, K-H.2
-
232
-
-
0022476533
-
A superexponential lower bound for Gröbner bases and Church-Rosser commutative Thue systems
-
Huynh D.T. A superexponential lower bound for Gröbner bases and Church-Rosser commutative Thue systems. Inform Control 1986, 68:196-206.
-
(1986)
Inform Control
, vol.68
, pp. 196-206
-
-
Huynh, D.T.1
-
233
-
-
0024768555
-
Efficient cryptographic schemes provably as secure as subset sum.
-
30th IEEE symposium on foundations of computer science
-
Impagliazzo R, Naor M. Efficient cryptographic schemes provably as secure as subset sum. In: Proc. 30th IEEE symposium on foundations of computer science; 1989. p. 236-41.
-
(1989)
Proc.
, pp. 236-241
-
-
Impagliazzo, R.1
Naor, M.2
-
234
-
-
0343387037
-
Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm
-
ISO/IEC 9797. Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm; 1989.
-
(1989)
-
-
-
235
-
-
84942032508
-
Information technology-security techniques-data integrity, mechanism using a cryptographic check function employing a block cipher algorithm.
-
International Organization for Standards, Geneva, Switzerland; 1999
-
ISO/IEC 9797-1. Information technology-security techniques-data integrity, mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards, Geneva, Switzerland; 1999.
-
-
-
-
236
-
-
27544469526
-
OMAC: One-key CBC MAC
-
submitted for consideration to NIST
-
Iwata T, Kurosawa K. OMAC: One-key CBC MAC, submitted for consideration to NIST (available at: ); 2002. http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/ProposedModesPage.html.
-
(2002)
-
-
Iwata, T.1
Kurosawa, K.2
-
237
-
-
84947929289
-
The interpolation attack on block ciphers
-
Springer, Berlin, Fast software encryption-Haifa 1997
-
Jakobsen T., Knudsen L. The interpolation attack on block ciphers. LNCS 1997, vol. 1267:28-40. Springer, Berlin.
-
(1997)
LNCS
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.2
-
238
-
-
0020925487
-
Multiplexed sequences: some properties of the minimum polynomial
-
Springer, Berlin, Proc. workshop on cryptography, Burg Feuerstein 1982
-
Jennings S.M. Multiplexed sequences: some properties of the minimum polynomial. LNCS 1983, vol. 149:189-206. Springer, Berlin.
-
(1983)
LNCS
, vol.149
, pp. 189-206
-
-
Jennings, S.M.1
-
239
-
-
84947776392
-
Reduced complexity correlation attacks on two clock controlled generators
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '98
-
Johansson T. Reduced complexity correlation attacks on two clock controlled generators. LNCS 1998, vol. 1514:342-356. Springer, Berlin.
-
(1998)
LNCS
, vol.1514
, pp. 342-356
-
-
Johansson, T.1
-
240
-
-
84957702423
-
Improved fast correlation attacks on stream ciphers via convolutional codes
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '99
-
Johansson T., Jönsson F. Improved fast correlation attacks on stream ciphers via convolutional codes. LNCS 1999, vol. 1592:347-362. Springer, Berlin.
-
(1999)
LNCS
, vol.1592
, pp. 347-362
-
-
Johansson, T.1
Jönsson, F.2
-
241
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
Springer, Berlin, Adv. in crypt.-Crypto '99
-
Johansson T., Jönsson F. Fast correlation attacks based on turbo code techniques. LNCS 1999, vol. 1666:181-197. Springer, Berlin.
-
(1999)
LNCS
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
242
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
Springer, Berlin, Adv. in crypt.-Crypto 2000
-
Johansson T., Jönsson F. Fast correlation attacks through reconstruction of linear polynomials. LNCS 2000, vol. 1880:300-315. Springer, Berlin.
-
(2000)
LNCS
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jönsson, F.2
-
243
-
-
3042578220
-
Switching of edges in strongly regular graphs. I. A family of partial difference sets on 100 vertices
-
# R17
-
Jørgensen L.K., Klin M. Switching of edges in strongly regular graphs. I. A family of partial difference sets on 100 vertices. Electronic J Combin 2003, 10. # R17.
-
(2003)
Electronic J Combin
, vol.10
-
-
Jørgensen, L.K.1
Klin, M.2
-
244
-
-
0141982449
-
Difference sets: an introduction
-
Kluwer Acad. Publ., Dordrecht, Difference sets, sequences and their correlation properties (Bad Windsheim, 1998)
-
Jungnickel D., Pott A. Difference sets: an introduction. NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci. 1999, vol. 542:259-295. Kluwer Acad. Publ., Dordrecht.
-
(1999)
NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci.
, vol.542
, pp. 259-295
-
-
Jungnickel, D.1
Pott, A.2
-
245
-
-
84949188947
-
On the complexity of Matsui's attack
-
Springer, Berlin, Selected areas crypt. 2001
-
Junod P. On the complexity of Matsui's attack. LNCS 2001, vol. 2259:199-211. Springer, Berlin.
-
(2001)
LNCS
, vol.2259
, pp. 199-211
-
-
Junod, P.1
-
246
-
-
33750424744
-
Statistical cryptanalysis of block ciphers.
-
Ph.D. thesis 3179. École Polytechnique Fédérale de Lausanne, Switzerland
-
Junod P. Statistical cryptanalysis of block ciphers. Ph.D. thesis 3179. École Polytechnique Fédérale de Lausanne, Switzerland; 2004.
-
(2004)
-
-
Junod, P.1
-
247
-
-
0018530910
-
Structured design of substitution-permutation encryption networks
-
Kam J.B., Davida G.I. Structured design of substitution-permutation encryption networks. IEEE Trans Comput 1979, 28(10):747-753.
-
(1979)
IEEE Trans Comput
, vol.28
, Issue.10
, pp. 747-753
-
-
Kam, J.B.1
Davida, G.I.2
-
249
-
-
34248586580
-
Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity >240
-
Springer, Berlin, Indocrypt 2006
-
Kavut S., Maitra S., Yücel M.D. Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity >240. LNCS 2006, vol. 4329:266-279. Springer, Berlin.
-
(2006)
LNCS
, vol.4329
, pp. 266-279
-
-
Kavut, S.1
Maitra, S.2
Yücel, M.D.3
-
250
-
-
34248587014
-
Search for Boolean functions with excellent profiles in the rotation symmetric class
-
Kavut S., Maitra S., Yücel M.D. Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans Inform Theory 2007, 53:1743-1751.
-
(2007)
IEEE Trans Inform Theory
, vol.53
, pp. 1743-1751
-
-
Kavut, S.1
Maitra, S.2
Yücel, M.D.3
-
251
-
-
38349058097
-
Generalized rotation symmetric and dihedral symmetric boolean functions-9 variable Boolean functions with nonlinearity 242
-
Springer, Berlin, Proceedings of applied algebra, algebraic algorithms and error correcting codes
-
Kavut S., Yücel D. Generalized rotation symmetric and dihedral symmetric boolean functions-9 variable Boolean functions with nonlinearity 242. LNCS 2007, vol. 4851:321-329. Springer, Berlin.
-
(2007)
LNCS
, vol.4851
, pp. 321-329
-
-
Kavut, S.1
Yücel, D.2
-
252
-
-
84968468693
-
Difference sets in Abelian groups
-
Kesava Menon P. Difference sets in Abelian groups. Proc AMS 1960, 11:368-377.
-
(1960)
Proc AMS
, vol.11
, pp. 368-377
-
-
Kesava Menon, P.1
-
253
-
-
0017017134
-
An analysis of the structure and complexity of nonlinear binary sequence generators
-
Key E.L. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Trans Inform Theory 1976, 22:732-736.
-
(1976)
IEEE Trans Inform Theory
, vol.22
, pp. 732-736
-
-
Key, E.L.1
-
255
-
-
30744457834
-
A new characterization of semi-bent and bent functions on finite fields
-
Khoo K., Gong G., Stinson D.R. A new characterization of semi-bent and bent functions on finite fields. Des Codes Cryptogr 2006, 38:279-295.
-
(2006)
Des Codes Cryptogr
, vol.38
, pp. 279-295
-
-
Khoo, K.1
Gong, G.2
Stinson, D.R.3
-
256
-
-
0346858443
-
A recursive construction method of S-boxes satisfying strict avalanche criteria
-
Springer, Berlin, Adv. in crypt.-Crypto '90
-
Kim K., Matsumoto T., Imai H. A recursive construction method of S-boxes satisfying strict avalanche criteria. LNCS 1991, vol. 537:564-574. Springer, Berlin.
-
(1991)
LNCS
, vol.537
, pp. 564-574
-
-
Kim, K.1
Matsumoto, T.2
Imai, H.3
-
257
-
-
85014957337
-
Construction of DES-like S-boxes based on Boolean functions satisfying the SAC
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '91
-
Kim K. Construction of DES-like S-boxes based on Boolean functions satisfying the SAC. LNCS 1993, vol. 739:59-72. Springer, Berlin.
-
(1993)
LNCS
, vol.739
, pp. 59-72
-
-
Kim, K.1
-
258
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem by relinearization
-
Springer, Berlin, Adv. in crypt.-Crypto '99
-
Kipnis A., Shamir A. Cryptanalysis of the HFE public key cryptosystem by relinearization. LNCS 1999, vol. 1666:19-30. Springer, Berlin.
-
(1999)
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
259
-
-
84957665414
-
Cryptanalysis based on 2-adic rational approximation
-
Springer, Berlin, Adv. in crypt.-Crypto '95
-
Klapper A., Goresky M. Cryptanalysis based on 2-adic rational approximation. LNCS 1995, vol. 963:262-273. Springer, Berlin.
-
(1995)
LNCS
, vol.963
, pp. 262-273
-
-
Klapper, A.1
Goresky, M.2
-
260
-
-
84942034368
-
The XL and XSL attacks on Baby Rijndael.
-
Iowa State University
-
Kleiman E. The XL and XSL attacks on Baby Rijndael. Master of Science Thesis. Iowa State University, ; 2005. http://orion.math.iastate.edu/dept/thesisarchive/MS/EKleimanMSSS05.pdf.
-
(2005)
Master of Science Thesis.
-
-
Kleiman, E.1
-
262
-
-
84935039488
-
BDD-based cryptanalysis of keystream generators
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2002
-
Krause M. BDD-based cryptanalysis of keystream generators. LNCS 2002, vol. 2332:222-237. Springer, Berlin.
