메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-232

Cryptographic Boolean Functions and Applications

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84942052987     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-374890-4.X0001-8     Document Type: Book
Times cited : (296)

References (489)
  • 1
    • 0025530315 scopus 로고
    • The structured design of cryptographically good S-boxes
    • Adams C.M., Tavares S.E. The structured design of cryptographically good S-boxes. J Cryptology 1990, 3:27-41.
    • (1990) J Cryptology , vol.3 , pp. 27-41
    • Adams, C.M.1    Tavares, S.E.2
  • 2
    • 0025483056 scopus 로고
    • Generation and counting of bent sequences
    • Adams C.M., Tavares S.E. Generation and counting of bent sequences. IEEE Trans Inform Theory 1990, 5:1170-1173.
    • (1990) IEEE Trans Inform Theory , vol.5 , pp. 1170-1173
    • Adams, C.M.1    Tavares, S.E.2
  • 4
    • 84942059863 scopus 로고    scopus 로고
    • Federal Information Standard 197
    • Advanced Encryption Standard. Federal Information Standard 197, ; 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
    • (2001)
  • 5
    • 84942039336 scopus 로고    scopus 로고
    • Third conference, attendee feedback form
    • Advanced Encryption Standard. Third conference, attendee feedback form, . http://csrc.nist.gov/encryption/aes/round2/conf3/AES3FeedbackForm-summary.pdf.
  • 7
    • 0023985196 scopus 로고
    • RSA and Rabin functions: certain parts are as hard as the whole
    • Alexi W., Chor B., Goldreich O., Schnorr C. RSA and Rabin functions: certain parts are as hard as the whole. SIAM J Comput 1988, 17:194-209.
    • (1988) SIAM J Comput , vol.17 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.4
  • 8
    • 0000350565 scopus 로고
    • Solving a class of stream ciphers
    • Anderson R.J. Solving a class of stream ciphers. Cryptologia 1990, 14:285-288.
    • (1990) Cryptologia , vol.14 , pp. 285-288
    • Anderson, R.J.1
  • 9
    • 0027634906 scopus 로고
    • Faster attack on certain stream ciphers
    • Anderson R.J. Faster attack on certain stream ciphers. Electr Lett 1993, 29:1322-1323.
    • (1993) Electr Lett , vol.29 , pp. 1322-1323
    • Anderson, R.J.1
  • 10
    • 84948981360 scopus 로고
    • Searching for the optimum correlation attack
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Anderson R. Searching for the optimum correlation attack. LNCS 1995, vol. 1008:137-143. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 137-143
    • Anderson, R.1
  • 11
    • 84948965108 scopus 로고
    • On Fibonacci keystream generators
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Anderson R. On Fibonacci keystream generators. LNCS 1995, vol. 1008:346-352. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 346-352
    • Anderson, R.1
  • 12
    • 35048861887 scopus 로고    scopus 로고
    • Improving fast algebraic attacks
    • Springer, Berlin, Fast software encryption-Delhi 2004
    • Armknecht F. Improving fast algebraic attacks. LNCS 2004, vol. 3017:65-82. Springer, Berlin.
    • (2004) LNCS , vol.3017 , pp. 65-82
    • Armknecht, F.1
  • 13
    • 33746033761 scopus 로고    scopus 로고
    • Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2006
    • Armknecht F., Carlet C., Gaborit P., Kuenzli S., Meier W., Ruatta O. Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. LNCS 2006, vol. 4004:147-164. Springer, Berlin.
    • (2006) LNCS , vol.4004 , pp. 147-164
    • Armknecht, F.1    Carlet, C.2    Gaborit, P.3    Kuenzli, S.4    Meier, W.5    Ruatta, O.6
  • 16
    • 0025399181 scopus 로고
    • On the relevance of the strict avalanche criterion
    • Babbage S. On the relevance of the strict avalanche criterion. Electr Lett 1990, 26(7):461-462.
    • (1990) Electr Lett , vol.26 , Issue.7 , pp. 461-462
    • Babbage, S.1
  • 17
    • 0005314588 scopus 로고
    • Cryptographic hash functions: a survey
    • Preprint 95-9. Department of Computer Science, The University of Wollongong
    • Bakhtiari S, Safavi-Naini R, Pieprzyk JP. Cryptographic hash functions: a survey, Preprint 95-9. Department of Computer Science, The University of Wollongong; 1995.
    • (1995)
    • Bakhtiari, S.1    Safavi-Naini, R.2    Pieprzyk, J.P.3
  • 18
    • 85014258384 scopus 로고    scopus 로고
    • Results of an automated attack on the running key cipher
    • Bauer C., Gottlöb E.J. Results of an automated attack on the running key cipher. Cryptologia 2005, 29:248-254.
    • (2005) Cryptologia , vol.29 , pp. 248-254
    • Bauer, C.1    Gottlöb, E.J.2
  • 21
    • 84942065124 scopus 로고    scopus 로고
    • Introduction to modern cryptography (lecture notes)
    • Bellare M, Rogaway P. Introduction to modern cryptography (lecture notes), ; 2006. http://www-cse.ucsd.edu/users/mihir/cse207/classnotes.html.
    • (2006)
    • Bellare, M.1    Rogaway, P.2
  • 22
    • 84942028514 scopus 로고
    • SDP designs and their automorphism groups.
    • Ph.D. thesis. University of London
    • Bending TD. Bent functions, SDP designs and their automorphism groups. Ph.D. thesis. University of London; 1993.
    • (1993)
  • 23
    • 84950117252 scopus 로고
    • How to reduce your enemy's information
    • Springer, Berlin, Adv. in crypt.-Crypto '85
    • Bennett C.H., Brassard G., Robert J.-M. How to reduce your enemy's information. LNCS 1986, vol. 218:468-476. Springer, Berlin.
    • (1986) LNCS , vol.218 , pp. 468-476
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 25
    • 84944812247 scopus 로고
    • Factoring polynomials over finite fields
    • Berlekamp E.R. Factoring polynomials over finite fields. Bell System Tech J 1967, 1853-1859.
    • (1967) Bell System Tech J , pp. 1853-1859
    • Berlekamp, E.R.1
  • 27
    • 84968518238 scopus 로고
    • Factoring polynomials over large finite fields
    • Berlekamp E.R. Factoring polynomials over large finite fields. Math Comput 1970, 24:713-735.
    • (1970) Math Comput , vol.24 , pp. 713-735
    • Berlekamp, E.R.1
  • 28
    • 0033098490 scopus 로고    scopus 로고
    • Spectral analysis of Boolean functions as a graph eigenvalue problem
    • Bernasconi A., Codenotti B. Spectral analysis of Boolean functions as a graph eigenvalue problem. IEEE Trans Comput 1999, 48:345-351.
    • (1999) IEEE Trans Comput , vol.48 , pp. 345-351
    • Bernasconi, A.1    Codenotti, B.2
  • 29
    • 0006010820 scopus 로고    scopus 로고
    • On Boolean functions associated to bipartite Cayley graphs.
    • Workshop on Boolean problems, Freiberg
    • Bernasconi A, Codenotti B. On Boolean functions associated to bipartite Cayley graphs. In: Workshop on Boolean problems, Freiberg; 2000, p. 167-174.
    • (2000) , pp. 167-174
    • Bernasconi, A.1    Codenotti, B.2
  • 30
    • 0013362399 scopus 로고    scopus 로고
    • On the Fourier analysis of Boolean functions
    • preprint
    • Bernasconi A, Codenotti B, Simon J. On the Fourier analysis of Boolean functions, preprint, 1-24, ; 1996. http://www.imc.pi.cnr.it/~codenotti/ps_files/fourier.ps.
    • (1996) , pp. 1-24
    • Bernasconi, A.1    Codenotti, B.2    Simon, J.3
  • 31
    • 0035440605 scopus 로고    scopus 로고
    • A characterization of bent functions in terms of strongly regular graphs
    • Bernasconi A., Codenotti B., VanderKam J.M. A characterization of bent functions in terms of strongly regular graphs. IEEE Trans Comput 2001, 50:984-985.
    • (2001) IEEE Trans Comput , vol.50 , pp. 984-985
    • Bernasconi, A.1    Codenotti, B.2    VanderKam, J.M.3
  • 32
    • 85014292709 scopus 로고    scopus 로고
    • Which eSTREAM ciphers have been broken?
    • Bernstein DJ. Which eSTREAM ciphers have been broken? manuscript; 2008.
    • (2008) manuscript
    • Bernstein, D.J.1
  • 33
    • 85034420736 scopus 로고
    • The stop-and-go generator
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '84
    • Beth T., Piper F. The stop-and-go generator. LNCS 1985, vol. 209:88-92. Springer, Berlin.
    • (1985) LNCS , vol.209 , pp. 88-92
    • Beth, T.1    Piper, F.2
  • 34
    • 0009209328 scopus 로고
    • Untere Schranken für zwei diophantische Approximations-Funktionen
    • Betke U., Wills J.M. Untere Schranken für zwei diophantische Approximations-Funktionen. Monatsh Math 1972, 76:214-217.
    • (1972) Monatsh Math , vol.76 , pp. 214-217
    • Betke, U.1    Wills, J.M.2
  • 35
  • 36
    • 84957634424 scopus 로고    scopus 로고
    • Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '99
    • Biham E., Biryukov A., Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. LNCS 1999, vol. 1592:12-23. Springer, Berlin.
    • (1999) LNCS , vol.1592 , pp. 12-23
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 37
    • 84903595110 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Springer, Berlin, Adv. in crypt.-Crypto '90
    • Biham E., Shamir A. Differential cryptanalysis of DES-like cryptosystems. LNCS 1991, vol. 537:2-21. Springer, Berlin.
    • (1991) LNCS , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 39
    • 0041854886 scopus 로고    scopus 로고
    • A lower bound on the number of functions satisfying the strict avalanche criterion
    • Biss D.K. A lower bound on the number of functions satisfying the strict avalanche criterion. Discrete Math 1998, 185:29-39.
    • (1998) Discrete Math , vol.185 , pp. 29-39
    • Biss, D.K.1
  • 40
    • 85014218957 scopus 로고    scopus 로고
    • A suggestion for handling arbitrary-length messages with the CBC MAC
    • Black J, Rogaway P. A suggestion for handling arbitrary-length messages with the CBC MAC, Comments to NIST concerning AES modes of operation, . http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html.
    • Comments to NIST concerning AES modes of operation
    • Black, J.1    Rogaway, P.2
  • 41
    • 0033185033 scopus 로고    scopus 로고
    • The linear complexity of the self-shrinking generator
    • Blackburn S.R. The linear complexity of the self-shrinking generator. IEEE Trans Inform Theory 1999, 45:2073-2077.
    • (1999) IEEE Trans Inform Theory , vol.45 , pp. 2073-2077
    • Blackburn, S.R.1
  • 42
    • 84947928618 scopus 로고
    • Fish: a fast software stream cipher
    • Springer, Berlin, Fast software encryption-Cambridge 1993
    • Blöcher U., Dichtl M. Fish: a fast software stream cipher. LNCS 1994, vol. 809:41-44. Springer, Berlin.
    • (1994) LNCS , vol.809 , pp. 41-44
    • Blöcher, U.1    Dichtl, M.2
  • 43
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • Blum L., Blum M., Shub M. A simple unpredictable pseudo-random number generator. SIAM J Comput 1986, 15:364-383.
    • (1986) SIAM J Comput , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 44
    • 0020248370 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits.
    • 23rd IEEE symposium on foundations of computer science
    • Blum M, Micali S. How to generate cryptographically strong sequences of pseudo-random bits. In: Proc. 23rd IEEE symposium on foundations of computer science; 1982, p. 112-17.
    • (1982) Proc. , pp. 112-117
    • Blum, M.1    Micali, S.2
  • 45
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum M., Micali S. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J Comput 1984, 13:850-864.
    • (1984) SIAM J Comput , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 47
    • 33646836818 scopus 로고    scopus 로고
    • On the algebraic immunity of symmetric Boolean functions
    • Springer, Berlin, Indocrypt 2005
    • Braeken A., Preneel B. On the algebraic immunity of symmetric Boolean functions. LNCS 2005, vol. 3797:35-48. Springer, Berlin.
    • (2005) LNCS , vol.3797 , pp. 35-48
    • Braeken, A.1    Preneel, B.2
  • 48
    • 0346796759 scopus 로고
    • Cryptography, statistics and pseudo-randomness (part I)
    • Brands S., Gill R. Cryptography, statistics and pseudo-randomness (part I). Prob Math Stat 1995, 15:101-114.
    • (1995) Prob Math Stat , vol.15 , pp. 101-114
    • Brands, S.1    Gill, R.2
  • 51
    • 84942060594 scopus 로고    scopus 로고
    • Introduction to Groebner bases, logic of computation (Marktoberdorf, 1995)
    • Springer, Berlin
    • Buchberger B. Introduction to Groebner bases, logic of computation (Marktoberdorf, 1995). NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci. 1997, vol. 157:35-66. Springer, Berlin.
    • (1997) NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci. , vol.157 , pp. 35-66
    • Buchberger, B.1
  • 52
    • 34247391120 scopus 로고    scopus 로고
    • Random strongly regular graphs?
    • Elsevier, Amsterdam, J. Nesetril, M. Noy, O. Serra (Eds.)
    • Cameron P. Random strongly regular graphs?. Electronic Notes in Discrete Mathematics 2001, vol. 10. Elsevier, Amsterdam. J. Nesetril, M. Noy, O. Serra (Eds.).
    • (2001) Electronic Notes in Discrete Mathematics , vol.10
    • Cameron, P.1
  • 53
    • 85002229923 scopus 로고
    • On correlation-immune functions
    • Springer, Berlin, Adv. in crypt.-Crypto '91
    • Camion P., Carlet C., Charpin P., Sendrier N. On correlation-immune functions. LNCS 1992, vol. 576:86-100. Springer, Berlin.
    • (1992) LNCS , vol.576 , pp. 86-100
    • Camion, P.1    Carlet, C.2    Charpin, P.3    Sendrier, N.4
  • 54
    • 84962952893 scopus 로고
    • DES is not a group
    • Springer, Berlin, Adv. in crypt.-Crypto '92
    • Campbell K.W., Wiener M.J. DES is not a group. LNCS 1992, vol. 740:512-520. Springer, Berlin.
    • (1992) LNCS , vol.740 , pp. 512-520
    • Campbell, K.W.1    Wiener, M.J.2
  • 55
    • 27244440344 scopus 로고    scopus 로고
    • A very compact S-box for AES
    • Springer, Berlin, Workshop on cryptographic hardware and embedded systems (CHES2005)
    • Canright D. A very compact S-box for AES. LNCS 2005, vol. 3659:441-455. Springer, Berlin.
    • (2005) LNCS , vol.3659 , pp. 441-455
    • Canright, D.1
  • 57
    • 33746667828 scopus 로고    scopus 로고
    • Open problems related to algebraic attacks on stream ciphers
    • Springer, Berlin, Coding and cryptography-WCC 2005
    • Canteaut A. Open problems related to algebraic attacks on stream ciphers. LNCS 2006, vol. 3969:120-134. Springer, Berlin.
    • (2006) LNCS , vol.3969 , pp. 120-134
    • Canteaut, A.1
  • 58
    • 77954757533 scopus 로고    scopus 로고
    • Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
    • Canteaut A., Carlet C., Charpin P., Fontaine C. Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions. LNCS 2000, vol. 1807:507-522. Springer, Berlin.
    • (2000) LNCS , vol.1807 , pp. 507-522
    • Canteaut, A.1    Carlet, C.2    Charpin, P.3    Fontaine, C.4
  • 59
    • 1942480518 scopus 로고    scopus 로고
    • Normal and nonnormal bent functions.
    • Coding and cryptography-WCC 2003, INRIA.
    • Canteaut A, Daum H, Dobbertin H, Leander G. Normal and nonnormal bent functions. In: Coding and cryptography-WCC 2003, INRIA. p. 91-100.
    • Canteaut, A.1    Daum, H.2    Dobbertin, H.3    Leander, G.4
  • 61
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity check equations of weight 4 and 5
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
    • Canteaut A., Trabbia M. Improved fast correlation attacks using parity check equations of weight 4 and 5. LNCS 2000, vol. 1807:573-588. Springer, Berlin.
    • (2000) LNCS , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 62
    • 0041853219 scopus 로고    scopus 로고
    • Bounds on eigenvalues and chromatic numbers
    • Cao D. Bounds on eigenvalues and chromatic numbers. Linear Alg Appl 1998, 270:1-13.
    • (1998) Linear Alg Appl , vol.270 , pp. 1-13
    • Cao, D.1
  • 63
    • 85031937171 scopus 로고
    • A transformation on Boolean functions, its consequences on some problems related to Reed-Muller codes
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '90
    • Carlet C. A transformation on Boolean functions, its consequences on some problems related to Reed-Muller codes. LNCS 1991, vol. 473:42-50. Springer, Berlin.
    • (1991) LNCS , vol.473 , pp. 42-50
    • Carlet, C.1
  • 64
    • 0002251636 scopus 로고
    • Partially-bent functions
    • Carlet C. Partially-bent functions. Des Codes Cryptogr 1993, 3:135-145.
    • (1993) Des Codes Cryptogr , vol.3 , pp. 135-145
    • Carlet, C.1
  • 65
    • 84865472304 scopus 로고
    • Two new classes of bent functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Carlet C. Two new classes of bent functions. LNCS 1994, vol. 765:77-101. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 77-101
    • Carlet, C.1
  • 66
    • 0029375797 scopus 로고
    • Generalized partial spreads
    • Carlet C. Generalized partial spreads. IEEE Trans Inform Theory 1995, 41:1482-1487.
    • (1995) IEEE Trans Inform Theory , vol.41 , pp. 1482-1487
    • Carlet, C.1
  • 67
    • 0039822239 scopus 로고    scopus 로고
    • A construction of bent functions
    • Carlet C. A construction of bent functions. Finite Fields Appl 1996, 233:47-58.
    • (1996) Finite Fields Appl , vol.233 , pp. 47-58
    • Carlet, C.1
  • 68
    • 35048886223 scopus 로고    scopus 로고
    • Recent results on binary bent functions
    • Carlet C. Recent results on binary bent functions. J Combin Inform System Sci 2000, 25:133-149.
    • (2000) J Combin Inform System Sci , vol.25 , pp. 133-149
    • Carlet, C.1
  • 69
    • 84942025295 scopus 로고    scopus 로고
    • Private communication
    • Carlet C. Private communication; 1997.
    • (1997)
    • Carlet, C.1
  • 70
    • 84957358188 scopus 로고    scopus 로고
    • More correlation-immune and resilient functions over Galois fields and Galois rings
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '97
    • Carlet C. More correlation-immune and resilient functions over Galois fields and Galois rings. LNCS 1997, vol. 1233:422-433. Springer, Berlin.
    • (1997) LNCS , vol.1233 , pp. 422-433
    • Carlet, C.1
  • 71
    • 0032041678 scopus 로고    scopus 로고
    • Sur le critère de propagation de degré l et d'ordre k
    • Carlet C. Sur le critère de propagation de degré l et d'ordre k. C R Acad Sci Paris Sr I Math 1998, 326:891-896.
    • (1998) C R Acad Sci Paris Sr I Math , vol.326 , pp. 891-896
    • Carlet, C.1
  • 72
    • 84957632021 scopus 로고    scopus 로고
    • On the propagation criterion of degree l and order k
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '98
    • Carlet C. On the propagation criterion of degree l and order k. LNCS 1998, vol. 1403:462-474. Springer, Berlin.
    • (1998) LNCS , vol.1403 , pp. 462-474
    • Carlet, C.1
  • 73
    • 0003089234 scopus 로고    scopus 로고
    • On cryptographic propagation criteria for Boolean functions
    • Carlet C. On cryptographic propagation criteria for Boolean functions. Inform Comput 1999, 151:32-56.
    • (1999) Inform Comput , vol.151 , pp. 32-56
    • Carlet, C.1
  • 74
    • 0034370089 scopus 로고    scopus 로고
    • On the divisibility properties and nonlinearity of resilient functions
    • Carlet C. On the divisibility properties and nonlinearity of resilient functions. C R Acad Sci Paris Sr I Math 2000, 331:917-922.
    • (2000) C R Acad Sci Paris Sr I Math , vol.331 , pp. 917-922
    • Carlet, C.1
  • 75
    • 84937394144 scopus 로고    scopus 로고
    • A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction
    • Springer, Berlin, Adv. in crypt.-Crypto 2002
    • Carlet C. A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. LNCS 2002, vol. 2442:549-564. Springer, Berlin.
    • (2002) LNCS , vol.2442 , pp. 549-564
    • Carlet, C.1
  • 76
    • 0009963317 scopus 로고    scopus 로고
    • On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions
    • Springer, London, Sequences and their applications (Bergen, 2001)
    • Carlet C. On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. Discrete math. theor. comput. sci. 2002, 131-144. Springer, London.
    • (2002) Discrete math. theor. comput. sci. , pp. 131-144
    • Carlet, C.1
  • 78
    • 4544343250 scopus 로고    scopus 로고
    • On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions
    • Carlet C. On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions. IEEE Trans Inform Theory 2004, 50:2178-2185.
    • (2004) IEEE Trans Inform Theory , vol.50 , pp. 2178-2185
    • Carlet, C.1
  • 79
    • 8144223025 scopus 로고    scopus 로고
    • On the secondary constructions of resilient and bent functions
    • Birkhäuser, Basel, Coding, cryptography and combinatorics
    • Carlet C. On the secondary constructions of resilient and bent functions. Progr. Comput. Sci. Appl. Logic 2004, vol. 2:3-28. Birkhäuser, Basel.
    • (2004) Progr. Comput. Sci. Appl. Logic , vol.2 , pp. 3-28
    • Carlet, C.1
  • 80
    • 1942539819 scopus 로고    scopus 로고
    • On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
    • Carlet C. On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions. J Complexity 2004, 20:182-204.
    • (2004) J Complexity , vol.20 , pp. 182-204
    • Carlet, C.1
  • 81
    • 33744736426 scopus 로고    scopus 로고
    • Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
    • Carlet C. Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions, . http://eprint.iacr.org/2004/276.
    • Carlet, C.1
  • 82
    • 84942016793 scopus 로고    scopus 로고
    • Boolean functions for cryptography and error correcting codes.
    • Carlet C. Boolean functions for cryptography and error correcting codes. Available at . http://www.rocg.inria.fr/secret/Claude.Carlet/pubs.html.
    • Carlet, C.1
  • 83
    • 0000805465 scopus 로고    scopus 로고
    • Codes bent functions and permutations suitable for DES-like cryptosystems
    • Carlet C., Charpin P., Zinoviev V. Codes bent functions and permutations suitable for DES-like cryptosystems. Des Codes Cryptogr 1998, 15:125-156.
    • (1998) Des Codes Cryptogr , vol.15 , pp. 125-156
    • Carlet, C.1    Charpin, P.2    Zinoviev, V.3
  • 84
    • 33746350122 scopus 로고    scopus 로고
    • Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
    • Carlet C., Dalai D.K., Gupta K.C., Maitra S. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans Inform Theory 2006, 52:3105-3121.
    • (2006) IEEE Trans Inform Theory , vol.52 , pp. 3105-3121
    • Carlet, C.1    Dalai, D.K.2    Gupta, K.C.3    Maitra, S.4
  • 85
    • 1942507994 scopus 로고    scopus 로고
    • Highly nonlinear mappings
    • Carlet C., Ding C. Highly nonlinear mappings. J Complexity 2004, 20:205-244.
    • (2004) J Complexity , vol.20 , pp. 205-244
    • Carlet, C.1    Ding, C.2
  • 87
  • 88
    • 84859757328 scopus 로고    scopus 로고
    • An upper bound on the number of m-resilient Boolean functions
    • Springer, Berlin, Adv. in crypt.-Asiacrypt 2002
    • Carlet C., Gouget A. An upper bound on the number of m-resilient Boolean functions. LNCS 2002, vol. 2501:484-496. Springer, Berlin.
    • (2002) LNCS , vol.2501 , pp. 484-496
    • Carlet, C.1    Gouget, A.2
  • 89
    • 0001371135 scopus 로고    scopus 로고
    • A characterization of binary bent functions
    • Carlet C., Guillot P. A characterization of binary bent functions. J Combin Theory A 1996, 76:328-335.
    • (1996) J Combin Theory A , vol.76 , pp. 328-335
    • Carlet, C.1    Guillot, P.2
  • 90
    • 0007109121 scopus 로고    scopus 로고
    • An alternate characterization of the bentness of binary functions with uniqueness
    • Carlet C., Guillot P. An alternate characterization of the bentness of binary functions with uniqueness. Des Codes Cryptogr 1998, 14:133-140.
    • (1998) Des Codes Cryptogr , vol.14 , pp. 133-140
    • Carlet, C.1    Guillot, P.2
  • 91
    • 13844267292 scopus 로고    scopus 로고
    • Bent, resilient functions and the numerical normal form
    • Amer. Math. Soc., Providence, RI, Codes and association schemes (Piscataway, NJ, 1999)
    • Carlet C, Guillot P Bent, resilient functions and the numerical normal form. DIMACS ser. discrete math. theoret. comput. sci. 2001, vol. 56:87-96. Amer. Math. Soc., Providence, RI.
    • (2001) DIMACS ser. discrete math. theoret. comput. sci. , vol.56 , pp. 87-96
    • Carlet, C.1    Guillot, P.2
  • 92
    • 1942480547 scopus 로고    scopus 로고
    • Upper bounds on the number of resilient functions and of bent functions.
    • 23rd symposium on inform. theory in the Benelux
    • Carlet C, Klapper A. Upper bounds on the number of resilient functions and of bent functions. In: Proc. 23rd symposium on inform. theory in the Benelux; 2002. p. 307-14.
    • (2002) Proc. , pp. 307-314
    • Carlet, C.1    Klapper, A.2
  • 93
    • 24944514161 scopus 로고    scopus 로고
    • On a new notion of nonlinearity relevant to multioutput pseudo-random generators
    • Springer, Berlin, Selected areas crypt. 2003
    • Carlet C., Prouff E. On a new notion of nonlinearity relevant to multioutput pseudo-random generators. LNCS 2004, vol. 3006:291-305. Springer, Berlin.
    • (2004) LNCS , vol.3006 , pp. 291-305
    • Carlet, C.1    Prouff, E.2
  • 94
    • 35048896411 scopus 로고    scopus 로고
    • Vectorial functions and covering sequences
    • Springer, Berlin, Finite fields and applications
    • Carlet C., Prouff E. Vectorial functions and covering sequences. LNCS 2004, vol. 2948:215-248. Springer, Berlin.
    • (2004) LNCS , vol.2948 , pp. 215-248
    • Carlet, C.1    Prouff, E.2
  • 95
    • 0036160819 scopus 로고    scopus 로고
    • Spectral domain analysis of correlation immune and resilient Boolean functions
    • Carlet C., Sarkar P. Spectral domain analysis of correlation immune and resilient Boolean functions. Finite Fields Appl 2002, 8:120-130.
    • (2002) Finite Fields Appl , vol.8 , pp. 120-130
    • Carlet, C.1    Sarkar, P.2
  • 96
    • 31244432494 scopus 로고    scopus 로고
    • Covering sequences of Boolean functions and their cryptographic significance
    • Carlet C., Tarannikov Y. Covering sequences of Boolean functions and their cryptographic significance. Des Codes Cryptogr 2002, 25:263-279.
    • (2002) Des Codes Cryptogr , vol.25 , pp. 263-279
    • Carlet, C.1    Tarannikov, Y.2
  • 97
    • 84948990962 scopus 로고
    • Links between differential and linear cryptanalysis
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '94
    • Chabaud F., Vaudenay S. Links between differential and linear cryptanalysis. LNCS 1995, vol. 950:363-374. Springer, Berlin.
    • (1995) LNCS , vol.950 , pp. 363-374
    • Chabaud, F.1    Vaudenay, S.2
  • 98
    • 0023862702 scopus 로고
    • Clock-controlled shift registers in binary sequence generators
    • Chambers W.G. Clock-controlled shift registers in binary sequence generators. IEE Proc E 1988, 135:17-24.
    • (1988) IEE Proc E , vol.135 , pp. 17-24
    • Chambers, W.G.1
  • 99
    • 33747612098 scopus 로고
    • Lock-in effect in cascades of clock controlled shift-registers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '88
    • Chambers W.G., Gollmann D. Lock-in effect in cascades of clock controlled shift-registers. LNCS 1988, vol. 330:331-343. Springer, Berlin.
    • (1988) LNCS , vol.330 , pp. 331-343
    • Chambers, W.G.1    Gollmann, D.2
  • 100
    • 0021519766 scopus 로고
    • Linear equivalence of certain BRM shift-register sequences
    • Chambers W.G., Jennings S.M. Linear equivalence of certain BRM shift-register sequences. Electr Lett 1984, 20:1018-1019.
    • (1984) Electr Lett , vol.20 , pp. 1018-1019
    • Chambers, W.G.1    Jennings, S.M.2
  • 101
    • 84955590872 scopus 로고
    • Linear nonequivalence versus nonlinearity
    • Springer, Berlin, Adv. in crypt.-Auscrypt '92
    • Charnes C., Pieprzyk J.P. Linear nonequivalence versus nonlinearity. LNCS 1993, vol. 718:156-164. Springer, Berlin.
    • (1993) LNCS , vol.718 , pp. 156-164
    • Charnes, C.1    Pieprzyk, J.P.2
  • 102
    • 84974663228 scopus 로고    scopus 로고
    • On homogeneous bent functions
    • Springer, Berlin, Proceedings of applied algebra, algebraic algorithms and error correcting codes (AAECC-14)
    • Charnes C., Rötteler M., Beth T. On homogeneous bent functions. LNCS 2001, vol. 2227:249-259. Springer, Berlin.