-
(2002)
LNCS
, vol.2332
, pp. 222-237
-
-
Krause, M.1
-
263
-
-
84978534017
-
The shrinking generator: some practical considerations
-
Springer, Berlin, Fast software encryption-Cambridge 1993
-
Krawczyk H. The shrinking generator: some practical considerations. LNCS 1994, vol. 809:45-46. Springer, Berlin.
-
(1994)
LNCS
, vol.809
, pp. 45-46
-
-
Krawczyk, H.1
-
265
-
-
84957365641
-
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '97
-
Kurosawa K., Satoh T. Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria. LNCS 1997, vol. 1233:434-449. Springer, Berlin.
-
(1997)
LNCS
, vol.1233
, pp. 434-449
-
-
Kurosawa, K.1
Satoh, T.2
-
266
-
-
0347484712
-
Sommes de Kloosterman Courbes elliptique et codes cyclique en characteristique 2
-
Lachaud G., Wolfmann J. Sommes de Kloosterman Courbes elliptique et codes cyclique en characteristique 2. C R Acad Sci Paris, Série 1 1987, 305:881-883.
-
(1987)
C R Acad Sci Paris, Série 1
, vol.305
, pp. 881-883
-
-
Lachaud, G.1
Wolfmann, J.2
-
267
-
-
0003288228
-
On the design and security of block ciphers
-
Hartung-Gorre Verlag, Kostanz
-
Lai X. On the design and security of block ciphers. ETH Series in Information Processing 1992, vol. 1. Hartung-Gorre Verlag, Kostanz.
-
(1992)
ETH Series in Information Processing
, vol.1
-
-
Lai, X.1
-
268
-
-
84948991635
-
Additive and linear structures of cryptographic functions
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Lai X. Additive and linear structures of cryptographic functions. LNCS 1995, vol. 1008:75-85. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 75-85
-
-
Lai, X.1
-
269
-
-
84942063245
-
-
The number of bent functions with 8 variables
-
Langevin P, Leander G, Rabizzoni P, Véron P, Zanotti J-P. The number of bent functions with 8 variables, . http://langevin.univ-tln.fr/project/quartics.
-
-
-
Langevin, P.1
Leander, G.2
Rabizzoni, P.3
Véron, P.4
Zanotti, J-P.5
-
271
-
-
24944541293
-
Normality of bent functions, monomial and binomial bent functions.
-
Ph.D. thesis. Ruhr Universität Bochum
-
Leander NG. Normality of bent functions, monomial and binomial bent functions. Ph.D. thesis. Ruhr Universität Bochum; 2004.
-
(2004)
-
-
Leander, N.G.1
-
272
-
-
0003305133
-
Harmonic analysis of switching functions
-
Academic Press, New York, A. Mukhopadhyay (Ed.)
-
Lechner R.J. Harmonic analysis of switching functions. Recent developments in switching theory 1971, Academic Press, New York. A. Mukhopadhyay (Ed.).
-
(1971)
Recent developments in switching theory
-
-
Lechner, R.J.1
-
273
-
-
35048865919
-
Algebraic attacks on summation generators
-
Springer, Berlin, Fast software encryption-Delhi 2004
-
Lee D.H., Kim J., Hong J., Han J.W., Moon D. Algebraic attacks on summation generators. LNCS 2004, vol. 3017:34-48. Springer, Berlin.
-
(2004)
LNCS
, vol.3017
, pp. 34-48
-
-
Lee, D.H.1
Kim, J.2
Hong, J.3
Han, J.W.4
Moon, D.5
-
274
-
-
84955622043
-
Conditional correlation attack on nonlinear filter generators
-
Springer, Berlin, Adv. in crypt.-Asiacrypt '96
-
Lee S., Chee S., Park S., Park S. Conditional correlation attack on nonlinear filter generators. LNCS 1996, vol. 1163:360-367. Springer, Berlin.
-
(1996)
LNCS
, vol.1163
, pp. 360-367
-
-
Lee, S.1
Chee, S.2
Park, S.3
Park, S.4
-
275
-
-
0020202995
-
Maximal families of bent sequences
-
Lempel A., Cohn M. Maximal families of bent sequences. IEEE Trans Inform Theory 1982, 28:865-868.
-
(1982)
IEEE Trans Inform Theory
, vol.28
, pp. 865-868
-
-
Lempel, A.1
Cohn, M.2
-
276
-
-
0042238560
-
Self-complementary normal bases in finite fields
-
Lempel A., Weinberger M.J. Self-complementary normal bases in finite fields. SIAM J Discrete Math 1988, 1:193-198.
-
(1988)
SIAM J Discrete Math
, vol.1
, pp. 193-198
-
-
Lempel, A.1
Weinberger, M.J.2
-
279
-
-
0041532142
-
Counting functions satisfying a higher order strict avalanche criterion
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '89
-
Lloyd S. Counting functions satisfying a higher order strict avalanche criterion. LNCS 1990, vol. 434:63-74. Springer, Berlin.
-
(1990)
LNCS
, vol.434
, pp. 63-74
-
-
Lloyd, S.1
-
280
-
-
84942010901
-
Properties of binary functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '90
-
Lloyd S. Properties of binary functions. LNCS 1991, vol. 473:124-139. Springer, Berlin.
-
(1991)
LNCS
, vol.473
, pp. 124-139
-
-
Lloyd, S.1
-
281
-
-
0041532131
-
Characterizing and counting functions satisfying the strict avalanche criterion of order (n-3)
-
Clarendon Press, Oxford, C. Mitchell (Ed.)
-
Lloyd S. Characterizing and counting functions satisfying the strict avalanche criterion of order (n-3). Cryptography and coding II 1992, 165-172. Clarendon Press, Oxford. C. Mitchell (Ed.).
-
(1992)
Cryptography and coding II
, pp. 165-172
-
-
Lloyd, S.1
-
282
-
-
0026630858
-
Counting binary functions with certain cryptographic properties
-
Lloyd S. Counting binary functions with certain cryptographic properties. J Cryptology 1992, 5:107-131.
-
(1992)
J Cryptology
, vol.5
, pp. 107-131
-
-
Lloyd, S.1
-
283
-
-
43949172869
-
Balance uncorrelatedness and the strict avalanche criterion
-
Lloyd S. Balance uncorrelatedness and the strict avalanche criterion. Discrete Appl Math 1993, 41:223-233.
-
(1993)
Discrete Appl Math
, vol.41
, pp. 223-233
-
-
Lloyd, S.1
-
284
-
-
33745116422
-
Attacks based on conditional correlations against the nonlinear filter generator
-
Löhlein B. Attacks based on conditional correlations against the nonlinear filter generator, . http://eprint.iacr.org/2003/020.
-
-
-
Löhlein, B.1
-
285
-
-
0023985034
-
The discrete logarithm hides O(logn) bits
-
Long D.L., Wigderson A. The discrete logarithm hides O(logn) bits. SIAM J Comput 1988, 17:363-372.
-
(1988)
SIAM J Comput
, vol.17
, pp. 363-372
-
-
Long, D.L.1
Wigderson, A.2
-
288
-
-
84942063012
-
A class of bent functions.
-
R41 Technical paper. August 1970
-
Maiorana JA. A class of bent functions. R41 Technical paper. August 1970.
-
-
-
Maiorana, J.A.1
-
289
-
-
34247120286
-
Highly nonlinear balanced Boolean functions with very good autocorrelation property
-
Elsevier, Amsterdam, 10 pages, Coding and cryptography-WCCC 2001, Paris
-
Maitra S. Highly nonlinear balanced Boolean functions with very good autocorrelation property. Electron. Notes Discrete Math. 2001, vol. 6. Elsevier, Amsterdam, 10 pages.
-
(2001)
Electron. Notes Discrete Math.
, vol.6
-
-
Maitra, S.1
-
290
-
-
0037105928
-
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics
-
Maitra S. Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics. Inform Process Lett 2002, 83:281-286.
-
(2002)
Inform Process Lett
, vol.83
, pp. 281-286
-
-
Maitra, S.1
-
291
-
-
1642385969
-
On nonlinearity and autocorrelation properties of correlation immune Boolean functions
-
Maitra S. On nonlinearity and autocorrelation properties of correlation immune Boolean functions. JISE J Inf Sci Eng 2004, 20:305-323.
-
(2004)
JISE J Inf Sci Eng
, vol.20
, pp. 305-323
-
-
Maitra, S.1
-
292
-
-
84942023193
-
Further constructions of resilient Boolean functions with very high nonlinearity
-
Springer, London, Sequences and their applications (Bergen, 2001)
-
Maitra S., Pasalic E. Further constructions of resilient Boolean functions with very high nonlinearity. Discrete Math. Theor. Comput. Sci. 2002, 265-280. Springer, London.
-
(2002)
Discrete Math. Theor. Comput. Sci.
, pp. 265-280
-
-
Maitra, S.1
Pasalic, E.2
-
293
-
-
0036649611
-
Further constructions of resilient Boolean functions with very high nonlinearity
-
Maitra S., Pasalic E. Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Trans Inform Theory 2002, 48:1825-1834.
-
(2002)
IEEE Trans Inform Theory
, vol.48
, pp. 1825-1834
-
-
Maitra, S.1
Pasalic, E.2
-
294
-
-
84957102868
-
Highly nonlinear resilient functions optimizing Siegenthaler's inequality
-
Springer, Berlin, Adv. in crypt.-Crypto '99
-
Maitra S., Sarkar P. Highly nonlinear resilient functions optimizing Siegenthaler's inequality. LNCS 1999, vol. 1666:198-215. Springer, Berlin.
-
(1999)
LNCS
, vol.1666
, pp. 198-215
-
-
Maitra, S.1
Sarkar, P.2
-
295
-
-
0033609575
-
Hamming weights of correlation immune Boolean functions
-
Maitra S., Sarkar P. Hamming weights of correlation immune Boolean functions. Inform Process Lett 1999, 71:149-153.
-
(1999)
Inform Process Lett
, vol.71
, pp. 149-153
-
-
Maitra, S.1
Sarkar, P.2
-
296
-
-
85014131318
-
Characterization of symmetric bent functions-an elementary proof
-
Maitra S., Sarkar P. Characterization of symmetric bent functions-an elementary proof. J Combin Math Combin Comput 2002, 43:227-230.