    • (2001) LNCS , vol.2227 , pp. 249-259
    • Charnes, C.1    Rötteler, M.2    Beth, T.3
  • 103
    • 84884039585 scopus 로고    scopus 로고
    • Homogeneous bent functions, invariants and designs
    • Charnes C., Rötteler M., Beth T. Homogeneous bent functions, invariants and designs. Des Codes Cryptogr 2002, 26:139-154.
    • (2002) Des Codes Cryptogr , vol.26 , pp. 139-154
    • Charnes, C.1    Rötteler, M.2    Beth, T.3
  • 104
    • 1942507984 scopus 로고    scopus 로고
    • Normal Boolean functions
    • Charpin P. Normal Boolean functions. J Complexity 2004, 20:245-265.
    • (2004) J Complexity , vol.20 , pp. 245-265
    • Charpin, P.1
  • 105
    • 35248894976 scopus 로고    scopus 로고
    • On propagation characteristics of resilient functions
    • Springer, Berlin, Selected areas crypt. 2002
    • Charpin P., Pasalic E. On propagation characteristics of resilient functions. LNCS 2003, vol. 2595:175-195. Springer, Berlin.
    • (2003) LNCS , vol.2595 , pp. 175-195
    • Charpin, P.1    Pasalic, E.2
  • 106
    • 84955619208 scopus 로고
    • Semi-bent functions
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '94
    • Chee S., Lee S., Kim K. Semi-bent functions. LNCS 1995, vol. 917:107-118. Springer, Berlin.
    • (1995) LNCS , vol.917 , pp. 107-118
    • Chee, S.1    Lee, S.2    Kim, K.3
  • 107
    • 0031332525 scopus 로고    scopus 로고
    • Correlation immune functions with controllable nonlinearity
    • Chee S., Lee S., Kim K., Kim D. Correlation immune functions with controllable nonlinearity. ETRI J 1997, 19:389-401.
    • (1997) ETRI J , vol.19 , pp. 389-401
    • Chee, S.1    Lee, S.2    Kim, K.3    Kim, D.4
  • 108
    • 84955576233 scopus 로고    scopus 로고
    • On the correlation immune functions and their nonlinearity
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '96
    • Chee S., Lee S., Lee D., Sung S.H. On the correlation immune functions and their nonlinearity. LNCS 1996, vol. 1123:232-243. Springer, Berlin.
    • (1996) LNCS , vol.1123 , pp. 232-243
    • Chee, S.1    Lee, S.2    Lee, D.3    Sung, S.H.4
  • 109
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Springer, Berlin, Fast software encryption-New York 2000
    • Chepyzhov V., Johansson T., Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. LNCS 2001, vol. 1978:181-195. Springer, Berlin.
    • (2001) LNCS , vol.1978 , pp. 181-195
    • Chepyzhov, V.1    Johansson, T.2    Smeets, B.3
  • 110
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '91
    • Chepyzhov V., Smeets B. On a fast correlation attack on certain stream ciphers. LNCS 1992, vol. 547:176-185. Springer, Berlin.
    • (1992) LNCS , vol.547 , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 111
    • 0022198802 scopus 로고
    • The bit extraction problem or t-resilient functions.
    • 26th IEEE symposium on foundations of computer science
    • Chor B, Goldreich O, Håstad J, Friedman J, Rudich S, Smolensky R. The bit extraction problem or t-resilient functions. In: Proc. 26th IEEE symposium on foundations of computer science; 1985, p. 396-407.
    • (1985) Proc. , pp. 396-407
    • Chor, B.1    Goldreich, O.2    Håstad, J.3    Friedman, J.4    Rudich, S.5    Smolensky, R.6
  • 112
    • 0002241889 scopus 로고
    • On recursions connected with symmetric groups I
    • Chowla S., Herstein I.N., Moore K. On recursions connected with symmetric groups I. Canadian J Math 1951, 3:328-334.
    • (1951) Canadian J Math , vol.3 , pp. 328-334
    • Chowla, S.1    Herstein, I.N.2    Moore, K.3
  • 113
    • 33646852443 scopus 로고    scopus 로고
    • An algebraic framework for cipher embeddings
    • Springer, Berlin, Proc. of 10th IMA international conference on coding and cryptography
    • Cid C., Murphy S., Robshaw M. An algebraic framework for cipher embeddings. LNCS 2005, vol. 3796:278-289. Springer, Berlin.
    • (2005) LNCS , vol.3796 , pp. 278-289
    • Cid, C.1    Murphy, S.2    Robshaw, M.3
  • 115
    • 84958950262 scopus 로고    scopus 로고
    • A comparison of fast correlation attacks
    • Springer, Berlin, Fast software encryption-Cambridge 1996
    • Clark A., Golić J.D., Dawson E. A comparison of fast correlation attacks. LNCS 1997, vol. 1039:145-157. Springer, Berlin.
    • (1997) LNCS , vol.1039 , pp. 145-157
    • Clark, A.1    Golić, J.D.2    Dawson, E.3
  • 116
    • 4344630715 scopus 로고    scopus 로고
    • Almost Boolean functions: the design of Boolean functions by spectral inversion
    • Clark J.A., Jacob J.L., Maitra S., Stănică P. Almost Boolean functions: the design of Boolean functions by spectral inversion. Comput Intelligence 2004, 20:450-462.
    • (2004) Comput Intelligence , vol.20 , pp. 450-462
    • Clark, J.A.1    Jacob, J.L.2    Maitra, S.3    Stănică, P.4
  • 117
    • 0003938168 scopus 로고    scopus 로고
    • CRC Press, Boca Raton, C.J. Colbourn, J. Dinitz (Eds.)
    • CRC handbook of combinatorial design 1996, CRC Press, Boca Raton. C.J. Colbourn, J. Dinitz (Eds.).
    • (1996) CRC handbook of combinatorial design
  • 118
    • 0028428941 scopus 로고
    • The Data Encryption Standard (DES) and its strength against attacks
    • Coppersmith D. The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Develop 1994, 38:243-250.
    • (1994) IBM J Res Develop , vol.38 , pp. 243-250
    • Coppersmith, D.1
  • 119
    • 84974670663 scopus 로고
    • The shrinking generator
    • Springer, Berlin, Adv. in crypt.-Crypto '93
    • Coppersmith D., Krawczyk H., Mansour Y. The shrinking generator. LNCS 1994, vol. 773:22-39. Springer, Berlin.
    • (1994) LNCS , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 120
    • 85023205150 scopus 로고
    • Matrix multiplication via arithmetic progressions
    • Coppersmith D., Winograd S. Matrix multiplication via arithmetic progressions. J Symbolic Comput 1990, 9:251-280.
    • (1990) J Symbolic Comput , vol.9 , pp. 251-280
    • Coppersmith, D.1    Winograd, S.2
  • 121
    • 35048865807 scopus 로고    scopus 로고
    • Higher order correlation attacks
    • XL algorithm and cryptanalysis of Toyocrypt
    • Courtois N. Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt, . http://eprint.iacr.org/2002/087.
    • Courtois, N.1
  • 122
    • 65149087270 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of the Data Encryption Standard
    • Courtois N, Bard G. Algebraic cryptanalysis of the Data Encryption Standard, . http://eprint.iacr.org/2006/402.
    • Courtois, N.1    Bard, G.2
  • 123
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2003
    • Courtois N., Meier W. Algebraic attacks on stream ciphers with linear feedback. LNCS 2003, vol. 2656:345-359. Springer, Berlin.
    • (2003) LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 124
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Springer, Berlin, Adv. in crypt.-Asiacrypt 2002
    • Courtois N., Pieprzyk J.P. Cryptanalysis of block ciphers with overdefined systems of equations. LNCS 2002, vol. 2501:267-287. Springer, Berlin.
    • (2002) LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.P.2
  • 125
    • 27944467381 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • (extended version of [123])
    • Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback (extended version of [123]), . http://www.cryptosystem.net/stream/.
    • Courtois, N.1    Meier, W.2
  • 126
    • 84858666096 scopus 로고
    • Boolean functions satisfying a higher order strict avalanche criterion
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Cusick T.W. Boolean functions satisfying a higher order strict avalanche criterion. LNCS 1994, vol. 765:102-117. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 102-117
    • Cusick, T.W.1
  • 127
    • 0012978565 scopus 로고    scopus 로고
    • Bounds on the number of functions satisfying the strict avalanche criterion
    • Cusick T.W. Bounds on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1996, 57:261-263.
    • (1996) Inform Process Lett , vol.57 , pp. 261-263
    • Cusick, T.W.1
  • 128
    • 1942544421 scopus 로고    scopus 로고
    • On constructing balanced correlation immune functions
    • Springer, London, Sequences and their applications (Singapore, 1998)
    • Cusick T.W. On constructing balanced correlation immune functions. Springer ser. discrete math. theor. comput. sci. 1999, 184-190. Springer, London.
    • (1999) Springer ser. discrete math. theor. comput. sci. , pp. 184-190
    • Cusick, T.W.1
  • 130
    • 0030288222 scopus 로고    scopus 로고
    • Bounds on the number of functions satisfying the strict avalanche criterion
    • Cusick T.W., Stănică P. Bounds on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1996, 60:215-219.
    • (1996) Inform Process Lett , vol.60 , pp. 215-219
    • Cusick, T.W.1    Stănică, P.2
  • 131
    • 0037032959 scopus 로고    scopus 로고
    • Fast evaluation, weights and nonlinearity of rotation-symmetric functions
    • Cusick T.W., Stănică P. Fast evaluation, weights and nonlinearity of rotation-symmetric functions. Discrete Math 2002, 258:289-301.
    • (2002) Discrete Math , vol.258 , pp. 289-301
    • Cusick, T.W.1    Stănică, P.2
  • 133
    • 33745451168 scopus 로고    scopus 로고
    • The Design of Rijndael. AES-the Advanced Encryption Standard
    • Springer, Berlin
    • Daemen J., Rijmen V. The Design of Rijndael. AES-the Advanced Encryption Standard. Information security and cryptography 2002, Springer, Berlin.
    • (2002) Information security and cryptography
    • Daemen, J.1    Rijmen, V.2
  • 134
    • 33646038313 scopus 로고    scopus 로고
    • Basic theory in construction of Boolean functions with maximum possible annihilator immunity
    • Dalai D.K., Maitra S., Sarkar P. Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des Codes Cryptogr 2006, 40:41-58.
    • (2006) Des Codes Cryptogr , vol.40 , pp. 41-58
    • Dalai, D.K.1    Maitra, S.2    Sarkar, P.3
  • 135
    • 77649261653 scopus 로고    scopus 로고
    • Reducing the number of homogeneous linear equations in finding annihilators
    • Dalai DK, Maitra S. Reducing the number of homogeneous linear equations in finding annihilators, . http://eprint.iacr.org/2006/032.
    • Dalai, D.K.1    Maitra, S.2
  • 136
    • 33749971600 scopus 로고
    • National Bureau of Standards
    • Federal Information Standard 46, USA
    • Data Encryption Standard. National Bureau of Standards, Federal Information Standard 46, USA; 1977.
    • (1977)
  • 137
    • 1942544390 scopus 로고    scopus 로고
    • An algorithm for checking normality of Boolean functions.
    • Coding and cryptography-WCC 2003, INRIA
    • Daum M, Dobbertin H, Leander G. An algorithm for checking normality of Boolean functions. Coding and cryptography-WCC 2003, INRIA, p. 133-42.
    • Daum, M.1    Dobbertin, H.2    Leander, G.3
  • 139
    • 84956864850 scopus 로고
    • Propagation characteristics of the DES
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '84
    • Davio M., Desmedt Y., Quisquater J.-J. Propagation characteristics of the DES. LNCS 1985, vol. 209:62-73. Springer, Berlin.
    • (1985) LNCS , vol.209 , pp. 62-73
    • Davio, M.1    Desmedt, Y.2    Quisquater, J.-J.3
  • 140
  • 141
    • 33847538049 scopus 로고
    • Cryptanalysis of summation generator
    • Springer, Berlin, Adv. in crypt.-Auscrypt '92
    • Dawson E. Cryptanalysis of summation generator. LNCS 1993, vol. 718:209-215. Springer, Berlin.
    • (1993) LNCS , vol.718 , pp. 209-215
    • Dawson, E.1
  • 142
    • 0011043342 scopus 로고
    • Divide and conquer attacks on certain classes of stream ciphers
    • Dawson E., Clark A. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia 1994, 18:25-40.
    • (1994) Cryptologia , vol.18 , pp. 25-40
    • Dawson, E.1    Clark, A.2
  • 143
    • 67349176399 scopus 로고    scopus 로고
    • Automated cryptanalysis of XOR plaintext strings
    • Dawson E., Nielsen L. Automated cryptanalysis of XOR plaintext strings. Cryptologia 1996, 20:165-181.
    • (1996) Cryptologia , vol.20 , pp. 165-181
    • Dawson, E.1    Nielsen, L.2
  • 144
    • 0000262264 scopus 로고
    • A combinatorial problem
    • or Indagationes Math 1946;8:461-7
    • de Bruijn N.G. A combinatorial problem. Nederl Akad Wetensch Proc 1946, 49:758-764. or Indagationes Math 1946;8:461-7.
    • (1946) Nederl Akad Wetensch Proc , vol.49 , pp. 758-764
    • de Bruijn, N.G.1
  • 145
    • 31344454613 scopus 로고    scopus 로고
    • An introduction to block cipher cryptanalysis
    • de Cannière C., Biryukov A., Preneel B. An introduction to block cipher cryptanalysis. Proc IEEE 2006, 94:346-356.
    • (2006) Proc IEEE , vol.94 , pp. 346-356
    • de Cannière, C.1    Biryukov, A.2    Preneel, B.3
  • 146
    • 56349117175 scopus 로고    scopus 로고
    • Trivium specifications.
    • de Cannière C, Preneel B. Trivium specifications. http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf.
    • de Cannière, C.1    Preneel, B.2
  • 147
    • 0015735548 scopus 로고
    • Four fundamental parameters of a code and their combinatorial significance
    • Delsarte P. Four fundamental parameters of a code and their combinatorial significance. Inform Control 1973, 23:407-438.
    • (1973) Inform Control , vol.23 , pp. 407-438
    • Delsarte, P.1
  • 148
    • 29444436294 scopus 로고
    • An asymptotic formula for the number of correlation immune of order k Boolean functions
    • [translation of Russian article in Diskretnaya Matematika 3 (1991), 25-46]
    • Denisov O.V. An asymptotic formula for the number of correlation immune of order k Boolean functions. Discrete Math Appl 1992, 2:407-426. [translation of Russian article in Diskretnaya Matematika 3 (1991), 25-46].
    • (1992) Discrete Math Appl , vol.2 , pp. 407-426
    • Denisov, O.V.1
  • 149
    • 29444447107 scopus 로고    scopus 로고
    • A local limit theorem for the distribution of a part of the spectrum of a random binary function
    • [translation of Russian article in Diskretnaya Matematika 12 (2000), 82-95]
    • Denisov O.V. A local limit theorem for the distribution of a part of the spectrum of a random binary function. Discrete Math Appl 2000, 12:87-101. [translation of Russian article in Diskretnaya Matematika 12 (2000), 82-95].