-
(2002)
J Combin Math Combin Comput
, vol.43
, pp. 227-230
-
-
Maitra, S.1
Sarkar, P.2
-
297
-
-
0036713330
-
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
-
Maitra S., Sarkar P. Maximum nonlinearity of symmetric Boolean functions on odd number of variables. IEEE Trans Inform Theory 2002, 48:2626-2630.
-
(2002)
IEEE Trans Inform Theory
, vol.48
, pp. 2626-2630
-
-
Maitra, S.1
Sarkar, P.2
-
298
-
-
0037029298
-
Cryptographically significant Boolean functions with five valued Walsh spectra
-
Maitra S., Sarkar P. Cryptographically significant Boolean functions with five valued Walsh spectra. Theoret Comput Sci 2002, 276:133-146.
-
(2002)
Theoret Comput Sci
, vol.276
, pp. 133-146
-
-
Maitra, S.1
Sarkar, P.2
-
299
-
-
0036158533
-
Modifications of Patterson-Wiedemann functions for cryptographic applications
-
Maitra S., Sarkar P. Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Trans Inform Theory 2002, 48:278-284.
-
(2002)
IEEE Trans Inform Theory
, vol.48
, pp. 278-284
-
-
Maitra, S.1
Sarkar, P.2
-
300
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
Massey J.L. Shift-register synthesis and BCH decoding. IEEE Trans Inform Theory 1969, 15:122-127.
-
(1969)
IEEE Trans Inform Theory
, vol.15
, pp. 122-127
-
-
Massey, J.L.1
-
301
-
-
0000937205
-
A Fourier transform approach to the linear complexity of nonlinearly filtered sequences
-
Springer, Berlin, Adv. in crypt.-Crypto '94
-
Massey J.L., Serconek S. A Fourier transform approach to the linear complexity of nonlinearly filtered sequences. LNCS 1994, vol. 839:332-340. Springer, Berlin.
-
(1994)
LNCS
, vol.839
, pp. 332-340
-
-
Massey, J.L.1
Serconek, S.2
-
302
-
-
84955614319
-
Linear complexity of periodic sequences: a general theory
-
Springer, Berlin, Adv. in crypt.-Crypto '96
-
Massey J.L., Serconek S. Linear complexity of periodic sequences: a general theory. LNCS 1996, vol. 1109:358-371. Springer, Berlin.
-
(1996)
LNCS
, vol.1109
, pp. 358-371
-
-
Massey, J.L.1
Serconek, S.2
-
303
-
-
33747285760
-
A new method for known plaintext attack of FEAL cipher
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '92
-
Matsui M., Yamagishi A. A new method for known plaintext attack of FEAL cipher. LNCS 1993, vol. 658:81-91. Springer, Berlin.
-
(1993)
LNCS
, vol.658
, pp. 81-91
-
-
Matsui, M.1
Yamagishi, A.2
-
304
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Matsui M. Linear cryptanalysis method for DES cipher. LNCS 1994, vol. 765:386-397. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
305
-
-
84948954431
-
On correlation between the order of S-boxes and the strength of DES
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '94
-
Matsui M. On correlation between the order of S-boxes and the strength of DES. LNCS 1995, vol. 950:366-375. Springer, Berlin.
-
(1995)
LNCS
, vol.950
, pp. 366-375
-
-
Matsui, M.1
-
306
-
-
33746922201
-
Plateaued rotation symmetric Boolean functions on odd number of variables.
-
cryptography and applications (BFCA05), 2005, Rouen, France (also available at )
-
Maximov A, Hell M, Maitra S. Plateaued rotation symmetric Boolean functions on odd number of variables. In: First Workshop on Boolean Functions: cryptography and applications (BFCA05), 2005, Rouen, France (also available at ). http://www.eprint.iacr.org/2004/144.ps.
-
First Workshop on Boolean Functions
-
-
Maximov, A.1
Hell, M.2
Maitra, S.3
-
307
-
-
38149146344
-
Weight class distributions of de Bruijn sequences
-
Mayhew G.L. Weight class distributions of de Bruijn sequences. Discrete Math 1994, 126:425-429.
-
(1994)
Discrete Math
, vol.126
, pp. 425-429
-
-
Mayhew, G.L.1
-
308
-
-
0035815405
-
Further results on de Bruijn weight classes
-
Mayhew G.L. Further results on de Bruijn weight classes. Discrete Math 2001, 232:171-173.
-
(2001)
Discrete Math
, vol.232
, pp. 171-173
-
-
Mayhew, G.L.1
-
309
-
-
0001751788
-
The complexity of the word problem for commutative semigroups and polynomial ideals
-
Mayr E.W., Meyer A. The complexity of the word problem for commutative semigroups and polynomial ideals. Adv Math 1982, 46:305-329.
-
(1982)
Adv Math
, vol.46
, pp. 305-329
-
-
Mayr, E.W.1
Meyer, A.2
-
310
-
-
84942068388
-
A discrete Fourier theory for binary functions
-
R41 Technical paper; June 1971
-
McFarland R. A discrete Fourier theory for binary functions. R41 Technical paper; June 1971.
-
-
-
McFarland, R.1
-
311
-
-
0015803919
-
A family of difference sets in non-cyclic groups
-
McFarland R. A family of difference sets in non-cyclic groups. J Combin Theory A 1973, 15:1-10.
-
(1973)
J Combin Theory A
, vol.15
, pp. 1-10
-
-
McFarland, R.1
-
313
-
-
33845303377
-
The security and performance of the Galois/counter mode (GCM) of operation
-
Springer, Berlin, Indocrypt 2004
-
McGrew D., Viega J. The security and performance of the Galois/counter mode (GCM) of operation. LNCS 2004, vol. 3348:343-355. Springer, Berlin.
-
(2004)
LNCS
, vol.3348
, pp. 343-355
-
-
McGrew, D.1
Viega, J.2
-
314
-
-
0141818749
-
Classification of regular two-graphs on 36 and 38 vertices
-
McKay B.D., Spence E. Classification of regular two-graphs on 36 and 38 vertices. Australas J Combin 2001, 24:293-300.
-
(2001)
Australas J Combin
, vol.24
, pp. 293-300
-
-
McKay, B.D.1
Spence, E.2
-
315
-
-
35048845264
-
Algebraic attacks and decomposition of Boolean functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2004
-
Meier W., Pasalic E., Carlet C. Algebraic attacks and decomposition of Boolean functions. LNCS 2004, vol. 3027:474-491. Springer, Berlin.
-
(2004)
LNCS
, vol.3027
, pp. 474-491
-
-
Meier, W.1
Pasalic, E.2
Carlet, C.3
-
316
-
-
33745650569
-
Fast correlation attacks on certain stream ciphers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '88
-
Meier W., Staffelbach O. Fast correlation attacks on certain stream ciphers. LNCS 1989, vol. 330:301-314. Springer, Berlin.
-
(1989)
LNCS
, vol.330
, pp. 301-314
-
-
Meier, W.1
Staffelbach, O.2
-
317
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
Meier W., Staffelbach O. Fast correlation attacks on certain stream ciphers. J Cryptology 1988-89, 1:159-176.
-
(1988)
J Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
318
-
-
84962928435
-
Nonlinearity criteria for cryptographic functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '89
-
Meier W., Staffelbach O. Nonlinearity criteria for cryptographic functions. LNCS 1990, vol. 434:549-562. Springer, Berlin.
-
(1990)
LNCS
, vol.434
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
319
-
-
85043758242
-
Correlation properties of combiners with memory in stream ciphers
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '90
-
Meier W., Staffelbach O. Correlation properties of combiners with memory in stream ciphers. LNCS 1991, vol. 473:204-213. Springer, Berlin.
-
(1991)
LNCS
, vol.473
, pp. 204-213
-
-
Meier, W.1
Staffelbach, O.2
-
320
-
-
0026678847
-
Correlation properties of combiners with memory in stream ciphers
-
Meier W., Staffelbach O. Correlation properties of combiners with memory in stream ciphers. J Cryptology 1992, 5:67-86.
-
(1992)
J Cryptology
, vol.5
, pp. 67-86
-
-
Meier, W.1
Staffelbach, O.2
-
321
-
-
84948963544
-
The self-shrinking generator
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '94
-
Meier W., Staffelbach O. The self-shrinking generator. LNCS 1995, vol. 950:205-214. Springer, Berlin.
-
(1995)
LNCS
, vol.950
, pp. 205-214
-
-
Meier, W.1
Staffelbach, O.2
-
323
-
-
53049089743
-
-
Meng Q, Yang M, Zhang H, Cui J Discrete Math 2008, 308:5576-5584.
-
(2008)
Discrete Math
, vol.308
, pp. 5576-5584
-
-
Meng, Q.1
Yang, M.2
Zhang, H.3
Cui, J.4
-
324
-
-
33846794543
-
On the degree of homogeneous bent functions
-
Meng Q., Zhang H., Yang M., Cui J. On the degree of homogeneous bent functions. Discrete Appl Math 2007, 155:665-669.
-
(2007)
Discrete Appl Math
, vol.155
, pp. 665-669
-
-
Meng, Q.1
Zhang, H.2
Yang, M.3
Cui, J.4
-
326
-
-
85028870469
-
An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
-
Springer, Berlin, Adv. in crypt.-Auscrypt '92
-
Mihaljević M.J. An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure. LNCS 1993, vol. 718:349-356. Springer, Berlin.
-
(1993)
LNCS
, vol.718
, pp. 349-356
-
-
Mihaljević, M.J.1
-
327
-
-
84947910320
-
A faster cryptanalysis of the self-shrinking generator
-
Springer, Berlin, Information security and privacy 1996
-
Mihaljević M.J. A faster cryptanalysis of the self-shrinking generator. LNCS 1996, vol. 1172:182-189. Springer, Berlin.
-
(1996)
LNCS
, vol.1172
, pp. 182-189
-
-
Mihaljević, M.J.1
-
328
-
-
84974727960
-
A low complexity and high performance algorithm for the fast correlation attack
-
Springer, Berlin, Fast software encryption-New York 2000
-
Mihaljević M.J., Fossorier M., Imai H. A low complexity and high performance algorithm for the fast correlation attack. LNCS 2001, vol. 1978:196-212. Springer, Berlin.