    • (2000) Discrete Math Appl , vol.12 , pp. 87-101
    • Denisov, O.V.1
  • 152
    • 0003797192 scopus 로고
    • Elementary Hadamard difference sets.
    • Ph.D. thesis. University of Maryland
    • Dillon JF. Elementary Hadamard difference sets. Ph.D. thesis. University of Maryland; 1974.
    • (1974)
    • Dillon, J.F.1
  • 154
    • 84942036058 scopus 로고    scopus 로고
    • Private communication
    • Dillon JF. Private communication; 1997.
    • (1997)
    • Dillon, J.F.1
  • 155
    • 3242719285 scopus 로고    scopus 로고
    • New cyclic difference sets with Singer parameters
    • Dillon J.F., Dobbertin H. New cyclic difference sets with Singer parameters. Finite Fields Appl 2004, 10:342-389.
    • (2004) Finite Fields Appl , vol.10 , pp. 342-389
    • Dillon, J.F.1    Dobbertin, H.2
  • 156
    • 0003323628 scopus 로고
    • The stability theory of stream ciphers
    • Springer, Berlin
    • Ding C., Xiao G., Shan W. The stability theory of stream ciphers. LNCS 1991, vol. 561. Springer, Berlin.
    • (1991) LNCS , vol.561
    • Ding, C.1    Xiao, G.2    Shan, W.3
  • 157
    • 84948983734 scopus 로고
    • Construction of bent functions and balanced Boolean functions with high nonlinearity
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Dobbertin H. Construction of bent functions and balanced Boolean functions with high nonlinearity. LNCS 1995, vol. 1008:61-74. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 61-74
    • Dobbertin, H.1
  • 158
    • 24944578285 scopus 로고    scopus 로고
    • A survey of some recent results on bent functions
    • Springer, Berlin, Sequences and their applications-SETA 2004
    • Dobbertin H., Leander G. A survey of some recent results on bent functions. LNCS 2005, vol. 3486:1-29. Springer, Berlin.
    • (2005) LNCS , vol.3486 , pp. 1-29
    • Dobbertin, H.1    Leander, G.2
  • 159
    • 84942037407 scopus 로고    scopus 로고
    • Cryptographer's toolkit for construction of 8-bit bent functions
    • Dobbertin H, Leander G. Cryptographer's toolkit for construction of 8-bit bent functions, . http://eprint.iacr.org/2005/089.
    • Dobbertin, H.1    Leander, G.2
  • 160
    • 4544352431 scopus 로고    scopus 로고
    • Etude des propriétés de dégénérescence et de normalité des fonctions booléennes et construction de fonctions q-aires parfaitement nonlinéaires.
    • Ph.D. thesis. Université de Caen
    • Dubuc S. Etude des propriétés de dégénérescence et de normalité des fonctions booléennes et construction de fonctions q-aires parfaitement nonlinéaires. Ph.D. thesis. Université de Caen; 2001.
    • (2001)
    • Dubuc, S.1
  • 161
    • 84942035605 scopus 로고    scopus 로고
    • eCRYPT-European Network of Excellence for Cryptology
    • eCRYPT-European Network of Excellence for Cryptology, . http://www.ecrypt.eu.org/index.html.
  • 163
    • 84977806870 scopus 로고
    • Linear structures in block ciphers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '87
    • Evertse J.-H. Linear structures in block ciphers. LNCS 1988, vol. 304:249-266. Springer, Berlin.
    • (1988) LNCS , vol.304 , pp. 249-266
    • Evertse, J.-H.1
  • 164
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases (F4)
    • Faugère J.-C. A new efficient algorithm for computing Gröbner bases (F4). J Pure Appl Alg 1999, 139:61-88.
    • (1999) J Pure Appl Alg , vol.139 , pp. 61-88
    • Faugère, J.-C.1
  • 165
    • 84974705196 scopus 로고    scopus 로고
    • On the constructing of highly nonlinear resilient Boolean functions by means of special matrices
    • Springer, Berlin, Indocrypt 2001
    • Fedorova M., Tarannikov Y. On the constructing of highly nonlinear resilient Boolean functions by means of special matrices. LNCS 2001, vol. 2247:254-266. Springer, Berlin.
    • (2001) LNCS , vol.2247 , pp. 254-266
    • Fedorova, M.1    Tarannikov, Y.2
  • 166
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • Feistel H. Cryptography and computer privacy. Scientific American 1973, 228:15-23.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 167
    • 84974678303 scopus 로고    scopus 로고
    • Improved cryptanalysis of Rijndael
    • Springer, Berlin, Fast software encryption-New York 2000
    • Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., et al. Improved cryptanalysis of Rijndael. LNCS 2001, vol. 1978:213-230. Springer, Berlin.
    • (2001) LNCS , vol.1978 , pp. 213-230
    • Ferguson, N.1    Kelsey, J.2    Lucks, S.3    Schneier, B.4    Stay, M.5    Wagner, D.6
  • 168
    • 84949194630 scopus 로고    scopus 로고
    • A simple algebraic representation of Rijndael
    • Springer, Berlin, Selected areas crypt. 2001
    • Ferguson N., Schroeppel R., Whiting D. A simple algebraic representation of Rijndael. LNCS 2001, vol. 2259:149-165. Springer, Berlin.
    • (2001) LNCS , vol.2259 , pp. 149-165
    • Ferguson, N.1    Schroeppel, R.2    Whiting, D.3
  • 169
    • 84957676126 scopus 로고    scopus 로고
    • Highly nonlinear balanced Boolean functions with a good correlation immunity
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '98
    • Filiol E., Fontaine C. Highly nonlinear balanced Boolean functions with a good correlation immunity. LNCS 1998, vol. 1403:475-488. Springer, Berlin.
    • (1998) LNCS , vol.1403 , pp. 475-488
    • Filiol, E.1    Fontaine, C.2
  • 170
    • 33745748352 scopus 로고
    • Computer data authentication.
    • Federal Information Processing Standards Publication 113, National Bureau of Standards. Springfield, Virginia
    • FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, National Bureau of Standards. Springfield, Virginia; 1994.
    • (1994)
  • 171
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '96
    • Fischer J.-B., Stern J. An efficient pseudo-random generator provably as secure as syndrome decoding. LNCS 1996, vol. 1070:245-255. Springer, Berlin.
    • (1996) LNCS , vol.1070 , pp. 245-255
    • Fischer, J.-B.1    Stern, J.2
  • 172
    • 85011285633 scopus 로고
    • The strict avalanche criterion: spectral properties of Boolean functions and an extended definition
    • Springer, Berlin, Adv. in crypt.-Crypto '88
    • Forré R. The strict avalanche criterion: spectral properties of Boolean functions and an extended definition. LNCS 1990, vol. 403:450-468. Springer, Berlin.
    • (1990) LNCS , vol.403 , pp. 450-468
    • Forré, R.1
  • 173
    • 84929185964 scopus 로고
    • A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '89
    • Forré R. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. LNCS 1990, vol. 434:586-595. Springer, Berlin.
    • (1990) LNCS , vol.434 , pp. 586-595
    • Forré, R.1
  • 174
    • 0025638337 scopus 로고
    • Methods and instruments for designing S-boxes
    • Forré R. Methods and instruments for designing S-boxes. J Cryptology 1990, 2:115-130.
    • (1990) J Cryptology , vol.2 , pp. 115-130
    • Forré, R.1
  • 175
    • 58149413994 scopus 로고
    • The lexicographically least de Bruijn cycle
    • Fredricksen H. The lexicographically least de Bruijn cycle. J Combin Theory A 1970, 9:1-5.
    • (1970) J Combin Theory A , vol.9 , pp. 1-5
    • Fredricksen, H.1
  • 176
    • 33646278638 scopus 로고
    • A class of nonlinear de Bruijn cycles
    • Fredricksen H. A class of nonlinear de Bruijn cycles. J Combin Theory A 1975, 19:192-199.
    • (1975) J Combin Theory A , vol.19 , pp. 192-199
    • Fredricksen, H.1
  • 177
    • 0000881136 scopus 로고
    • A survey of full length nonlinear shift register cycle algorithms
    • Fredricksen H. A survey of full length nonlinear shift register cycle algorithms. SIAM Review 1982, 24:195-221.
    • (1982) SIAM Review , vol.24 , pp. 195-221
    • Fredricksen, H.1
  • 178
    • 38249040050 scopus 로고
    • An algorithm for generating necklaces of beads in two colors
    • Fredricksen H., Kessler I.J. An algorithm for generating necklaces of beads in two colors. Discrete Math 1986, 61:181-188.
    • (1986) Discrete Math , vol.61 , pp. 181-188
    • Fredricksen, H.1    Kessler, I.J.2
  • 179
    • 0008782949 scopus 로고
    • Necklaces of beads in k colors and k-ary de Bruijn sequences
    • Fredricksen H., Maiorana J. Necklaces of beads in k colors and k-ary de Bruijn sequences. Discrete Math 1978, 23:207-210.
    • (1978) Discrete Math , vol.23 , pp. 207-210
    • Fredricksen, H.1    Maiorana, J.2
  • 180
    • 85024964126 scopus 로고
    • On the bit extraction problem.
    • 33rd IEEE symposium on foundations of computer science
    • Friedman J. On the bit extraction problem. In: Proc. 33rd IEEE symposium on foundations of computer science; 1992. p. 314-19.
    • (1992) In: Proc. , pp. 314-319
    • Friedman, J.1
  • 183
    • 0015913785 scopus 로고
    • How to protect data with ciphers that are really hard to break
    • Geffe P.R. How to protect data with ciphers that are really hard to break. Electronics 1973, 46:99-101.
    • (1973) Electronics , vol.46 , pp. 99-101
    • Geffe, P.R.1
  • 184
    • 84974622962 scopus 로고    scopus 로고
    • An improved pseduo-random generator based on discrete log
    • Springer, Berlin, Adv. in crypt.-Crypto 2000
    • Gennaro R. An improved pseduo-random generator based on discrete log. LNCS 2000, vol. 1880:469-481. Springer, Berlin.
    • (2000) LNCS , vol.1880 , pp. 469-481
    • Gennaro, R.1
  • 185
    • 0001389453 scopus 로고
    • Symmetry types of periodic sequences
    • Gilbert E.N., Riordan J. Symmetry types of periodic sequences. Illinois J Math 1961, 5:657-665.
    • (1961) Illinois J Math , vol.5 , pp. 657-665
    • Gilbert, E.N.1    Riordan, J.2
  • 186
    • 0038557148 scopus 로고    scopus 로고
    • A specification for Rijndael
    • the AES algorithm
    • Gladman B. A specification for Rijndael, the AES algorithm, . http://www.techheap.com/cryptography/encryption/spec.v36.pdf.
    • Gladman, B.1
  • 187
    • 0010276081 scopus 로고    scopus 로고
    • Fast encryption and authentication
    • XCBC Encryption and XECB Authentication Modes, Submission to NIST
    • Gligor VD, Donescu P. Fast encryption and authentication: XCBC Encryption and XECB Authentication Modes, Submission to NIST, . http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/index.html.
    • Gligor, V.D.1    Donescu, P.2
  • 188
    • 0007823441 scopus 로고
    • Problems in algebraic combinatorics
    • # F1
    • Godsil C.D. Problems in algebraic combinatorics. Elec J Combin 1995, # F1.
    • (1995) Elec J Combin
    • Godsil, C.D.1
  • 189
    • 84955576147 scopus 로고
    • On the security of shift register based keystream generators
    • Springer, Berlin, Fast software encryption-Cambridge 1993
    • Golić J.D. On the security of shift register based keystream generators. LNCS 1994, vol. 809:90-100. Springer, Berlin.
    • (1994) LNCS , vol.809 , pp. 90-100
    • Golić, J.D.1
  • 190
    • 84955594784 scopus 로고
    • Intrinsic statistical weakness of keystream generators
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '94
    • Golić J.D. Intrinsic statistical weakness of keystream generators. LNCS 1995, vol. 917:91-103. Springer, Berlin.
    • (1995) LNCS , vol.917 , pp. 91-103
    • Golić, J.D.1
  • 191
    • 84948958360 scopus 로고
    • Linear cryptanalysis of stream ciphers
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Golić J.D. Linear cryptanalysis of stream ciphers. LNCS 1995, vol. 1008:154-169. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 154-169
    • Golić, J.D.1
  • 192
    • 84958983180 scopus 로고    scopus 로고
    • On the security of nonlinear filter generators
    • Springer, Berlin, Fast software encryption-Cambridge 1996
    • Golić J.D. On the security of nonlinear filter generators. LNCS 1997, vol. 1039:173-188. Springer, Berlin.
    • (1997) LNCS , vol.1039 , pp. 173-188
    • Golić, J.D.1
  • 193
    • 84880855404 scopus 로고    scopus 로고
    • Correlation analysis of the shrinking generator
    • Springer, Berlin, Adv. in crypt.-Crypto 2001
    • Golić J.D. Correlation analysis of the shrinking generator. LNCS 2001, vol. 2139:440-457. Springer, Berlin.
    • (2001) LNCS , vol.2139 , pp. 440-457
    • Golić, J.D.1
  • 194
    • 31744445021 scopus 로고    scopus 로고
    • Vectorial Boolean functions and induced algebraic equations
    • Golić J.D. Vectorial Boolean functions and induced algebraic equations. IEEE Trans Inform Theory 2006, 52:528-537.
    • (2006) IEEE Trans Inform Theory , vol.52 , pp. 528-537
    • Golić, J.D.1
  • 195
    • 23744501115 scopus 로고    scopus 로고
    • Embedding probabilities for the alternating step generator
    • Golić J.D. Embedding probabilities for the alternating step generator. IEEE Trans Inform Theory 2005, 51:2543-2553.
    • (2005) IEEE Trans Inform Theory , vol.51 , pp. 2543-2553
    • Golić, J.D.1
  • 196
    • 84958673691 scopus 로고    scopus 로고
    • Edit distance correlation attack on the alternating step generator
    • Springer, Berlin, Adv. in crypt.-Crypto '97
    • Golić J.D., Menicocci R. Edit distance correlation attack on the alternating step generator. LNCS 1997, vol. 1294:499-512. Springer, Berlin.
    • (1997) LNCS , vol.1294 , pp. 499-512
    • Golić, J.D.1    Menicocci, R.2
  • 197
    • 24044535056 scopus 로고    scopus 로고
    • Edit probability correlation attacks on stop/go clocked keystream generators
    • Golić J.D., Menicocci R. Edit probability correlation attacks on stop/go clocked keystream generators. J Cryptology 2003, 16:41-68.
    • (2003) J Cryptology , vol.16 , pp. 41-68
    • Golić, J.D.1    Menicocci, R.2
  • 198
    • 0742321821 scopus 로고    scopus 로고
    • Correlation analysis of the alternating step generator
    • Golić J.D., Menicocci R. Correlation analysis of the alternating step generator. Des Codes Cryptogr 2004, 31:51-74.
    • (2004) Des Codes Cryptogr , vol.31 , pp. 51-74
    • Golić, J.D.1    Menicocci, R.2
  • 199
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • Golić J.D., Mihaljević M.J. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. J Cryptology 1991, 3:201-212.
    • (1991) J Cryptology , vol.3 , pp. 201-212
    • Golić, J.D.1    Mihaljević, M.J.2
  • 200
    • 85014175279 scopus 로고    scopus 로고
    • Vectorial fast correlation attacks
    • Golić JD, Morgari G. Vectorial fast correlation attacks, . http://eprint.iacr.org/2004/247.
    • Golić, J.D.1    Morgari, G.2
  • 201
    • 84948975118 scopus 로고
    • Embedding and probabilistic correlation attacks on clock-controlled shift registers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '94
    • Golić J.D., O'Connor L. Embedding and probabilistic correlation attacks on clock-controlled shift registers. LNCS 1995, vol. 950:230-243. Springer, Berlin.
    • (1995) LNCS , vol.950 , pp. 230-243
    • Golić, J.D.1    O'Connor, L.2
  • 202
    • 0008772856 scopus 로고
    • A generalized correlation attack with a probabilistic constrained edit distance
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '92
    • Golić J.D., Petrović S.V. A generalized correlation attack with a probabilistic constrained edit distance. LNCS 1993, vol. 658:472-476. Springer, Berlin.
    • (1993) LNCS , vol.658 , pp. 472-476
    • Golić, J.D.1    Petrović, S.V.2
  • 203
    • 33747462821 scopus 로고    scopus 로고
    • Correlation attacks on clock-controlled shift registers in keystream generators
    • Golić J.D., Petrović S.V. Correlation attacks on clock-controlled shift registers in keystream generators. IEEE Trans Comput 1996, 45:482-486.
    • (1996) IEEE Trans Comput , vol.45 , pp. 482-486
    • Golić, J.D.1    Petrović, S.V.2
  • 204
    • 0001120657 scopus 로고    scopus 로고
    • Fast correlation attacks on the summation generator
    • Golić J.D., Salmasizadeh M., Dawson E. Fast correlation attacks on the summation generator. J Cryptology 2000, 13:245-262.
    • (2000) J Cryptology , vol.13 , pp. 245-262
    • Golić, J.D.1    Salmasizadeh, M.2    Dawson, E.3
  • 206
    • 85034444570 scopus 로고
    • Pseudo random properties of cascade connections of clock controlled shift registers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '84
    • Gollmann D. Pseudo random properties of cascade connections of clock controlled shift registers. LNCS 1985, vol. 209:93-98. Springer, Berlin.
    • (1985) LNCS , vol.209 , pp. 93-98
    • Gollmann, D.1
  • 207
    • 84942041180 scopus 로고
    • Correlation analysis of cascaded sequences
    • Clarendon Press, Oxford, Cryptography and coding
    • Gollmann D. Correlation analysis of cascaded sequences. 1986 IMA conference 1989, 289-297. Clarendon Press, Oxford.
    • (1989) 1986 IMA conference , pp. 289-297
    • Gollmann, D.1
  • 208
    • 84942019538 scopus 로고
    • Transition matrices of clock-controlled shift registers
    • Clarendon Press, Oxford
    • Gollmann D. Transition matrices of clock-controlled shift registers. Cryptography and coding III. 1991 IMA conference 1993, 197-210. Clarendon Press, Oxford.
    • (1993) Cryptography and coding III. 1991 IMA conference , pp. 197-210
    • Gollmann, D.1
  • 210
    • 85032867322 scopus 로고
    • A cryptanalysis of stepk,m cascades
    • Springer, Berlin, Adv. in crypt. Eurocrypt '89
    • Gollmann D., Chambers W.G. A cryptanalysis of stepk,m cascades. LNCS 1990, vol. 434:680-687. Springer, Berlin.
    • (1990) LNCS , vol.434 , pp. 680-687
    • Gollmann, D.1    Chambers, W.G.2
  • 211
    • 0004201481 scopus 로고
    • Holden-Day, San Francisco, revised edition Laguna Hills, CA: Aegean Park Press; 1982
    • Golomb S.W. Shift register sequences 1967, Holden-Day, San Francisco, revised edition Laguna Hills, CA: Aegean Park Press; 1982.
    • (1967) Shift register sequences
    • Golomb, S.W.1
  • 212
    • 85014225550 scopus 로고    scopus 로고
    • A short proof of the non-existence of certain cryptographic functions
    • Gopalakrishnan K., Stinson D.R. A short proof of the non-existence of certain cryptographic functions. J Combin Math Combin Comput 1996, 20:129-137.
    • (1996) J Combin Math Combin Comput , vol.20 , pp. 129-137
    • Gopalakrishnan, K.1    Stinson, D.R.2
  • 214
    • 33749669388 scopus 로고
    • On the linear complexity of products of shift-register sequences
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Göttfert R., Niederreiter H. On the linear complexity of products of shift-register sequences. LNCS 1994, vol. 765:151-158. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 151-158
    • Göttfert, R.1    Niederreiter, H.2
  • 215
    • 85034847491 scopus 로고
    • Alternating step generators controlled by de Bruijn sequences
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '87
    • Günther C.G. Alternating step generators controlled by de Bruijn sequences. LNCS 1988, vol. 304:5-14. Springer, Berlin.
    • (1988) LNCS , vol.304 , pp. 5-14
    • Günther, C.G.1
  • 216
    • 84942041367 scopus 로고    scopus 로고
    • Computing partial Walsh transform from the algebraic normal form of a Boolean function
    • preprint
    • Gupta KC, Sarkar P. Computing partial Walsh transform from the algebraic normal form of a Boolean function, preprint, ; 2006. http://www.cacr.math.uwaterloo.ca/techreports/2006/cacr2006-25.ps.
    • (2006)
    • Gupta, K.C.1    Sarkar, P.2
  • 217
    • 0009188489 scopus 로고
    • Eigenvalue techniques in design and graph theory.
    • Ph.D. thesis. Eindhoven University of Technology;(also found in Math. Centre Tract 121, Mathematical Centre, Amsterdam, 1980)
    • Haemers WH. Eigenvalue techniques in design and graph theory. Ph.D. thesis. Eindhoven University of Technology; 1979 (also found in Math. Centre Tract 121, Mathematical Centre, Amsterdam, 1980).
    • (1979)
    • Haemers, W.H.1
  • 219
    • 84976659284 scopus 로고
    • Approximate string matching
    • Hall P., Dowling G. Approximate string matching. Computing Surveys 1980, 12:381-402.
    • (1980) Computing Surveys , vol.12 , pp. 381-402
    • Hall, P.1    Dowling, G.2
  • 221
    • 0344056457 scopus 로고
    • The discrete logarithm modulo a composite hides O(n) bits
    • Håstad J., Schrift A., Shamir A. The discrete logarithm modulo a composite hides O(n) bits. J Computer System Sci 1993, 47:376-404.
    • (1993) J Computer System Sci , vol.47 , pp. 376-404
    • Håstad, J.1    Schrift, A.2    Shamir, A.3
  • 222
    • 0043286525 scopus 로고    scopus 로고
    • The analysis of de Bruijn sequences of non-extremal weight
    • Hauge E.R., Mykkeltveit J. The analysis of de Bruijn sequences of non-extremal weight. Discrete Math 1998, 189:133-147.
    • (1998) Discrete Math , vol.189 , pp. 133-147
    • Hauge, E.R.1    Mykkeltveit, J.2
  • 224
    • 33746654569 scopus 로고    scopus 로고
    • Two new attacks on the self-shrinking generator
    • Hell M., Johansson T. Two new attacks on the self-shrinking generator. IEEE Trans Inform Theory 2006, 52:3837-3843.
    • (2006) IEEE Trans Inform Theory , vol.52 , pp. 3837-3843
    • Hell, M.1    Johansson, T.2
  • 225
    • 85032286198 scopus 로고
    • On functions of linear shift register sequences
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '85
    • Herlestam T. On functions of linear shift register sequences. LNCS 1986, vol. 219:119-129. Springer, Berlin.
    • (1986) LNCS , vol.219 , pp. 119-129
    • Herlestam, T.1
  • 226
    • 0039818145 scopus 로고
    • On eigenvalues and colorings of graphs
    • Academic Press, B. Harris (Ed.)
    • Hoffman A.J. On eigenvalues and colorings of graphs. Graph theory and its applications 1970, 78-91. Academic Press. B. Harris (Ed.).
    • (1970) Graph theory and its applications , pp. 78-91
    • Hoffman, A.J.1
  • 227
    • 0042555094 scopus 로고    scopus 로고
    • New constructions of bent functions
    • Hou X.-D. New constructions of bent functions. J Combin Inform System Sci 2000, 25:173-189.
    • (2000) J Combin Inform System Sci , vol.25 , pp. 173-189
    • Hou, X.-D.1
  • 228
    • 0031139263 scopus 로고    scopus 로고
    • On the norm and covering radius of the first-order Reed-Muller codes
    • Hou X.-D. On the norm and covering radius of the first-order Reed-Muller codes. IEEE Trans Inform Theory 1997, 43:1025-1027.
    • (1997) IEEE Trans Inform Theory , vol.43 , pp. 1025-1027
    • Hou, X.-D.1
  • 229
    • 0042527998 scopus 로고    scopus 로고
    • Cubic bent functions
    • Hou X.-D. Cubic bent functions. Discrete Math 1998, 189:149-161.
    • (1998) Discrete Math , vol.189 , pp. 149-161
    • Hou, X.-D.1
  • 231
    • 3543121915 scopus 로고    scopus 로고
    • Strongly regular graphs associated with bent functions.
    • 7th internat. symp. parallel architect., algo. and networks
    • Huang T, You K-H. Strongly regular graphs associated with bent functions. In: Proc. 7th internat. symp. parallel architect., algo. and networks; 2004. p. 380-4.
    • (2004) Proc. , pp. 380-384
    • Huang, T.1    You, K-H.2
  • 232
    • 0022476533 scopus 로고
    • A superexponential lower bound for Gröbner bases and Church-Rosser commutative Thue systems
    • Huynh D.T. A superexponential lower bound for Gröbner bases and Church-Rosser commutative Thue systems. Inform Control 1986, 68:196-206.
    • (1986) Inform Control , vol.68 , pp. 196-206
    • Huynh, D.T.1
  • 233
    • 0024768555 scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum.
    • 30th IEEE symposium on foundations of computer science
    • Impagliazzo R, Naor M. Efficient cryptographic schemes provably as secure as subset sum. In: Proc. 30th IEEE symposium on foundations of computer science; 1989. p. 236-41.
    • (1989) Proc. , pp. 236-241
    • Impagliazzo, R.1    Naor, M.2
  • 234
    • 0343387037 scopus 로고
    • Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm
    • ISO/IEC 9797. Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm; 1989.
    • (1989)
  • 235
    • 84942032508 scopus 로고    scopus 로고
    • Information technology-security techniques-data integrity, mechanism using a cryptographic check function employing a block cipher algorithm.
    • International Organization for Standards, Geneva, Switzerland; 1999
    • ISO/IEC 9797-1. Information technology-security techniques-data integrity, mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards, Geneva, Switzerland; 1999.
  • 236
    • 27544469526 scopus 로고    scopus 로고
    • OMAC: One-key CBC MAC
    • submitted for consideration to NIST
    • Iwata T, Kurosawa K. OMAC: One-key CBC MAC, submitted for consideration to NIST (available at: ); 2002. http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/ProposedModesPage.html.
    • (2002)
    • Iwata, T.1    Kurosawa, K.2
  • 237
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack on block ciphers
    • Springer, Berlin, Fast software encryption-Haifa 1997
    • Jakobsen T., Knudsen L. The interpolation attack on block ciphers. LNCS 1997, vol. 1267:28-40. Springer, Berlin.
    • (1997) LNCS , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.2
  • 238
    • 0020925487 scopus 로고
    • Multiplexed sequences: some properties of the minimum polynomial
    • Springer, Berlin, Proc. workshop on cryptography, Burg Feuerstein 1982
    • Jennings S.M. Multiplexed sequences: some properties of the minimum polynomial. LNCS 1983, vol. 149:189-206. Springer, Berlin.
    • (1983) LNCS , vol.149 , pp. 189-206
    • Jennings, S.M.1
  • 239
    • 84947776392 scopus 로고    scopus 로고
    • Reduced complexity correlation attacks on two clock controlled generators
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '98
    • Johansson T. Reduced complexity correlation attacks on two clock controlled generators. LNCS 1998, vol. 1514:342-356. Springer, Berlin.
    • (1998) LNCS , vol.1514 , pp. 342-356
    • Johansson, T.1
  • 240
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '99
    • Johansson T., Jönsson F. Improved fast correlation attacks on stream ciphers via convolutional codes. LNCS 1999, vol. 1592:347-362. Springer, Berlin.
    • (1999) LNCS , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 241
    • 84957062097 scopus 로고    scopus 로고
    • Fast correlation attacks based on turbo code techniques
    • Springer, Berlin, Adv. in crypt.-Crypto '99
    • Johansson T., Jönsson F. Fast correlation attacks based on turbo code techniques. LNCS 1999, vol. 1666:181-197. Springer, Berlin.
    • (1999) LNCS , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 242
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Springer, Berlin, Adv. in crypt.-Crypto 2000
    • Johansson T., Jönsson F. Fast correlation attacks through reconstruction of linear polynomials. LNCS 2000, vol. 1880:300-315. Springer, Berlin.
    • (2000) LNCS , vol.1880 , pp. 300-315
    • Johansson, T.1    Jönsson, F.2
  • 243
    • 3042578220 scopus 로고    scopus 로고
    • Switching of edges in strongly regular graphs. I. A family of partial difference sets on 100 vertices
    • # R17
    • Jørgensen L.K., Klin M. Switching of edges in strongly regular graphs. I. A family of partial difference sets on 100 vertices. Electronic J Combin 2003, 10. # R17.
    • (2003) Electronic J Combin , vol.10
    • Jørgensen, L.K.1    Klin, M.2
  • 244
    • 0141982449 scopus 로고    scopus 로고
    • Difference sets: an introduction
    • Kluwer Acad. Publ., Dordrecht, Difference sets, sequences and their correlation properties (Bad Windsheim, 1998)
    • Jungnickel D., Pott A. Difference sets: an introduction. NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci. 1999, vol. 542:259-295. Kluwer Acad. Publ., Dordrecht.
    • (1999) NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci. , vol.542 , pp. 259-295
    • Jungnickel, D.1    Pott, A.2
  • 245
    • 84949188947 scopus 로고    scopus 로고
    • On the complexity of Matsui's attack
    • Springer, Berlin, Selected areas crypt. 2001
    • Junod P. On the complexity of Matsui's attack. LNCS 2001, vol. 2259:199-211. Springer, Berlin.
    • (2001) LNCS , vol.2259 , pp. 199-211
    • Junod, P.1
  • 246
    • 33750424744 scopus 로고    scopus 로고
    • Statistical cryptanalysis of block ciphers.