-
(2001)
LNCS
, vol.1978
, pp. 196-212
-
-
Mihaljević, M.J.1
Fossorier, M.2
Imai, H.3
-
329
-
-
84958981368
-
Fast correlation attack algorithm with list decoding and an application
-
Springer, Berlin, Fast software encryption-Yokohama 2001
-
Mihaljević M.J., Fossorier M., Imai H. Fast correlation attack algorithm with list decoding and an application. LNCS 2002, vol. 2355:196-210. Springer, Berlin.
-
(2002)
LNCS
, vol.2355
, pp. 196-210
-
-
Mihaljević, M.J.1
Fossorier, M.2
Imai, H.3
-
330
-
-
85032480688
-
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
-
Springer, Berlin, Adv. in crypt.-Auscrypt '90
-
Mihaljević M.J., Golić J.D. A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. LNCS 1990, vol. 453:165-175. Springer, Berlin.
-
(1990)
LNCS
, vol.453
, pp. 165-175
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
331
-
-
84974658205
-
A comparison of cryptanalytic principles based on iterative error-correction
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '91
-
Mihaljević M.J., Golić J.D. A comparison of cryptanalytic principles based on iterative error-correction. LNCS 1992, vol. 547:527-531. Springer, Berlin.
-
(1992)
LNCS
, vol.547
, pp. 527-531
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
332
-
-
33745992035
-
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '92
-
Mihaljević M.J., Golić J.D. Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence. LNCS 1993, vol. 658:124-137. Springer, Berlin.
-
(1993)
LNCS
, vol.658
, pp. 124-137
-
-
Mihaljević, M.J.1
Golić, J.D.2
-
333
-
-
85014247500
-
Spectral analysis of Boolean functions under nonuniformity of arguments
-
Miranovich K. Spectral analysis of Boolean functions under nonuniformity of arguments, . http://eprint.iacr.org/2002/021.
-
-
-
Miranovich, K.1
-
334
-
-
0025680569
-
Enumerating Boolean functions of cryptographic significance
-
Mitchell C. Enumerating Boolean functions of cryptographic significance. J Cryptology 1990, 2:155-170.
-
(1990)
J Cryptology
, vol.2
, pp. 155-170
-
-
Mitchell, C.1
-
335
-
-
84942054299
-
-
Workshop 1 (October 20, 2000), Baltimore, Maryland, USA
-
Modes of Operation. Workshop 1 (October 20, 2000), Baltimore, Maryland, USA, . http://csrc.nist.gov/CryptoToolkit/modes/.
-
-
-
-
336
-
-
84942022239
-
-
Workshop 2 (August 24, 2001), Goleta, California, USA
-
Modes of Operation. Workshop 2 (August 24, 2001), Goleta, California, USA, . http://csrc.nist.gov/CryptoToolkit/modes/.
-
-
-
-
337
-
-
35048890615
-
On some weak extensions of AES and BES
-
Springer, Berlin, The 6th international conference on information and communications security 2004
-
Monnerat J., Vaudenay S. On some weak extensions of AES and BES. LNCS 2004, vol. 3269:414-426. Springer, Berlin.
-
(2004)
LNCS
, vol.3269
, pp. 414-426
-
-
Monnerat, J.1
Vaudenay, S.2
-
338
-
-
33745648399
-
Higher order differential attack using chosen higher order differences
-
Springer, Berlin, Selected areas crypt. 1998
-
Moriai S., Shimoyama T., Kaneko T. Higher order differential attack using chosen higher order differences. LNCS 1999, vol. 1556:106-117. Springer, Berlin.
-
(1999)
LNCS
, vol.1556
, pp. 106-117
-
-
Moriai, S.1
Shimoyama, T.2
Kaneko, T.3
-
339
-
-
84937413721
-
Esential algebraic structures within the AES
-
Springer, Berlin, Adv. in crypt.-Crypto 2002
-
Murphy S., Robshaw M.J. Esential algebraic structures within the AES. LNCS 2002, vol. 2442:1-16. Springer, Berlin.
-
(2002)
LNCS
, vol.2442
, pp. 1-16
-
-
Murphy, S.1
Robshaw, M.J.2
-
340
-
-
33645382225
-
Comments on the security of the AES and the XSL technique
-
September 26
-
Murphy S, Robshaw MJ. Comments on the security of the AES and the XSL technique, September 26; 2002. http://www.isg.rhul.ac.uk/~mrobshaw/rijndael/xslnote.pdf.
-
(2002)
-
-
Murphy, S.1
Robshaw, M.J.2
-
341
-
-
0000738567
-
A lemma that is not Burnside's
-
Neumann PM A lemma that is not Burnside's. Math Scientist 1979, 4:133-141.
-
(1979)
Math Scientist
, vol.4
, pp. 133-141
-
-
Neumann, P.M.1
-
342
-
-
85014233750
-
Modes of operations for symmetric block ciphers
-
NIST. Modes of operations for symmetric block ciphers (available at: ). http://csrc.nist.gov/CryptoToolkit/modes/.
-
-
-
-
343
-
-
85014183355
-
Request for AES proposals
-
NIST. Request for AES proposals, . http://csrc.nist.gov/CryptoToolkit/aes/pre-round1/aes_.9709.htm.
-
-
-
-
344
-
-
33746006003
-
Construction of bent functions and difference sets
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '90
-
Nyberg K. Construction of bent functions and difference sets. LNCS 1991, vol. 473:151-160. Springer, Berlin.
-
(1991)
LNCS
, vol.473
, pp. 151-160
-
-
Nyberg, K.1
-
345
-
-
85030461165
-
Perfect nonlinear S-boxes
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '91
-
Nyberg K. Perfect nonlinear S-boxes. LNCS 1992, vol. 547:378-386. Springer, Berlin.
-
(1992)
LNCS
, vol.547
, pp. 378-386
-
-
Nyberg, K.1
-
346
-
-
85027157211
-
On the construction of highly nonlinear permutations
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '92
-
Nyberg K. On the construction of highly nonlinear permutations. LNCS 1992, vol. 658:92-98. Springer, Berlin.
-
(1992)
LNCS
, vol.658
, pp. 92-98
-
-
Nyberg, K.1
-
347
-
-
85026918264
-
New bent mapping suitable for fast implementation
-
Springer, Berlin, Fast software encryption-Cambridge 1993
-
Nyberg K. New bent mapping suitable for fast implementation. LNCS 1994, vol. 809:179-184. Springer, Berlin.
-
(1994)
LNCS
, vol.809
, pp. 179-184
-
-
Nyberg, K.1
-
348
-
-
84948979030
-
S-boxes and round functions with controllable linearity and differential uniformity
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Nyberg K. S-boxes and round functions with controllable linearity and differential uniformity. LNCS 1995, vol. 1008:111-130. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 111-130
-
-
Nyberg, K.1
-
349
-
-
0028699983
-
An upper bound on the number of functions satisfying the strict avalanche criterion
-
O'Connor L. An upper bound on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1994, 52:325-327.
-
(1994)
Inform Process Lett
, vol.52
, pp. 325-327
-
-
O'Connor, L.1
-
350
-
-
0028499108
-
Algebraic nonlinearity and its application to cryptography
-
O'Connor L., Klapper A. Algebraic nonlinearity and its application to cryptography. J Cryptology 1994, 7:213-227.
-
(1994)
J Cryptology
, vol.7
, pp. 213-227
-
-
O'Connor, L.1
Klapper, A.2
-
351
-
-
85014158269
-
Robertson EF
-
O'Connor JJ, Robertson EF. George Boole, . http://www.history.mcs.st-andrews.ac.uk/Biographies/Boole.html.
-
George Boole
-
-
O'Connor, J.J1
-
353
-
-
8744316540
-
AES-The state of the art of Rijndael's security
-
(October 30, 2002)
-
Oswald E, Daemen J, Rijmen V. AES-The state of the art of Rijndael's security. Technical report (October 30, 2002), . http://www.citeseerx.ist.psu.edu/viewdoc/summary%3Fdoi%3D10.1.1.3.164.
-
Technical report
-
-
Oswald, E.1
Daemen, J.2
Rijmen, V.3
-
354
-
-
84957622876
-
On the security of the Gollmann cascades
-
Springer, Berlin, Adv. in crypt.-Crypto '95
-
Park S.-J., Lee S.-J., Goh S.-C. On the security of the Gollmann cascades. LNCS 1995, vol. 963:148-156. Springer, Berlin.
-
(1995)
LNCS
, vol.963
, pp. 148-156
-
-
Park, S.-J.1
Lee, S.-J.2
Goh, S.-C.3
-
355
-
-
0008457510
-
Improving bounds for the number of correlation immune Boolean functions
-
Park S.M., Lee S., Sung S.H., Kim K. Improving bounds for the number of correlation immune Boolean functions. Inform Process Lett 1997, 61:209-212.
-
(1997)
Inform Process Lett
, vol.61
, pp. 209-212
-
-
Park, S.M.1
Lee, S.2
Sung, S.H.3
Kim, K.4
-
356
-
-
34247148213
-
New constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity
-
Elsevier Ltd, Amsterdam, Workshop on Coding and Cryptography-WCC2001
-
Pasalic E., Johansson T., Maitra S., Sarkar P. New constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity. Electronic notes in discrete mathematics 2001, vol. 6. Elsevier Ltd, Amsterdam.
-
(2001)
Electronic notes in discrete mathematics
, vol.6
-
-
Pasalic, E.1
Johansson, T.2
Maitra, S.3
Sarkar, P.4
-
357
-
-
0036672636
-
Linear codes in generalized construction of resilient functions with very high nonlinearity
-
Pasalic E., Maitra S. Linear codes in generalized construction of resilient functions with very high nonlinearity. IEEE Trans Inform Theory 2002, 48:2182-2191.
-
(2002)
IEEE Trans Inform Theory
, vol.48
, pp. 2182-2191
-
-
Pasalic, E.1
Maitra, S.2
-
358
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '96
-
Patarin J. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. LNCS 1996, vol. 1070:33-48. Springer, Berlin.
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
359
-
-
84957638120
-
An efficient discrete log pseudo-random generator
-
Springer, Berlin, Adv. in crypt.-Crypto '98
-
Patel S., Sundaram G.S. An efficient discrete log pseudo-random generator. LNCS 1998, vol. 1462:304-317. Springer, Berlin.