    • Ph.D. thesis 3179. École Polytechnique Fédérale de Lausanne, Switzerland
    • Junod P. Statistical cryptanalysis of block ciphers. Ph.D. thesis 3179. École Polytechnique Fédérale de Lausanne, Switzerland; 2004.
    • (2004)
    • Junod, P.1
  • 247
    • 0018530910 scopus 로고
    • Structured design of substitution-permutation encryption networks
    • Kam J.B., Davida G.I. Structured design of substitution-permutation encryption networks. IEEE Trans Comput 1979, 28(10):747-753.
    • (1979) IEEE Trans Comput , vol.28 , Issue.10 , pp. 747-753
    • Kam, J.B.1    Davida, G.I.2
  • 249
    • 34248586580 scopus 로고    scopus 로고
    • Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity >240
    • Springer, Berlin, Indocrypt 2006
    • Kavut S., Maitra S., Yücel M.D. Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity >240. LNCS 2006, vol. 4329:266-279. Springer, Berlin.
    • (2006) LNCS , vol.4329 , pp. 266-279
    • Kavut, S.1    Maitra, S.2    Yücel, M.D.3
  • 250
    • 34248587014 scopus 로고    scopus 로고
    • Search for Boolean functions with excellent profiles in the rotation symmetric class
    • Kavut S., Maitra S., Yücel M.D. Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans Inform Theory 2007, 53:1743-1751.
    • (2007) IEEE Trans Inform Theory , vol.53 , pp. 1743-1751
    • Kavut, S.1    Maitra, S.2    Yücel, M.D.3
  • 251
    • 38349058097 scopus 로고    scopus 로고
    • Generalized rotation symmetric and dihedral symmetric boolean functions-9 variable Boolean functions with nonlinearity 242
    • Springer, Berlin, Proceedings of applied algebra, algebraic algorithms and error correcting codes
    • Kavut S., Yücel D. Generalized rotation symmetric and dihedral symmetric boolean functions-9 variable Boolean functions with nonlinearity 242. LNCS 2007, vol. 4851:321-329. Springer, Berlin.
    • (2007) LNCS , vol.4851 , pp. 321-329
    • Kavut, S.1    Yücel, D.2
  • 252
    • 84968468693 scopus 로고
    • Difference sets in Abelian groups
    • Kesava Menon P. Difference sets in Abelian groups. Proc AMS 1960, 11:368-377.
    • (1960) Proc AMS , vol.11 , pp. 368-377
    • Kesava Menon, P.1
  • 253
    • 0017017134 scopus 로고
    • An analysis of the structure and complexity of nonlinear binary sequence generators
    • Key E.L. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Trans Inform Theory 1976, 22:732-736.
    • (1976) IEEE Trans Inform Theory , vol.22 , pp. 732-736
    • Key, E.L.1
  • 255
    • 30744457834 scopus 로고    scopus 로고
    • A new characterization of semi-bent and bent functions on finite fields
    • Khoo K., Gong G., Stinson D.R. A new characterization of semi-bent and bent functions on finite fields. Des Codes Cryptogr 2006, 38:279-295.
    • (2006) Des Codes Cryptogr , vol.38 , pp. 279-295
    • Khoo, K.1    Gong, G.2    Stinson, D.R.3
  • 256
    • 0346858443 scopus 로고
    • A recursive construction method of S-boxes satisfying strict avalanche criteria
    • Springer, Berlin, Adv. in crypt.-Crypto '90
    • Kim K., Matsumoto T., Imai H. A recursive construction method of S-boxes satisfying strict avalanche criteria. LNCS 1991, vol. 537:564-574. Springer, Berlin.
    • (1991) LNCS , vol.537 , pp. 564-574
    • Kim, K.1    Matsumoto, T.2    Imai, H.3
  • 257
    • 85014957337 scopus 로고
    • Construction of DES-like S-boxes based on Boolean functions satisfying the SAC
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '91
    • Kim K. Construction of DES-like S-boxes based on Boolean functions satisfying the SAC. LNCS 1993, vol. 739:59-72. Springer, Berlin.
    • (1993) LNCS , vol.739 , pp. 59-72
    • Kim, K.1
  • 258
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem by relinearization
    • Springer, Berlin, Adv. in crypt.-Crypto '99
    • Kipnis A., Shamir A. Cryptanalysis of the HFE public key cryptosystem by relinearization. LNCS 1999, vol. 1666:19-30. Springer, Berlin.
    • (1999) LNCS , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 259
    • 84957665414 scopus 로고
    • Cryptanalysis based on 2-adic rational approximation
    • Springer, Berlin, Adv. in crypt.-Crypto '95
    • Klapper A., Goresky M. Cryptanalysis based on 2-adic rational approximation. LNCS 1995, vol. 963:262-273. Springer, Berlin.
    • (1995) LNCS , vol.963 , pp. 262-273
    • Klapper, A.1    Goresky, M.2
  • 260
    • 84942034368 scopus 로고    scopus 로고
    • The XL and XSL attacks on Baby Rijndael.
    • Iowa State University
    • Kleiman E. The XL and XSL attacks on Baby Rijndael. Master of Science Thesis. Iowa State University, ; 2005. http://orion.math.iastate.edu/dept/thesisarchive/MS/EKleimanMSSS05.pdf.
    • (2005) Master of Science Thesis.
    • Kleiman, E.1
  • 262
    • 84935039488 scopus 로고    scopus 로고
    • BDD-based cryptanalysis of keystream generators
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2002
    • Krause M. BDD-based cryptanalysis of keystream generators. LNCS 2002, vol. 2332:222-237. Springer, Berlin.
    • (2002) LNCS , vol.2332 , pp. 222-237
    • Krause, M.1
  • 263
    • 84978534017 scopus 로고
    • The shrinking generator: some practical considerations
    • Springer, Berlin, Fast software encryption-Cambridge 1993
    • Krawczyk H. The shrinking generator: some practical considerations. LNCS 1994, vol. 809:45-46. Springer, Berlin.
    • (1994) LNCS , vol.809 , pp. 45-46
    • Krawczyk, H.1
  • 264
  • 265
    • 84957365641 scopus 로고    scopus 로고
    • Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '97
    • Kurosawa K., Satoh T. Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria. LNCS 1997, vol. 1233:434-449. Springer, Berlin.
    • (1997) LNCS , vol.1233 , pp. 434-449
    • Kurosawa, K.1    Satoh, T.2
  • 266
    • 0347484712 scopus 로고
    • Sommes de Kloosterman Courbes elliptique et codes cyclique en characteristique 2
    • Lachaud G., Wolfmann J. Sommes de Kloosterman Courbes elliptique et codes cyclique en characteristique 2. C R Acad Sci Paris, Série 1 1987, 305:881-883.
    • (1987) C R Acad Sci Paris, Série 1 , vol.305 , pp. 881-883
    • Lachaud, G.1    Wolfmann, J.2
  • 267
    • 0003288228 scopus 로고
    • On the design and security of block ciphers
    • Hartung-Gorre Verlag, Kostanz
    • Lai X. On the design and security of block ciphers. ETH Series in Information Processing 1992, vol. 1. Hartung-Gorre Verlag, Kostanz.
    • (1992) ETH Series in Information Processing , vol.1
    • Lai, X.1
  • 268
    • 84948991635 scopus 로고
    • Additive and linear structures of cryptographic functions
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Lai X. Additive and linear structures of cryptographic functions. LNCS 1995, vol. 1008:75-85. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 75-85
    • Lai, X.1
  • 271
    • 24944541293 scopus 로고    scopus 로고
    • Normality of bent functions, monomial and binomial bent functions.
    • Ph.D. thesis. Ruhr Universität Bochum
    • Leander NG. Normality of bent functions, monomial and binomial bent functions. Ph.D. thesis. Ruhr Universität Bochum; 2004.
    • (2004)
    • Leander, N.G.1
  • 272
    • 0003305133 scopus 로고
    • Harmonic analysis of switching functions
    • Academic Press, New York, A. Mukhopadhyay (Ed.)
    • Lechner R.J. Harmonic analysis of switching functions. Recent developments in switching theory 1971, Academic Press, New York. A. Mukhopadhyay (Ed.).
    • (1971) Recent developments in switching theory
    • Lechner, R.J.1
  • 273
    • 35048865919 scopus 로고    scopus 로고
    • Algebraic attacks on summation generators
    • Springer, Berlin, Fast software encryption-Delhi 2004
    • Lee D.H., Kim J., Hong J., Han J.W., Moon D. Algebraic attacks on summation generators. LNCS 2004, vol. 3017:34-48. Springer, Berlin.
    • (2004) LNCS , vol.3017 , pp. 34-48
    • Lee, D.H.1    Kim, J.2    Hong, J.3    Han, J.W.4    Moon, D.5
  • 274
    • 84955622043 scopus 로고    scopus 로고
    • Conditional correlation attack on nonlinear filter generators
    • Springer, Berlin, Adv. in crypt.-Asiacrypt '96
    • Lee S., Chee S., Park S., Park S. Conditional correlation attack on nonlinear filter generators. LNCS 1996, vol. 1163:360-367. Springer, Berlin.
    • (1996) LNCS , vol.1163 , pp. 360-367
    • Lee, S.1    Chee, S.2    Park, S.3    Park, S.4
  • 275
    • 0020202995 scopus 로고
    • Maximal families of bent sequences
    • Lempel A., Cohn M. Maximal families of bent sequences. IEEE Trans Inform Theory 1982, 28:865-868.
    • (1982) IEEE Trans Inform Theory , vol.28 , pp. 865-868
    • Lempel, A.1    Cohn, M.2
  • 276
    • 0042238560 scopus 로고
    • Self-complementary normal bases in finite fields
    • Lempel A., Weinberger M.J. Self-complementary normal bases in finite fields. SIAM J Discrete Math 1988, 1:193-198.
    • (1988) SIAM J Discrete Math , vol.1 , pp. 193-198
    • Lempel, A.1    Weinberger, M.J.2
  • 279
    • 0041532142 scopus 로고
    • Counting functions satisfying a higher order strict avalanche criterion
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '89
    • Lloyd S. Counting functions satisfying a higher order strict avalanche criterion. LNCS 1990, vol. 434:63-74. Springer, Berlin.
    • (1990) LNCS , vol.434 , pp. 63-74
    • Lloyd, S.1
  • 280
    • 84942010901 scopus 로고
    • Properties of binary functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '90
    • Lloyd S. Properties of binary functions. LNCS 1991, vol. 473:124-139. Springer, Berlin.
    • (1991) LNCS , vol.473 , pp. 124-139
    • Lloyd, S.1
  • 281
    • 0041532131 scopus 로고
    • Characterizing and counting functions satisfying the strict avalanche criterion of order (n-3)
    • Clarendon Press, Oxford, C. Mitchell (Ed.)
    • Lloyd S. Characterizing and counting functions satisfying the strict avalanche criterion of order (n-3). Cryptography and coding II 1992, 165-172. Clarendon Press, Oxford. C. Mitchell (Ed.).
    • (1992) Cryptography and coding II , pp. 165-172
    • Lloyd, S.1
  • 282
    • 0026630858 scopus 로고
    • Counting binary functions with certain cryptographic properties
    • Lloyd S. Counting binary functions with certain cryptographic properties. J Cryptology 1992, 5:107-131.
    • (1992) J Cryptology , vol.5 , pp. 107-131
    • Lloyd, S.1
  • 283
    • 43949172869 scopus 로고
    • Balance uncorrelatedness and the strict avalanche criterion
    • Lloyd S. Balance uncorrelatedness and the strict avalanche criterion. Discrete Appl Math 1993, 41:223-233.
    • (1993) Discrete Appl Math , vol.41 , pp. 223-233
    • Lloyd, S.1
  • 284
    • 33745116422 scopus 로고    scopus 로고
    • Attacks based on conditional correlations against the nonlinear filter generator
    • Löhlein B. Attacks based on conditional correlations against the nonlinear filter generator, . http://eprint.iacr.org/2003/020.
    • Löhlein, B.1
  • 285
    • 0023985034 scopus 로고
    • The discrete logarithm hides O(logn) bits
    • Long D.L., Wigderson A. The discrete logarithm hides O(logn) bits. SIAM J Comput 1988, 17:363-372.
    • (1988) SIAM J Comput , vol.17 , pp. 363-372
    • Long, D.L.1    Wigderson, A.2
  • 288
    • 84942063012 scopus 로고    scopus 로고
    • A class of bent functions.
    • R41 Technical paper. August 1970
    • Maiorana JA. A class of bent functions. R41 Technical paper. August 1970.
    • Maiorana, J.A.1
  • 289
    • 34247120286 scopus 로고    scopus 로고
    • Highly nonlinear balanced Boolean functions with very good autocorrelation property
    • Elsevier, Amsterdam, 10 pages, Coding and cryptography-WCCC 2001, Paris
    • Maitra S. Highly nonlinear balanced Boolean functions with very good autocorrelation property. Electron. Notes Discrete Math. 2001, vol. 6. Elsevier, Amsterdam, 10 pages.
    • (2001) Electron. Notes Discrete Math. , vol.6
    • Maitra, S.1
  • 290
    • 0037105928 scopus 로고    scopus 로고
    • Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics
    • Maitra S. Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics. Inform Process Lett 2002, 83:281-286.
    • (2002) Inform Process Lett , vol.83 , pp. 281-286
    • Maitra, S.1
  • 291
    • 1642385969 scopus 로고    scopus 로고
    • On nonlinearity and autocorrelation properties of correlation immune Boolean functions
    • Maitra S. On nonlinearity and autocorrelation properties of correlation immune Boolean functions. JISE J Inf Sci Eng 2004, 20:305-323.
    • (2004) JISE J Inf Sci Eng , vol.20 , pp. 305-323
    • Maitra, S.1
  • 292
    • 84942023193 scopus 로고    scopus 로고
    • Further constructions of resilient Boolean functions with very high nonlinearity
    • Springer, London, Sequences and their applications (Bergen, 2001)
    • Maitra S., Pasalic E. Further constructions of resilient Boolean functions with very high nonlinearity. Discrete Math. Theor. Comput. Sci. 2002, 265-280. Springer, London.
    • (2002) Discrete Math. Theor. Comput. Sci. , pp. 265-280
    • Maitra, S.1    Pasalic, E.2
  • 293
    • 0036649611 scopus 로고    scopus 로고
    • Further constructions of resilient Boolean functions with very high nonlinearity
    • Maitra S., Pasalic E. Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Trans Inform Theory 2002, 48:1825-1834.
    • (2002) IEEE Trans Inform Theory , vol.48 , pp. 1825-1834
    • Maitra, S.1    Pasalic, E.2
  • 294
    • 84957102868 scopus 로고    scopus 로고
    • Highly nonlinear resilient functions optimizing Siegenthaler's inequality
    • Springer, Berlin, Adv. in crypt.-Crypto '99
    • Maitra S., Sarkar P. Highly nonlinear resilient functions optimizing Siegenthaler's inequality. LNCS 1999, vol. 1666:198-215. Springer, Berlin.