-
(1998)
LNCS
, vol.1462
, pp. 304-317
-
-
Patel, S.1
Sundaram, G.S.2
-
360
-
-
0020748803
-
15, 16) Reed-Muller code is at least 16276
-
see also the correction in IEEE Trans Inform Theory 36 (1990), 443
-
15, 16) Reed-Muller code is at least 16276. IEEE Trans Inform Theory 1983, 29:354-356. see also the correction in IEEE Trans Inform Theory 36 (1990), 443.
-
(1983)
IEEE Trans Inform Theory
, vol.29
, pp. 354-356
-
-
Patterson, N.J.1
Wiedemann, D.H.2
-
361
-
-
84958958752
-
Correlation atttacks on stream ciphers: computing low-weight parity checks based on error-correcting codes
-
Springer, Berlin, Fast software encryption-Cambridge 1996
-
Penzhorn W.T. Correlation atttacks on stream ciphers: computing low-weight parity checks based on error-correcting codes. LNCS 1997, vol. 1039:159-172. Springer, Berlin.
-
(1997)
LNCS
, vol.1039
, pp. 159-172
-
-
Penzhorn, W.T.1
-
362
-
-
0039783282
-
Simultaneous security of bits in the discrete log
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '85
-
Peralta R. Simultaneous security of bits in the discrete log. LNCS 1986, vol. 219:62-72. Springer, Berlin.
-
(1986)
LNCS
, vol.219
, pp. 62-72
-
-
Peralta, R.1
-
363
-
-
84940007880
-
Nonlinearity of exponent permutations
-
Springer, Berlin, Adv. in crypt.-Eurocrypt' 89
-
Pieprzyk J.P. Nonlinearity of exponent permutations. LNCS 1990, vol. 434:80-92. Springer, Berlin.
-
(1990)
LNCS
, vol.434
, pp. 80-92
-
-
Pieprzyk, J.P.1
-
364
-
-
33947148341
-
On bent permutations
-
Marcel Decker, New York, G.L. Mullen, P.J.-S. Shiue (Eds.)
-
Pieprzyk J.P. On bent permutations. Finite Fields, Coding Theory and Adv. in Communications and Computing 1993, vol. 141:173-181. Marcel Decker, New York. G.L. Mullen, P.J.-S. Shiue (Eds.).
-
(1993)
Finite Fields, Coding Theory and Adv. in Communications and Computing
, vol.141
, pp. 173-181
-
-
Pieprzyk, J.P.1
-
366
-
-
50249129426
-
Block ciphers: security proofs, cryptanalysis, design, and fault attacks.
-
Ph.D. thesis. Université Catholique de Louvain
-
Piret G-F. Block ciphers: security proofs, cryptanalysis, design, and fault attacks. Ph.D. thesis. Université Catholique de Louvain, 2005.
-
(2005)
-
-
Piret, G-F.1
-
367
-
-
85014230989
-
Fourier analysis of Boolean maps-a tutorial
-
Pommerening K. Fourier analysis of Boolean maps-a tutorial, manuscript, 2005 (available at: ). http://www.staff.uni-mainz.de/pommeren/Kryptologie/Bitblock/A_Nonlin/Fourier.pdf.
-
(2005)
manuscript
-
-
Pommerening, K.1
-
368
-
-
0003746279
-
Analysis and design of cryptographic hash functions.
-
Ph.D. thesis. Katholieke Universiteit Leuven, Belgium
-
Preneel B. Analysis and design of cryptographic hash functions. Ph.D. thesis. Katholieke Universiteit Leuven, Belgium; 1993.
-
(1993)
-
-
Preneel, B.1
-
369
-
-
84942067337
-
Final report of European project IST-1999 12324
-
New European Schemes for Signatures, Integrity, and Encryption
-
Preneel B, Biryukov A, de Cannière C, Örs SB, Oswald E, van Rompay B et al. Final report of European project IST-1999 12324. New European Schemes for Signatures, Integrity, and Encryption, . https://www.cosic.esat.kuleuven.be/nessie/.
-
-
-
Preneel, B.1
Biryukov, A.2
de Cannière, C.3
Örs, S.B.4
Oswald, E.5
van Rompay, B.6
-
370
-
-
0000233904
-
Boolean functions satisfying higher order propagation criteria
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '91
-
Preneel B., Govaerts R., Vandewalle J. Boolean functions satisfying higher order propagation criteria. LNCS 1992, vol. 547:141-152. Springer, Berlin.
-
(1992)
LNCS
, vol.547
, pp. 141-152
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
371
-
-
84955621100
-
Propagation characteristics of Boolean functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '90
-
Preneel B., Van Leekwijck W., Van Linden L., Govaerts R., Vandewalle J. Propagation characteristics of Boolean functions. LNCS 1991, vol. 473:161-173. Springer, Berlin.
-
(1991)
LNCS
, vol.473
, pp. 161-173
-
-
Preneel, B.1
Van Leekwijck, W.2
Van Linden, L.3
Govaerts, R.4
Vandewalle, J.5
-
373
-
-
84885903924
-
On the symmetric property of homogeneous Boolean functions
-
Springer, Berlin, Proc. Australian conference on information security and privacy 1999
-
Qu C., Seberry J., Pieprzyk J.P. On the symmetric property of homogeneous Boolean functions. LNCS 1999, vol. 1587:26-35. Springer, Berlin.
-
(1999)
LNCS
, vol.1587
, pp. 26-35
-
-
Qu, C.1
Seberry, J.2
Pieprzyk, J.P.3
-
375
-
-
0348091086
-
De Bruijn sequences-a model example of the interaction of discrete mathematics and computer science
-
Ralston A. De Bruijn sequences-a model example of the interaction of discrete mathematics and computer science. Math Mag 1982, 55:131-143.
-
(1982)
Math Mag
, vol.55
, pp. 131-143
-
-
Ralston, A.1
-
376
-
-
0000580915
-
Factorial experiments derivable from combinatorial arrangements of arrays
-
Rao C.R. Factorial experiments derivable from combinatorial arrangements of arrays. J Roy Statist Soc 1947, 9:128-139.
-
(1947)
J Roy Statist Soc
, vol.9
, pp. 128-139
-
-
Rao, C.R.1
-
378
-
-
84948990100
-
The RC5 encryption algorithm
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Rivest R.L. The RC5 encryption algorithm. LNCS 1995, vol. 1008:86-96. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 86-96
-
-
Rivest, R.L.1
-
379
-
-
84885958535
-
Block encryption algorithm with data dependent rotation.
-
US patent #5, 724, 428, issued on March 3
-
Rivest RL. Block encryption algorithm with data dependent rotation. US patent #5, 724, 428, issued on March 3, 1998.
-
(1998)
-
-
Rivest, R.L.1
-
380
-
-
0043126255
-
A method for obtaining digital signatures and public-key cryptosystems.
-
MIT Memo MIT/LCS/TM-82
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. MIT Memo MIT/LCS/TM-82; 1977.
-
(1977)
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
381
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm ACM 1978, 21:120-126.
-
(1978)
Comm ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
382
-
-
18444411945
-
Sur la non-linéarité des fonctions booléennes
-
Rodier F. Sur la non-linéarité des fonctions booléennes. Acta Arithmetica 2004, 115:1-22.
-
(2004)
Acta Arithmetica
, vol.115
, pp. 1-22
-
-
Rodier, F.1
-
383
-
-
33744764086
-
Asymptotic nonlinearity of Boolean functions.
-
Coding and cryptography-WCC 2003, INRIA
-
Rodier F. Asymptotic nonlinearity of Boolean functions. Coding and cryptography-WCC 2003, INRIA, p. 397-405.
-
-
-
Rodier, F.1
-
385
-
-
47849098280
-
On bent functions
-
Rothaus O.S. On bent functions. J Combin Theory A 1976, 20:300-305.
-
(1976)
J Combin Theory A
, vol.20
, pp. 300-305
-
-
Rothaus, O.S.1
-
387
-
-
84947952147
-
Correlation immunity and the summation generator
-
Springer, Berlin, Adv. in crypt.-Crypto '85
-
Rueppel R.A. Correlation immunity and the summation generator. LNCS 1986, vol. 218:260-272. Springer, Berlin.
-
(1986)
LNCS
, vol.218
, pp. 260-272
-
-
Rueppel, R.A.1
-
390
-
-
0023213033
-
Products of linear recurring sequences with maximum complexity
-
Rueppel R.A., Staffelbach O.J. Products of linear recurring sequences with maximum complexity. IEEE Trans Inform Theory 1987, 33:124-131.
-
(1987)
IEEE Trans Inform Theory
, vol.33
, pp. 124-131
-
-
Rueppel, R.A.1
Staffelbach, O.J.2
-
391
-
-
0033299654
-
An efficient algorithm for generating necklaces with fixed density
-
Ruskey F., Sawada J. An efficient algorithm for generating necklaces with fixed density. SIAM J Comput 1999, 29:671-684.
-
(1999)
SIAM J Comput
, vol.29
, pp. 671-684
-
-
Ruskey, F.1
Sawada, J.2
-
392
-
-
84942057137
-
Cryptological viewpoint of Boolean functions.
-
Ph.D. thesis. The Middle East Technical University
-
Sağdic{ogonek}oğlu S. Cryptological viewpoint of Boolean functions. Ph.D. thesis. The Middle East Technical University; 2003.
-
(2003)
-
-
Sağdicoğlu, S.1
-
393
-
-
84942066410
-
Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers.
-
Department of Computer Science
-
Sakthivel G. Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers. Master's project report, Rochester Institute of Technology, Department of Computer Science; 2005.
-
(2005)
Master's project report, Rochester Institute of Technology
-
-
Sakthivel, G.1
-
394
-
-
0033723269
-
A note on the spectral characterization of Boolean functions
-
Sarkar P. A note on the spectral characterization of Boolean functions. Inform Process Lett 2000, 74:191-195.
-
(2000)
Inform Process Lett
, vol.74
, pp. 191-195
-
-
Sarkar, P.1
-
395
-
-
84969396978
-
Nonlinearity bounds and constructions of resilient Boolean functions
-
Springer, Berlin, Adv. in crypt.-Crypto 2000
-
Sarkar P., Maitra S. Nonlinearity bounds and constructions of resilient Boolean functions. LNCS 2000, vol. 1880:515-532. Springer, Berlin.
-
(2000)
LNCS
, vol.1880
, pp. 515-532
-
-
Sarkar, P.1
Maitra, S.2
-
396
-
-
84948968383
-
Construction of nonlinear Boolean functions with important cryptographic properties
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
-
Sarkar P., Maitra S. Construction of nonlinear Boolean functions with important cryptographic properties. LNCS 2000, vol. 1807:485-506. Springer, Berlin.
-
(2000)
LNCS
, vol.1807
, pp. 485-506
-
-
Sarkar, P.1
Maitra, S.2
-
397
-
-
0036005143
-
Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes
-
Sarkar P., Maitra S. Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes. Theory Comput Syst 2002, 35:39-57.
-
(2002)
Theory Comput Syst
, vol.35
, pp. 39-57
-
-
Sarkar, P.1
Maitra, S.2
-
398
-
-
4544354899
-
Construction of nonlinear resilient Boolean functions using 'small' affine functions
-
Sarkar P., Maitra S. Construction of nonlinear resilient Boolean functions using 'small' affine functions. IEEE Trans Inform Theory 2004, 50:2185-2193.
-
(2004)
IEEE Trans Inform Theory
, vol.50
, pp. 2185-2193
-
-
Sarkar, P.1
Maitra, S.2
-
399
-
-
84870532725
-
The Advanced Encryption Standard (Rijndael)
-
Savard J. The Advanced Encryption Standard (Rijndael), . http://www.quadibloc.com/crypto/co040401.htm.
-
-
-
Savard, J.1
-
400
-
-
37749041414
-
On the bent Boolean functions that are symmetric
-
Savicky P. On the bent Boolean functions that are symmetric. European J Combin 1994, 15:407-410.
-
(1994)
European J Combin
, vol.15
, pp. 407-410
-
-
Savicky, P.1
-
402
-
-
84949206970
-
A note on the construction and upper bounds of correlation-immune functions
-
Springer, Berlin, Cryptography and coding 6th IMA conference
-
Schneider M. A note on the construction and upper bounds of correlation-immune functions. LNCS 1997, vol. 1355:295-306. Springer, Berlin.
-
(1997)
LNCS
, vol.1355
, pp. 295-306
-
-
Schneider, M.1
-
403
-
-
85014196253
-
On the construction and upper bounds of balanced and correlation-immune functions
-
Schneider M. On the construction and upper bounds of balanced and correlation-immune functions. Selected Areas Crypt 1997, 73-87.
-
(1997)
Selected Areas Crypt
, pp. 73-87
-
-
Schneider, M.1
-
406
-
-
1642263842
-
Construction of cubic homogeneous Boolean bent functions
-
Seberry J., Xia T., Pieprzyk J.P. Construction of cubic homogeneous Boolean bent functions. Australas J Combin 2000, 22:233-245.
-
(2000)
Australas J Combin
, vol.22
, pp. 233-245
-
-
Seberry, J.1
Xia, T.2
Pieprzyk, J.P.3
-
407
-
-
85028888814
-
Highly nonlinear 0-1 balanced Boolean functions satisfying strict avalanche criterion
-
Springer, Berlin, Adv. in crypt.-Auscrypt '92
-
Seberry J., Zhang X.-M. Highly nonlinear 0-1 balanced Boolean functions satisfying strict avalanche criterion. LNCS 1993, vol. 718:145-155. Springer, Berlin.
-
(1993)
LNCS
, vol.718
, pp. 145-155
-
-
Seberry, J.1
Zhang, X.-M.2
-
408
-
-
85007446434
-
On construction and nonlinearity of correlation immune functions
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Seberry J., Zhang X.-M., Zheng Y. On construction and nonlinearity of correlation immune functions. LNCS 1994, vol. 765:181-199. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 181-199
-
-
Seberry, J.1
Zhang, X.-M.2
Zheng, Y.3
-
409
-
-
0028768217
-
Improving the strict avalanche characteristics of cryptographic functions
-
Seberry J., Zhang X.-M., Zheng Y. Improving the strict avalanche characteristics of cryptographic functions. Inform Process Lett 1994, 50:37-41.
-
(1994)
Inform Process Lett
, vol.50
, pp. 37-41
-
-
Seberry, J.1
Zhang, X.-M.2
Zheng, Y.3
-
410
-
-
84961389779
-
Nonlinearly balanced functions and their propagation characteristics
-
Springer, Berlin, Adv. in crypt.-Crypto '93
-
Seberry J., Zhang X.-M., Zheng Y. Nonlinearly balanced functions and their propagation characteristics. LNCS 1994, vol. 773:49-60. Springer, Berlin.
-
(1994)
LNCS
, vol.773
, pp. 49-60
-
-
Seberry, J.1
Zhang, X.-M.2
Zheng, Y.3
-
411
-
-
84948966990
-
Relationships among nonlinearity criteria
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '94
-
Seberry J., Zhang X.-M., Zheng Y. Relationships among nonlinearity criteria. LNCS 1995, vol. 950:389-398. Springer, Berlin.
-
(1995)
LNCS
, vol.950
, pp. 389-398
-
-
Seberry, J.1
Zhang, X.-M.2
Zheng, Y.3
-
412
-
-
0012473975
-
Nonlinearity and propagation characteristics of balanced Boolean functions
-
Seberry J., Zhang X.-M., Zheng Y. Nonlinearity and propagation characteristics of balanced Boolean functions. Inform Comput 1995, 119:1-13.
-
(1995)
Inform Comput
, vol.119
, pp. 1-13
-
-
Seberry, J.1
Zhang, X.-M.2
Zheng, Y.3
-
413
-
-
47649128017
-
Algebraic attacks from a Gröbner basis perspective.
-
Technische Universiteit Eindhoven, Netherlands
-
Segers AJM. Algebraic attacks from a Gröbner basis perspective. Master's Thesis. Technische Universiteit Eindhoven, Netherlands; 2004.
-
(2004)
Master's Thesis
-
-
Segers, A.J.M.1
-
414
-
-
0039980708
-
-
Dept. of Math., University of Bergen, Bergen, Norway
-
Selmer E.S. Linear recurrence relations over finite fields, 1965 Cambridge University lecture notes 1966, Dept. of Math., University of Bergen, Bergen, Norway.
-
(1966)
Linear recurrence relations over finite fields, 1965 Cambridge University lecture notes
-
-
Selmer, E.S.1
-
415
-
-
84955616491
-
From the memoirs of a Norwegian cryptologist
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '93
-
Selmer E.S. From the memoirs of a Norwegian cryptologist. LNCS 1994, vol. 765:142-150. Springer, Berlin.
-
(1994)
LNCS
, vol.765
, pp. 142-150
-
-
Selmer, E.S.1
-
416
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
-
Shamir A., Patarin J., Courtois N., Klimov A. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. LNCS 2000, vol. 1807:392-407. Springer, Berlin.
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
417
-
-
84940644968
-
A mathematical theory of communication
-
623-56
-
Shannon C.E. A mathematical theory of communication. Bell System Tech J 1948, 27:379-423. 623-56.
-
(1948)
Bell System Tech J
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
418
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C.E. Communication theory of secrecy systems. Bell System Tech J 1949, 28:656-715.
-
(1949)
Bell System Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
419
-
-
0004112995
-
-
IEEE Press, NY, (with a profile of Shannon by Anthony Liversidge), N.J.A. Sloane, A.D. Wyner (Eds.)
-
Claude Elwood Shannon: collected papers 1993, IEEE Press, NY, (with a profile of Shannon by Anthony Liversidge). N.J.A. Sloane, A.D. Wyner (Eds.).
-
(1993)
Claude Elwood Shannon: collected papers
-
-
-
421
-
-
0009254836
-
The uniqueness of the L2 association scheme
-
Shrikhande S.S. The uniqueness of the L2 association scheme. Ann Math Statist 1959, 30:781-798.
-
(1959)
Ann Math Statist
, vol.30
, pp. 781-798
-
-
Shrikhande, S.S.1
-
422
-
-
0021489155
-
Correlation immunity of nonlinear combining functions for cryptographic applications
-
Siegenthaler T. Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans Inform Theory 1984, 30:776-780.
-
(1984)
IEEE Trans Inform Theory
, vol.30
, pp. 776-780
-
-
Siegenthaler, T.1
-
423
-
-
0021786321
-
Decrypting a class of stream ciphers using ciphertext only
-
Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans Comput 1985, 34:81-85.
-
(1985)
IEEE Trans Comput
, vol.34
, pp. 81-85
-
-
Siegenthaler, T.1
-
424
-
-
85034624593
-
Cryptanalysts representation of nonlinearly filtered ML sequences
-
Springer, Berlin, Adv. in crypt.-Eurocrypt '85
-
Siegenthaler T. Cryptanalysts representation of nonlinearly filtered ML sequences. LNCS 1986, vol. 219:103-110. Springer, Berlin.
-
(1986)
LNCS
, vol.219
, pp. 103-110
-
-
Siegenthaler, T.1
-
425
-
-
84934224163
-
Design of combiners to prevent divide and conquer attacks
-
Springer, Berlin, Adv. in crypt.-Crypto '85
-
Siegenthaler T. Design of combiners to prevent divide and conquer attacks. LNCS 1986, vol. 218:273-279. Springer, Berlin.
-
(1986)
LNCS
, vol.218
, pp. 273-279
-
-
Siegenthaler, T.1
-
426
-
-
0003626823
-
-
Computer Science Press, Rockville, MD
-
Simon M.K., Omura J.K., Scholtz R.A., Levitt B.K. Spread spectrum communications 1985, vol. 1. Computer Science Press, Rockville, MD.
-
(1985)
Spread spectrum communications
, vol.1
-
-
Simon, M.K.1
Omura, J.K.2
Scholtz, R.A.3
Levitt, B.K.4
-
428
-
-
84956857565
-
A probabilistic correlation attack on the shrinking generator
-
Springer, Berlin, Information security and privacy 1998
-
Simpson L., Golić J., Dawson E. A probabilistic correlation attack on the shrinking generator. LNCS 1998, vol. 1438:147-158. Springer, Berlin.
-
(1998)
LNCS
, vol.1438
, pp. 147-158
-
-
Simpson, L.1
Golić, J.2
Dawson, E.3
-
429
-
-
0033617060
-
A fast correlation attack on multiplexer generators
-
Simpson L., Golić J., Salmasizadeh M., Dawson E. A fast correlation attack on multiplexer generators. Inform Process Lett 1999, 70:89-93.