    • (1999) LNCS , vol.1666 , pp. 198-215
    • Maitra, S.1    Sarkar, P.2
  • 295
    • 0033609575 scopus 로고    scopus 로고
    • Hamming weights of correlation immune Boolean functions
    • Maitra S., Sarkar P. Hamming weights of correlation immune Boolean functions. Inform Process Lett 1999, 71:149-153.
    • (1999) Inform Process Lett , vol.71 , pp. 149-153
    • Maitra, S.1    Sarkar, P.2
  • 296
    • 85014131318 scopus 로고    scopus 로고
    • Characterization of symmetric bent functions-an elementary proof
    • Maitra S., Sarkar P. Characterization of symmetric bent functions-an elementary proof. J Combin Math Combin Comput 2002, 43:227-230.
    • (2002) J Combin Math Combin Comput , vol.43 , pp. 227-230
    • Maitra, S.1    Sarkar, P.2
  • 297
    • 0036713330 scopus 로고    scopus 로고
    • Maximum nonlinearity of symmetric Boolean functions on odd number of variables
    • Maitra S., Sarkar P. Maximum nonlinearity of symmetric Boolean functions on odd number of variables. IEEE Trans Inform Theory 2002, 48:2626-2630.
    • (2002) IEEE Trans Inform Theory , vol.48 , pp. 2626-2630
    • Maitra, S.1    Sarkar, P.2
  • 298
    • 0037029298 scopus 로고    scopus 로고
    • Cryptographically significant Boolean functions with five valued Walsh spectra
    • Maitra S., Sarkar P. Cryptographically significant Boolean functions with five valued Walsh spectra. Theoret Comput Sci 2002, 276:133-146.
    • (2002) Theoret Comput Sci , vol.276 , pp. 133-146
    • Maitra, S.1    Sarkar, P.2
  • 299
    • 0036158533 scopus 로고    scopus 로고
    • Modifications of Patterson-Wiedemann functions for cryptographic applications
    • Maitra S., Sarkar P. Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Trans Inform Theory 2002, 48:278-284.
    • (2002) IEEE Trans Inform Theory , vol.48 , pp. 278-284
    • Maitra, S.1    Sarkar, P.2
  • 300
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • Massey J.L. Shift-register synthesis and BCH decoding. IEEE Trans Inform Theory 1969, 15:122-127.
    • (1969) IEEE Trans Inform Theory , vol.15 , pp. 122-127
    • Massey, J.L.1
  • 301
    • 0000937205 scopus 로고
    • A Fourier transform approach to the linear complexity of nonlinearly filtered sequences
    • Springer, Berlin, Adv. in crypt.-Crypto '94
    • Massey J.L., Serconek S. A Fourier transform approach to the linear complexity of nonlinearly filtered sequences. LNCS 1994, vol. 839:332-340. Springer, Berlin.
    • (1994) LNCS , vol.839 , pp. 332-340
    • Massey, J.L.1    Serconek, S.2
  • 302
    • 84955614319 scopus 로고    scopus 로고
    • Linear complexity of periodic sequences: a general theory
    • Springer, Berlin, Adv. in crypt.-Crypto '96
    • Massey J.L., Serconek S. Linear complexity of periodic sequences: a general theory. LNCS 1996, vol. 1109:358-371. Springer, Berlin.
    • (1996) LNCS , vol.1109 , pp. 358-371
    • Massey, J.L.1    Serconek, S.2
  • 303
    • 33747285760 scopus 로고
    • A new method for known plaintext attack of FEAL cipher
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '92
    • Matsui M., Yamagishi A. A new method for known plaintext attack of FEAL cipher. LNCS 1993, vol. 658:81-91. Springer, Berlin.
    • (1993) LNCS , vol.658 , pp. 81-91
    • Matsui, M.1    Yamagishi, A.2
  • 304
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Matsui M. Linear cryptanalysis method for DES cipher. LNCS 1994, vol. 765:386-397. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 305
    • 84948954431 scopus 로고
    • On correlation between the order of S-boxes and the strength of DES
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '94
    • Matsui M. On correlation between the order of S-boxes and the strength of DES. LNCS 1995, vol. 950:366-375. Springer, Berlin.
    • (1995) LNCS , vol.950 , pp. 366-375
    • Matsui, M.1
  • 306
    • 33746922201 scopus 로고    scopus 로고
    • Plateaued rotation symmetric Boolean functions on odd number of variables.
    • cryptography and applications (BFCA05), 2005, Rouen, France (also available at )
    • Maximov A, Hell M, Maitra S. Plateaued rotation symmetric Boolean functions on odd number of variables. In: First Workshop on Boolean Functions: cryptography and applications (BFCA05), 2005, Rouen, France (also available at ). http://www.eprint.iacr.org/2004/144.ps.
    • First Workshop on Boolean Functions
    • Maximov, A.1    Hell, M.2    Maitra, S.3
  • 307
    • 38149146344 scopus 로고
    • Weight class distributions of de Bruijn sequences
    • Mayhew G.L. Weight class distributions of de Bruijn sequences. Discrete Math 1994, 126:425-429.
    • (1994) Discrete Math , vol.126 , pp. 425-429
    • Mayhew, G.L.1
  • 308
    • 0035815405 scopus 로고    scopus 로고
    • Further results on de Bruijn weight classes
    • Mayhew G.L. Further results on de Bruijn weight classes. Discrete Math 2001, 232:171-173.
    • (2001) Discrete Math , vol.232 , pp. 171-173
    • Mayhew, G.L.1
  • 309
    • 0001751788 scopus 로고
    • The complexity of the word problem for commutative semigroups and polynomial ideals
    • Mayr E.W., Meyer A. The complexity of the word problem for commutative semigroups and polynomial ideals. Adv Math 1982, 46:305-329.
    • (1982) Adv Math , vol.46 , pp. 305-329
    • Mayr, E.W.1    Meyer, A.2
  • 310
    • 84942068388 scopus 로고    scopus 로고
    • A discrete Fourier theory for binary functions
    • R41 Technical paper; June 1971
    • McFarland R. A discrete Fourier theory for binary functions. R41 Technical paper; June 1971.
    • McFarland, R.1
  • 311
    • 0015803919 scopus 로고
    • A family of difference sets in non-cyclic groups
    • McFarland R. A family of difference sets in non-cyclic groups. J Combin Theory A 1973, 15:1-10.
    • (1973) J Combin Theory A , vol.15 , pp. 1-10
    • McFarland, R.1
  • 313
    • 33845303377 scopus 로고    scopus 로고
    • The security and performance of the Galois/counter mode (GCM) of operation
    • Springer, Berlin, Indocrypt 2004
    • McGrew D., Viega J. The security and performance of the Galois/counter mode (GCM) of operation. LNCS 2004, vol. 3348:343-355. Springer, Berlin.
    • (2004) LNCS , vol.3348 , pp. 343-355
    • McGrew, D.1    Viega, J.2
  • 314
    • 0141818749 scopus 로고    scopus 로고
    • Classification of regular two-graphs on 36 and 38 vertices
    • McKay B.D., Spence E. Classification of regular two-graphs on 36 and 38 vertices. Australas J Combin 2001, 24:293-300.
    • (2001) Australas J Combin , vol.24 , pp. 293-300
    • McKay, B.D.1    Spence, E.2
  • 315
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of Boolean functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2004
    • Meier W., Pasalic E., Carlet C. Algebraic attacks and decomposition of Boolean functions. LNCS 2004, vol. 3027:474-491. Springer, Berlin.
    • (2004) LNCS , vol.3027 , pp. 474-491
    • Meier, W.1    Pasalic, E.2    Carlet, C.3
  • 316
    • 33745650569 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '88
    • Meier W., Staffelbach O. Fast correlation attacks on certain stream ciphers. LNCS 1989, vol. 330:301-314. Springer, Berlin.
    • (1989) LNCS , vol.330 , pp. 301-314
    • Meier, W.1    Staffelbach, O.2
  • 317
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Meier W., Staffelbach O. Fast correlation attacks on certain stream ciphers. J Cryptology 1988-89, 1:159-176.
    • (1988) J Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 318
    • 84962928435 scopus 로고
    • Nonlinearity criteria for cryptographic functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '89
    • Meier W., Staffelbach O. Nonlinearity criteria for cryptographic functions. LNCS 1990, vol. 434:549-562. Springer, Berlin.
    • (1990) LNCS , vol.434 , pp. 549-562
    • Meier, W.1    Staffelbach, O.2
  • 319
    • 85043758242 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '90
    • Meier W., Staffelbach O. Correlation properties of combiners with memory in stream ciphers. LNCS 1991, vol. 473:204-213. Springer, Berlin.
    • (1991) LNCS , vol.473 , pp. 204-213
    • Meier, W.1    Staffelbach, O.2
  • 320
    • 0026678847 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • Meier W., Staffelbach O. Correlation properties of combiners with memory in stream ciphers. J Cryptology 1992, 5:67-86.
    • (1992) J Cryptology , vol.5 , pp. 67-86
    • Meier, W.1    Staffelbach, O.2
  • 321
    • 84948963544 scopus 로고
    • The self-shrinking generator
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '94
    • Meier W., Staffelbach O. The self-shrinking generator. LNCS 1995, vol. 950:205-214. Springer, Berlin.
    • (1995) LNCS , vol.950 , pp. 205-214
    • Meier, W.1    Staffelbach, O.2
  • 324
    • 33846794543 scopus 로고    scopus 로고
    • On the degree of homogeneous bent functions
    • Meng Q., Zhang H., Yang M., Cui J. On the degree of homogeneous bent functions. Discrete Appl Math 2007, 155:665-669.
    • (2007) Discrete Appl Math , vol.155 , pp. 665-669
    • Meng, Q.1    Zhang, H.2    Yang, M.3    Cui, J.4
  • 326
    • 85028870469 scopus 로고
    • An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
    • Springer, Berlin, Adv. in crypt.-Auscrypt '92
    • Mihaljević M.J. An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure. LNCS 1993, vol. 718:349-356. Springer, Berlin.
    • (1993) LNCS , vol.718 , pp. 349-356
    • Mihaljević, M.J.1
  • 327
    • 84947910320 scopus 로고    scopus 로고
    • A faster cryptanalysis of the self-shrinking generator
    • Springer, Berlin, Information security and privacy 1996
    • Mihaljević M.J. A faster cryptanalysis of the self-shrinking generator. LNCS 1996, vol. 1172:182-189. Springer, Berlin.
    • (1996) LNCS , vol.1172 , pp. 182-189
    • Mihaljević, M.J.1
  • 328
    • 84974727960 scopus 로고    scopus 로고
    • A low complexity and high performance algorithm for the fast correlation attack
    • Springer, Berlin, Fast software encryption-New York 2000
    • Mihaljević M.J., Fossorier M., Imai H. A low complexity and high performance algorithm for the fast correlation attack. LNCS 2001, vol. 1978:196-212. Springer, Berlin.
    • (2001) LNCS , vol.1978 , pp. 196-212
    • Mihaljević, M.J.1    Fossorier, M.2    Imai, H.3
  • 329
    • 84958981368 scopus 로고    scopus 로고
    • Fast correlation attack algorithm with list decoding and an application
    • Springer, Berlin, Fast software encryption-Yokohama 2001
    • Mihaljević M.J., Fossorier M., Imai H. Fast correlation attack algorithm with list decoding and an application. LNCS 2002, vol. 2355:196-210. Springer, Berlin.
    • (2002) LNCS , vol.2355 , pp. 196-210
    • Mihaljević, M.J.1    Fossorier, M.2    Imai, H.3
  • 330
    • 85032480688 scopus 로고
    • A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
    • Springer, Berlin, Adv. in crypt.-Auscrypt '90
    • Mihaljević M.J., Golić J.D. A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. LNCS 1990, vol. 453:165-175. Springer, Berlin.
    • (1990) LNCS , vol.453 , pp. 165-175
    • Mihaljević, M.J.1    Golić, J.D.2
  • 331
    • 84974658205 scopus 로고
    • A comparison of cryptanalytic principles based on iterative error-correction
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '91
    • Mihaljević M.J., Golić J.D. A comparison of cryptanalytic principles based on iterative error-correction. LNCS 1992, vol. 547:527-531. Springer, Berlin.
    • (1992) LNCS , vol.547 , pp. 527-531
    • Mihaljević, M.J.1    Golić, J.D.2
  • 332
    • 33745992035 scopus 로고
    • Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '92
    • Mihaljević M.J., Golić J.D. Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence. LNCS 1993, vol. 658:124-137. Springer, Berlin.
    • (1993) LNCS , vol.658 , pp. 124-137
    • Mihaljević, M.J.1    Golić, J.D.2
  • 333
    • 85014247500 scopus 로고    scopus 로고
    • Spectral analysis of Boolean functions under nonuniformity of arguments
    • Miranovich K. Spectral analysis of Boolean functions under nonuniformity of arguments, . http://eprint.iacr.org/2002/021.
    • Miranovich, K.1
  • 334
    • 0025680569 scopus 로고
    • Enumerating Boolean functions of cryptographic significance
    • Mitchell C. Enumerating Boolean functions of cryptographic significance. J Cryptology 1990, 2:155-170.
    • (1990) J Cryptology , vol.2 , pp. 155-170
    • Mitchell, C.1
  • 335
    • 84942054299 scopus 로고    scopus 로고
    • Workshop 1 (October 20, 2000), Baltimore, Maryland, USA
    • Modes of Operation. Workshop 1 (October 20, 2000), Baltimore, Maryland, USA, . http://csrc.nist.gov/CryptoToolkit/modes/.
  • 336
    • 84942022239 scopus 로고    scopus 로고
    • Workshop 2 (August 24, 2001), Goleta, California, USA
    • Modes of Operation. Workshop 2 (August 24, 2001), Goleta, California, USA, . http://csrc.nist.gov/CryptoToolkit/modes/.
  • 337
    • 35048890615 scopus 로고    scopus 로고
    • On some weak extensions of AES and BES
    • Springer, Berlin, The 6th international conference on information and communications security 2004
    • Monnerat J., Vaudenay S. On some weak extensions of AES and BES. LNCS 2004, vol. 3269:414-426. Springer, Berlin.
    • (2004) LNCS , vol.3269 , pp. 414-426
    • Monnerat, J.1    Vaudenay, S.2
  • 338
    • 33745648399 scopus 로고    scopus 로고
    • Higher order differential attack using chosen higher order differences
    • Springer, Berlin, Selected areas crypt. 1998
    • Moriai S., Shimoyama T., Kaneko T. Higher order differential attack using chosen higher order differences. LNCS 1999, vol. 1556:106-117. Springer, Berlin.
    • (1999) LNCS , vol.1556 , pp. 106-117
    • Moriai, S.1    Shimoyama, T.2    Kaneko, T.3
  • 339
    • 84937413721 scopus 로고    scopus 로고
    • Esential algebraic structures within the AES
    • Springer, Berlin, Adv. in crypt.-Crypto 2002
    • Murphy S., Robshaw M.J. Esential algebraic structures within the AES. LNCS 2002, vol. 2442:1-16. Springer, Berlin.