-
(1999)
Inform Process Lett
, vol.70
, pp. 89-93
-
-
Simpson, L.1
Golić, J.2
Salmasizadeh, M.3
Dawson, E.4
-
431
-
-
17444428523
-
On single-deletion-correcting codes
-
de Gruyter, K.T. Arasu, Á. Seress (Eds.)
-
Sloane N.J.A. On single-deletion-correcting codes. Codes and designs-Ray-Chaudhuri festschrift 2002, 273-292. de Gruyter. K.T. Arasu, Á. Seress (Eds.).
-
(2002)
Codes and designs-Ray-Chaudhuri festschrift
, pp. 273-292
-
-
Sloane, N.J.A.1
-
432
-
-
0242404240
-
Further observations on the structure of the AES algorithm
-
Springer, Berlin, Fast software encryption-Lund, Sweden 2003
-
Song B., Seberry J. Further observations on the structure of the AES algorithm. LNCS 2003, vol. 2887:223-234. Springer, Berlin.
-
(2003)
LNCS
, vol.2887
, pp. 223-234
-
-
Song, B.1
Seberry, J.2
-
434
-
-
33750682172
-
Chromos, Boolean functions and avalanche characteristics.
-
Ph.D. thesis. State University of New York at Buffalo
-
Stănică P. Chromos, Boolean functions and avalanche characteristics. Ph.D. thesis. State University of New York at Buffalo; 1998.
-
(1998)
-
-
Stănică, P.1
-
435
-
-
31244437333
-
Nonlinearity, local and global avalanche characteristics of balanced Boolean functions
-
Stănică P. Nonlinearity, local and global avalanche characteristics of balanced Boolean functions. Discrete Math 2002, 248:181-193.
-
(2002)
Discrete Math
, vol.248
, pp. 181-193
-
-
Stănică, P.1
-
436
-
-
84942019634
-
Graph eigenvalues and Walsh spectrum of Boolean functions.
-
celebration of the 70th birthday of Ron Graham, Carrollton, Georgia, 431-42. (Appeared also in Integers-J. Combinatorial Number Theory 7(2), Art. 32)
-
Stănică P. Graph eigenvalues and Walsh spectrum of Boolean functions. In: Combinatorial number theory, de Gruyter. In: Proc. of the 'Integers Conference 2005' in celebration of the 70th birthday of Ron Graham, Carrollton, Georgia, 431-42. (Appeared also in Integers-J. Combinatorial Number Theory 7(2), Art. 32).
-
Combinatorial number theory, de Gruyter. In: Proc. of the 'Integers Conference 2005'
-
-
Stănică, P.1
-
437
-
-
77950596474
-
On the nonexistence of homogeneous rotation symmetric bent Boolean functions of degree greater than two.
-
Stănică P. On the nonexistence of homogeneous rotation symmetric bent Boolean functions of degree greater than two. In: Proceedings of NATO adv. stud. instit.-Boolean functions; 2008. p. 214-8.
-
(2008)
Proceedings of NATO adv. stud. instit.-Boolean functions
, pp. 214-218
-
-
Stănică, P.1
-
438
-
-
0242607933
-
A constructive count of rotation symmetric functions
-
Stănică P., Maitra S. A constructive count of rotation symmetric functions. Inform Process Lett 2003, 88:299-304.
-
(2003)
Inform Process Lett
, vol.88
, pp. 299-304
-
-
Stănică, P.1
Maitra, S.2
-
439
-
-
45849113318
-
Rotation symmetric Boolean functions-count and cryptographic properties
-
preliminary version appeared in Electronic Notes in Discrete Math 15 (2003), 141-7
-
Stănică P., Maitra S. Rotation symmetric Boolean functions-count and cryptographic properties. Discrete Appl Math 2008, 156:1567-1580. preliminary version appeared in Electronic Notes in Discrete Math 15 (2003), 141-7.
-
(2008)
Discrete Appl Math
, vol.156
, pp. 1567-1580
-
-
Stănică, P.1
Maitra, S.2
-
440
-
-
21144456779
-
Results on rotation symmetric bent and correlation immune Boolean functions
-
Springer, Berlin, Fast software encryption-Delhi 2004
-
Stănică P., Maitra S., Clark J. Results on rotation symmetric bent and correlation immune Boolean functions. LNCS 2004, vol. 3017:161-177. Springer, Berlin.
-
(2004)
LNCS
, vol.3017
, pp. 161-177
-
-
Stănică, P.1
Maitra, S.2
Clark, J.3
-
441
-
-
0035882585
-
Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics
-
Stănică P., Sung S.H. Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics. Inform Process Lett 2001, 79:167-172.
-
(2001)
Inform Process Lett
, vol.79
, pp. 167-172
-
-
Stănică, P.1
Sung, S.H.2
-
442
-
-
10744223368
-
Boolean functions with five controllable cryptographic properties
-
Stănică P., Sung S.H. Boolean functions with five controllable cryptographic properties. Des Codes Cryptogr 2004, 31:147-157.
-
(2004)
Des Codes Cryptogr
, vol.31
, pp. 147-157
-
-
Stănică, P.1
Sung, S.H.2
-
443
-
-
84942033673
-
-
Gröbner basis timings page
-
Steel A. Gröbner basis timings page, ; 2004. http://magma.maths.usyd.edu.au/users/allan/gb.
-
(2004)
-
-
Steel, A.1
-
444
-
-
0000371364
-
Resilient functions and large sets of orthogonal arrays
-
Stinson D.R. Resilient functions and large sets of orthogonal arrays. Congr Numer 1993, 92:105-110.
-
(1993)
Congr Numer
, vol.92
, pp. 105-110
-
-
Stinson, D.R.1
-
446
-
-
34250487811
-
Gaussian elimination is not optimal
-
Strassen V. Gaussian elimination is not optimal. Numer Math 1969, 13:354-356.
-
(1969)
Numer Math
, vol.13
, pp. 354-356
-
-
Strassen, V.1
-
447
-
-
84947755706
-
On resilient Boolean functions with maximal possible nonlinearity
-
Springer, Berlin, Indocrypt 2000
-
Tarannikov Y. On resilient Boolean functions with maximal possible nonlinearity. LNCS 2000, vol. 1977:19-30. Springer, Berlin.
-
(2000)
LNCS
, vol.1977
, pp. 19-30
-
-
Tarannikov, Y.1
-
448
-
-
84888076142
-
Spectral analysis of high order correlation immune functions
-
preprint 2000
-
Tarannikov Y. Spectral analysis of high order correlation immune functions, preprint 2000.
-
-
-
Tarannikov, Y.1
-
449
-
-
84958968845
-
New constructions of resilient Boolean functions with maximal nonlinearity
-
Springer, Berlin, Fast software encryption-Yokohama 2001
-
Tarannikov Y. New constructions of resilient Boolean functions with maximal nonlinearity. LNCS 2002, vol. 2355:66-77. Springer, Berlin.
-
(2002)
LNCS
, vol.2355
, pp. 66-77
-
-
Tarannikov, Y.1
-
450
-
-
1642349094
-
Autocorrelation coefficients and correlation immunity of Boolean functions
-
Springer, Berlin, Adv. in crypt.-Asiacrypt 2001
-
Tarannikov Y., Korolev P., Botev A. Autocorrelation coefficients and correlation immunity of Boolean functions. LNCS 2001, vol. 2248:460-479. Springer, Berlin.
-
(2001)
LNCS
, vol.2248
, pp. 460-479
-
-
Tarannikov, Y.1
Korolev, P.2
Botev, A.3
-
451
-
-
84900988686
-
Looking inside AES and BES
-
Kluwer, USA, J.-J. Levy, E.W. Mayr, J.C. Mitchell (Eds.) Exploring new frontiers of theoretical informatics
-
Toli I., Zanoni A. Looking inside AES and BES. Proc. 18th IFIP world computer congress (TCS 2004) 2004, 23-36. Kluwer, USA. J.-J. Levy, E.W. Mayr, J.C. Mitchell (Eds.).
-
(2004)
Proc. 18th IFIP world computer congress (TCS 2004)
, pp. 23-36
-
-
Toli, I.1
Zanoni, A.2
-
452
-
-
84942032408
-
Select Committee on Intelligence.
-
involvement of NSA in the development of the data encryption standard
-
U.S. Senate, Select Committee on Intelligence. Unclassified summary: involvement of NSA in the development of the data encryption standard; 1978.
-
(1978)
Unclassified summary:
-
-
Senate, U.S.1
-
453
-
-
84948973102
-
On the need for multipermutations: cryptanalysis of MD4 and SAFER
-
Springer, Berlin, Fast software encryption-Leuven 1994
-
Vaudenay S. On the need for multipermutations: cryptanalysis of MD4 and SAFER. LNCS 1995, vol. 1008:286-297. Springer, Berlin.
-
(1995)
LNCS
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
454
-
-
0021901103
-
Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly random sources.
-
17th symposium on theory of computing
-
Vazirani UV. Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly random sources. In: Proc. 17th symposium on theory of computing; 1985. p. 366-78.
-
(1985)
Proc.
, pp. 366-378
-
-
Vazirani, U.V.1
-
455
-
-
0021548502
-
Efficient and secure pseudo-random number generation.
-
25th IEEE symposium on foundations of computer science
-
Vazirani UV, Vazirani VV. Efficient and secure pseudo-random number generation. In: Proc. 25th IEEE symposium on foundations of computer science; 1984. p. 458-63.
-
(1984)
Proc.
, pp. 458-463
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
456
-
-
85034622087
-
Efficient and secure pseudo-random number generation
-
Springer, Berlin, Adv. in crypt.-Crypto '84
-
Vazirani U.V., Vazirani V.V. Efficient and secure pseudo-random number generation. LNCS 1985, vol. 196:193-202. Springer, Berlin.
-
(1985)
LNCS
, vol.196
, pp. 193-202
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
457
-
-
85020573990
-
On the design of S-boxes
-
Springer, Berlin, Adv. in crypt.-Crypto '85
-
Webster A.F., Tavares S.E. On the design of S-boxes. LNCS 1986, vol. 218:523-534. Springer, Berlin.
-
(1986)
LNCS
, vol.218
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
-
458
-
-
84942068348
-
Evaluating algebraic attacks on the AES.
-
Diplomarbeit, Darmstadt University, Germany
-
Weinmann R-P. Evaluating algebraic attacks on the AES. Diplomarbeit, Darmstadt University, Germany; 2004.
-
(2004)
-
-
Weinmann, R-P.1
-
460
-
-
1842531284
-
Efficient DES key search.
-
(School of Computer Science, Carleton University, Ottawa, Canada), May 1994. Presented at the Rump Session of Crypto' 93
-
Wiener MJ. Efficient DES key search. Technical report TR-244 (School of Computer Science, Carleton University, Ottawa, Canada), May 1994. Presented at the Rump Session of Crypto' 93.
-
Technical report TR-244
-
-
Wiener, M.J.1
-
461
-
-
0003030518
-
Efficient DES key search-an update
-
Wiener M.J. Efficient DES key search-an update. CryptoBytes 1998, 3(2):6-8.
-
(1998)
CryptoBytes
, vol.3
, Issue.2
, pp. 6-8
-
-
Wiener, M.J.1
-
462
-
-
85014160597
-
-
Wikipedia. http://en_wikipedia.org/wiki/Data_Encryption_Standard.
-
-
-
-
463
-
-
85014136255
-
-
Wikipedia. http://enwikipedia.org/wiki/Linearfeedbackshiftregister.
-
-
-
-
464
-
-
84963063024
-
The eigenvalues of a graph and its chromatic number
-
Wilf H.S. The eigenvalues of a graph and its chromatic number. J London Math Soc 1967, 42:330-332.
-
(1967)
J London Math Soc
, vol.42
, pp. 330-332
-
-
Wilf, H.S.1
-
465
-
-
3142537092
-
Homogeneous bent functions of degree n in 2n variables do not exist for n>3
-
Xia T., Seberry J., Pieprzyk J.P., Charnes C. Homogeneous bent functions of degree n in 2n variables do not exist for n>3. Discrete Appl Math 2004, 142:127-132.
-
(2004)
Discrete Appl Math
, vol.142
, pp. 127-132
-
-
Xia, T.1
Seberry, J.2
Pieprzyk, J.P.3
Charnes, C.4
-
467
-
-
0024001951
-
A spectral characterization of correlation-immune combining functions
-
Xiao G.-Z., Massey J.L. A spectral characterization of correlation-immune combining functions. IEEE Trans Inform Theory 1988, 34:569-571.
-
(1988)
IEEE Trans Inform Theory
, vol.34
, pp. 569-571
-
-
Xiao, G.-Z.1
Massey, J.L.2
-
468
-
-
0008436928
-
Further enumerating Boolean functions of cryptographic significance
-
Yang Y.X., Guo B. Further enumerating Boolean functions of cryptographic significance. J Cryptology 1995, 8:115-122.
-
(1995)
J Cryptology
, vol.8
, pp. 115-122
-
-
Yang, Y.X.1
Guo, B.2
-
469
-
-
0020301290
-
Theory and applications of trapdoor functions.
-
23rd IEEE symposium on foundations of computer science
-
Yao A. Theory and applications of trapdoor functions. In: Proc. 23rd IEEE symposium on foundations of computer science; 1982. p. 80-91.
-
(1982)
Proc.
, pp. 80-91
-
-
Yao, A.1
-
470
-
-
0008959743
-
A note on the eigenvectors of Hadamard matrices of order 2n
-
Yarlagadda R., Hershey J.E. A note on the eigenvectors of Hadamard matrices of order 2n. Linear Algebra & Appl 1982, 45:43-53.
-
(1982)
Linear Algebra & Appl
, vol.45
, pp. 43-53
-
-
Yarlagadda, R.1
Hershey, J.E.2
-
471
-
-
0024620268
-
Analysis and synthesis of bent sequences
-
Yarlagadda R., Hershey J.E. Analysis and synthesis of bent sequences. IEE Proc E 1989, 136:112-123.
-
(1989)
IEE Proc E
, vol.136
, pp. 112-123
-
-
Yarlagadda, R.1
Hershey, J.E.2
-
473
-
-
0030577335
-
Comment on Bounds on the number of functions satisfying the strict avalanche criterion (1996)
-
Youssef A.M., Tavares S.E. Comment on Bounds on the number of functions satisfying the strict avalanche criterion (1996). Inform Process Lett 1996, 60:271-275.
-
(1996)
Inform Process Lett
, vol.60
, pp. 271-275
-
-
Youssef, A.M.1
Tavares, S.E.2
-
474
-
-
33746913093
-
Constructions of quadratic bent functions in polynomial forms
-
Yu N.Y., Gong G. Constructions of quadratic bent functions in polynomial forms. IEEE Trans Inform Theory 2006, 52:3291-3299.
-
(2006)
IEEE Trans Inform Theory
, vol.52
, pp. 3291-3299
-
-
Yu, N.Y.1
Gong, G.2
-
475
-
-
85031821528
-
On the linear syndrome method in cryptanalysis
-
Springer, Berlin, Adv. in crypt.-Crypto '88
-
Zeng K., Huang M. On the linear syndrome method in cryptanalysis. LNCS 1990, vol. 403:469-478. Springer, Berlin.
-
(1990)
LNCS
, vol.403
, pp. 469-478
-
-
Zeng, K.1
Huang, M.2
-
476
-
-
0346602660
-
On the linear consistency test (LCT) in cryptanalysis with applications
-
Springer, Berlin, Adv. in crypt.-Crypto '89
-
Zeng K., Yang C.H., Rao T.R.N. On the linear consistency test (LCT) in cryptanalysis with applications. LNCS 1990, vol. 435:164-174. Springer, Berlin.
-
(1990)
LNCS
, vol.435
, pp. 164-174
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
-
477
-
-
84955610054
-
An improved linear syndrome algorithm in cryptanalysis with applications
-
Springer, Berlin, Adv. in crypt.-Crypto '90
-
Zeng K., Yang C.H., Rao T.R.N. An improved linear syndrome algorithm in cryptanalysis with applications. LNCS 1991, vol. 537:34-47. Springer, Berlin.
-
(1991)
LNCS
, vol.537
, pp. 34-47
-
-
Zeng, K.1
Yang, C.H.2
Rao, T.R.N.3
-
478
-
-
84958766851
-
Improved cryptanalysis of the self-shrinking generator
-
Springer, Berlin, Information security and privacy 2001
-
Zenner E., Krause M., Lucks S. Improved cryptanalysis of the self-shrinking generator. LNCS 2001, vol. 2119:21-35. Springer, Berlin.
-
(2001)
LNCS
, vol.2119
, pp. 21-35
-
-
Zenner, E.1
Krause, M.2
Lucks, S.3
-
479
-
-
0035964108
-
Enumeration of binary orthogonal arrays of strength 1
-
Zhang J.-Z., You Z.-S., Li Z.-L. Enumeration of binary orthogonal arrays of strength 1. Discrete Math 2001, 239:191-198.
-
(2001)
Discrete Math
, vol.239
, pp. 191-198
-
-
Zhang, J.-Z.1
You, Z.-S.2
Li, Z.-L.3
-
480
-
-
0031238366
-
Cryptographically resilient functions
-
Zhang X.-M., Zheng Y. Cryptographically resilient functions. IEEE Trans Inform Theory 1997, 43:1740-1747.
-
(1997)
IEEE Trans Inform Theory
, vol.43
, pp. 1740-1747
-
-
Zhang, X.-M.1
Zheng, Y.2
-
481
-
-
33748539035
-
On bent functions with some symmetric properties
-
Zhao Y., Li H. On bent functions with some symmetric properties. Discrete Appl Math 2006, 154:2537-2543.
-
(2006)
Discrete Appl Math
, vol.154
, pp. 2537-2543
-
-
Zhao, Y.1
Li, H.2
-
482
-
-
84949214198
-
Improved upper bound on the nonlinearity of high order correlation immune functions
-
Springer, Berlin, Selected areas crypt. 2000
-
Zheng Y., Zhang X.-M. Improved upper bound on the nonlinearity of high order correlation immune functions. LNCS 2001, vol. 2012:262-274. Springer, Berlin.
-
(2001)
LNCS
, vol.2012
, pp. 262-274
-
-
Zheng, Y.1
Zhang, X.-M.2
-
483
-
-
84959064917
-
New results on correlation immune functions
-
Springer, Berlin, Proc. 3rd inter. conf. on inform. security and cryptology 2000
-
Zheng Y., Zhang X.-M. New results on correlation immune functions. LNCS 2001, vol. 2015:49-63. Springer, Berlin.
-
(2001)
LNCS
, vol.2015
, pp. 49-63
-
-
Zheng, Y.1
Zhang, X.-M.2
-
484
-
-
84937399833
-
On relationships among avalanche, nonlinearity and correlation immunity
-
Springer, Berlin, Adv. in crypt.-Asiacrypt 2000
-
Zheng Y., Zhang X.-M. On relationships among avalanche, nonlinearity and correlation immunity. LNCS 2000, vol. 1976:470-482. Springer, Berlin.
-
(2000)
LNCS
, vol.1976
, pp. 470-482
-
-
Zheng, Y.1
Zhang, X.-M.2
-
486
-
-
0004905418
-
Restriction, terms and nonlinearity of Boolean functions
-
Zheng Y., Zhang X.-M., Imai H. Restriction, terms and nonlinearity of Boolean functions. Theoret Comput Sci 1999, 226:207-223.
-
(1999)
Theoret Comput Sci
, vol.226
, pp. 207-223
-
-
Zheng, Y.1
Zhang, X.-M.2
Imai, H.3
-
488
-
-
0001707701
-
Products of linear recurring sequences
-
Zierler N., Mills W.H. Products of linear recurring sequences. J Algebra 1973, 27:147-157.
-
(1973)
J Algebra
, vol.27
, pp. 147-157
-
-
Zierler, N.1
Mills, W.H.2
-
489
-
-
0026219481
-
An algorithm for the initial state reconstruction of the clock controlled shift register
-
Živković M. An algorithm for the initial state reconstruction of the clock controlled shift register. IEEE Trans Inform Theory 1991, 37:1488-1490.
-
(1991)
IEEE Trans Inform Theory
, vol.37
, pp. 1488-1490
-
-
Živković, M.1
|