    • (2002) LNCS , vol.2442 , pp. 1-16
    • Murphy, S.1    Robshaw, M.J.2
  • 340
    • 33645382225 scopus 로고    scopus 로고
    • Comments on the security of the AES and the XSL technique
    • September 26
    • Murphy S, Robshaw MJ. Comments on the security of the AES and the XSL technique, September 26; 2002. http://www.isg.rhul.ac.uk/~mrobshaw/rijndael/xslnote.pdf.
    • (2002)
    • Murphy, S.1    Robshaw, M.J.2
  • 341
    • 0000738567 scopus 로고
    • A lemma that is not Burnside's
    • Neumann PM A lemma that is not Burnside's. Math Scientist 1979, 4:133-141.
    • (1979) Math Scientist , vol.4 , pp. 133-141
    • Neumann, P.M.1
  • 342
    • 85014233750 scopus 로고    scopus 로고
    • Modes of operations for symmetric block ciphers
    • NIST. Modes of operations for symmetric block ciphers (available at: ). http://csrc.nist.gov/CryptoToolkit/modes/.
  • 343
    • 85014183355 scopus 로고    scopus 로고
    • Request for AES proposals
    • NIST. Request for AES proposals, . http://csrc.nist.gov/CryptoToolkit/aes/pre-round1/aes_.9709.htm.
  • 344
    • 33746006003 scopus 로고
    • Construction of bent functions and difference sets
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '90
    • Nyberg K. Construction of bent functions and difference sets. LNCS 1991, vol. 473:151-160. Springer, Berlin.
    • (1991) LNCS , vol.473 , pp. 151-160
    • Nyberg, K.1
  • 345
    • 85030461165 scopus 로고
    • Perfect nonlinear S-boxes
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '91
    • Nyberg K. Perfect nonlinear S-boxes. LNCS 1992, vol. 547:378-386. Springer, Berlin.
    • (1992) LNCS , vol.547 , pp. 378-386
    • Nyberg, K.1
  • 346
    • 85027157211 scopus 로고
    • On the construction of highly nonlinear permutations
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '92
    • Nyberg K. On the construction of highly nonlinear permutations. LNCS 1992, vol. 658:92-98. Springer, Berlin.
    • (1992) LNCS , vol.658 , pp. 92-98
    • Nyberg, K.1
  • 347
    • 85026918264 scopus 로고
    • New bent mapping suitable for fast implementation
    • Springer, Berlin, Fast software encryption-Cambridge 1993
    • Nyberg K. New bent mapping suitable for fast implementation. LNCS 1994, vol. 809:179-184. Springer, Berlin.
    • (1994) LNCS , vol.809 , pp. 179-184
    • Nyberg, K.1
  • 348
    • 84948979030 scopus 로고
    • S-boxes and round functions with controllable linearity and differential uniformity
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Nyberg K. S-boxes and round functions with controllable linearity and differential uniformity. LNCS 1995, vol. 1008:111-130. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 111-130
    • Nyberg, K.1
  • 349
    • 0028699983 scopus 로고
    • An upper bound on the number of functions satisfying the strict avalanche criterion
    • O'Connor L. An upper bound on the number of functions satisfying the strict avalanche criterion. Inform Process Lett 1994, 52:325-327.
    • (1994) Inform Process Lett , vol.52 , pp. 325-327
    • O'Connor, L.1
  • 350
    • 0028499108 scopus 로고
    • Algebraic nonlinearity and its application to cryptography
    • O'Connor L., Klapper A. Algebraic nonlinearity and its application to cryptography. J Cryptology 1994, 7:213-227.
    • (1994) J Cryptology , vol.7 , pp. 213-227
    • O'Connor, L.1    Klapper, A.2
  • 351
    • 85014158269 scopus 로고    scopus 로고
    • Robertson EF
    • O'Connor JJ, Robertson EF. George Boole, . http://www.history.mcs.st-andrews.ac.uk/Biographies/Boole.html.
    • George Boole
    • O'Connor, J.J1
  • 353
    • 8744316540 scopus 로고    scopus 로고
    • AES-The state of the art of Rijndael's security
    • (October 30, 2002)
    • Oswald E, Daemen J, Rijmen V. AES-The state of the art of Rijndael's security. Technical report (October 30, 2002), . http://www.citeseerx.ist.psu.edu/viewdoc/summary%3Fdoi%3D10.1.1.3.164.
    • Technical report
    • Oswald, E.1    Daemen, J.2    Rijmen, V.3
  • 354
    • 84957622876 scopus 로고
    • On the security of the Gollmann cascades
    • Springer, Berlin, Adv. in crypt.-Crypto '95
    • Park S.-J., Lee S.-J., Goh S.-C. On the security of the Gollmann cascades. LNCS 1995, vol. 963:148-156. Springer, Berlin.
    • (1995) LNCS , vol.963 , pp. 148-156
    • Park, S.-J.1    Lee, S.-J.2    Goh, S.-C.3
  • 355
    • 0008457510 scopus 로고    scopus 로고
    • Improving bounds for the number of correlation immune Boolean functions
    • Park S.M., Lee S., Sung S.H., Kim K. Improving bounds for the number of correlation immune Boolean functions. Inform Process Lett 1997, 61:209-212.
    • (1997) Inform Process Lett , vol.61 , pp. 209-212
    • Park, S.M.1    Lee, S.2    Sung, S.H.3    Kim, K.4
  • 356
    • 34247148213 scopus 로고    scopus 로고
    • New constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity
    • Elsevier Ltd, Amsterdam, Workshop on Coding and Cryptography-WCC2001
    • Pasalic E., Johansson T., Maitra S., Sarkar P. New constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity. Electronic notes in discrete mathematics 2001, vol. 6. Elsevier Ltd, Amsterdam.
    • (2001) Electronic notes in discrete mathematics , vol.6
    • Pasalic, E.1    Johansson, T.2    Maitra, S.3    Sarkar, P.4
  • 357
    • 0036672636 scopus 로고    scopus 로고
    • Linear codes in generalized construction of resilient functions with very high nonlinearity
    • Pasalic E., Maitra S. Linear codes in generalized construction of resilient functions with very high nonlinearity. IEEE Trans Inform Theory 2002, 48:2182-2191.
    • (2002) IEEE Trans Inform Theory , vol.48 , pp. 2182-2191
    • Pasalic, E.1    Maitra, S.2
  • 358
    • 84947932132 scopus 로고    scopus 로고
    • Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '96
    • Patarin J. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. LNCS 1996, vol. 1070:33-48. Springer, Berlin.
    • (1996) LNCS , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 359
    • 84957638120 scopus 로고    scopus 로고
    • An efficient discrete log pseudo-random generator
    • Springer, Berlin, Adv. in crypt.-Crypto '98
    • Patel S., Sundaram G.S. An efficient discrete log pseudo-random generator. LNCS 1998, vol. 1462:304-317. Springer, Berlin.
    • (1998) LNCS , vol.1462 , pp. 304-317
    • Patel, S.1    Sundaram, G.S.2
  • 360
    • 0020748803 scopus 로고
    • 15, 16) Reed-Muller code is at least 16276
    • see also the correction in IEEE Trans Inform Theory 36 (1990), 443
    • 15, 16) Reed-Muller code is at least 16276. IEEE Trans Inform Theory 1983, 29:354-356. see also the correction in IEEE Trans Inform Theory 36 (1990), 443.
    • (1983) IEEE Trans Inform Theory , vol.29 , pp. 354-356
    • Patterson, N.J.1    Wiedemann, D.H.2
  • 361
    • 84958958752 scopus 로고    scopus 로고
    • Correlation atttacks on stream ciphers: computing low-weight parity checks based on error-correcting codes
    • Springer, Berlin, Fast software encryption-Cambridge 1996
    • Penzhorn W.T. Correlation atttacks on stream ciphers: computing low-weight parity checks based on error-correcting codes. LNCS 1997, vol. 1039:159-172. Springer, Berlin.
    • (1997) LNCS , vol.1039 , pp. 159-172
    • Penzhorn, W.T.1
  • 362
    • 0039783282 scopus 로고
    • Simultaneous security of bits in the discrete log
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '85
    • Peralta R. Simultaneous security of bits in the discrete log. LNCS 1986, vol. 219:62-72. Springer, Berlin.
    • (1986) LNCS , vol.219 , pp. 62-72
    • Peralta, R.1
  • 363
    • 84940007880 scopus 로고
    • Nonlinearity of exponent permutations
    • Springer, Berlin, Adv. in crypt.-Eurocrypt' 89
    • Pieprzyk J.P. Nonlinearity of exponent permutations. LNCS 1990, vol. 434:80-92. Springer, Berlin.
    • (1990) LNCS , vol.434 , pp. 80-92
    • Pieprzyk, J.P.1
  • 366
    • 50249129426 scopus 로고    scopus 로고
    • Block ciphers: security proofs, cryptanalysis, design, and fault attacks.
    • Ph.D. thesis. Université Catholique de Louvain
    • Piret G-F. Block ciphers: security proofs, cryptanalysis, design, and fault attacks. Ph.D. thesis. Université Catholique de Louvain, 2005.
    • (2005)
    • Piret, G-F.1
  • 367
    • 85014230989 scopus 로고    scopus 로고
    • Fourier analysis of Boolean maps-a tutorial
    • Pommerening K. Fourier analysis of Boolean maps-a tutorial, manuscript, 2005 (available at: ). http://www.staff.uni-mainz.de/pommeren/Kryptologie/Bitblock/A_Nonlin/Fourier.pdf.
    • (2005) manuscript
    • Pommerening, K.1
  • 368
    • 0003746279 scopus 로고
    • Analysis and design of cryptographic hash functions.
    • Ph.D. thesis. Katholieke Universiteit Leuven, Belgium
    • Preneel B. Analysis and design of cryptographic hash functions. Ph.D. thesis. Katholieke Universiteit Leuven, Belgium; 1993.
    • (1993)
    • Preneel, B.1
  • 369
    • 84942067337 scopus 로고    scopus 로고
    • Final report of European project IST-1999 12324
    • New European Schemes for Signatures, Integrity, and Encryption
    • Preneel B, Biryukov A, de Cannière C, Örs SB, Oswald E, van Rompay B et al. Final report of European project IST-1999 12324. New European Schemes for Signatures, Integrity, and Encryption, . https://www.cosic.esat.kuleuven.be/nessie/.
    • Preneel, B.1    Biryukov, A.2    de Cannière, C.3    Örs, S.B.4    Oswald, E.5    van Rompay, B.6
  • 370
    • 0000233904 scopus 로고
    • Boolean functions satisfying higher order propagation criteria
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '91
    • Preneel B., Govaerts R., Vandewalle J. Boolean functions satisfying higher order propagation criteria. LNCS 1992, vol. 547:141-152. Springer, Berlin.
    • (1992) LNCS , vol.547 , pp. 141-152
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 371
    • 84955621100 scopus 로고
    • Propagation characteristics of Boolean functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '90
    • Preneel B., Van Leekwijck W., Van Linden L., Govaerts R., Vandewalle J. Propagation characteristics of Boolean functions. LNCS 1991, vol. 473:161-173. Springer, Berlin.
    • (1991) LNCS , vol.473 , pp. 161-173
    • Preneel, B.1    Van Leekwijck, W.2    Van Linden, L.3    Govaerts, R.4    Vandewalle, J.5
  • 372
    • 33746051588 scopus 로고    scopus 로고
    • A note on triangle-free and bipartite graphs
    • Prömel H.J., Schickinger T., Steger A. A note on triangle-free and bipartite graphs. Discrete Math 2002, 257:531-540.
    • (2002) Discrete Math , vol.257 , pp. 531-540
    • Prömel, H.J.1    Schickinger, T.2    Steger, A.3
  • 373
    • 84885903924 scopus 로고    scopus 로고
    • On the symmetric property of homogeneous Boolean functions
    • Springer, Berlin, Proc. Australian conference on information security and privacy 1999
    • Qu C., Seberry J., Pieprzyk J.P. On the symmetric property of homogeneous Boolean functions. LNCS 1999, vol. 1587:26-35. Springer, Berlin.
    • (1999) LNCS , vol.1587 , pp. 26-35
    • Qu, C.1    Seberry, J.2    Pieprzyk, J.P.3
  • 375
    • 0348091086 scopus 로고
    • De Bruijn sequences-a model example of the interaction of discrete mathematics and computer science
    • Ralston A. De Bruijn sequences-a model example of the interaction of discrete mathematics and computer science. Math Mag 1982, 55:131-143.
    • (1982) Math Mag , vol.55 , pp. 131-143
    • Ralston, A.1
  • 376
    • 0000580915 scopus 로고
    • Factorial experiments derivable from combinatorial arrangements of arrays
    • Rao C.R. Factorial experiments derivable from combinatorial arrangements of arrays. J Roy Statist Soc 1947, 9:128-139.
    • (1947) J Roy Statist Soc , vol.9 , pp. 128-139
    • Rao, C.R.1
  • 378
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Rivest R.L. The RC5 encryption algorithm. LNCS 1995, vol. 1008:86-96. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 379
    • 84885958535 scopus 로고    scopus 로고
    • Block encryption algorithm with data dependent rotation.
    • US patent #5, 724, 428, issued on March 3
    • Rivest RL. Block encryption algorithm with data dependent rotation. US patent #5, 724, 428, issued on March 3, 1998.
    • (1998)
    • Rivest, R.L.1
  • 380
    • 0043126255 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems.
    • MIT Memo MIT/LCS/TM-82
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. MIT Memo MIT/LCS/TM-82; 1977.
    • (1977)
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 381
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm ACM 1978, 21:120-126.
    • (1978) Comm ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 382
    • 18444411945 scopus 로고    scopus 로고
    • Sur la non-linéarité des fonctions booléennes
    • Rodier F. Sur la non-linéarité des fonctions booléennes. Acta Arithmetica 2004, 115:1-22.
    • (2004) Acta Arithmetica , vol.115 , pp. 1-22
    • Rodier, F.1
  • 383
    • 33744764086 scopus 로고    scopus 로고
    • Asymptotic nonlinearity of Boolean functions.
    • Coding and cryptography-WCC 2003, INRIA
    • Rodier F. Asymptotic nonlinearity of Boolean functions. Coding and cryptography-WCC 2003, INRIA, p. 397-405.
    • Rodier, F.1
  • 385
    • 47849098280 scopus 로고
    • On bent functions
    • Rothaus O.S. On bent functions. J Combin Theory A 1976, 20:300-305.
    • (1976) J Combin Theory A , vol.20 , pp. 300-305
    • Rothaus, O.S.1
  • 387
    • 84947952147 scopus 로고
    • Correlation immunity and the summation generator
    • Springer, Berlin, Adv. in crypt.-Crypto '85
    • Rueppel R.A. Correlation immunity and the summation generator. LNCS 1986, vol. 218:260-272. Springer, Berlin.
    • (1986) LNCS , vol.218 , pp. 260-272
    • Rueppel, R.A.1
  • 390
    • 0023213033 scopus 로고
    • Products of linear recurring sequences with maximum complexity
    • Rueppel R.A., Staffelbach O.J. Products of linear recurring sequences with maximum complexity. IEEE Trans Inform Theory 1987, 33:124-131.
    • (1987) IEEE Trans Inform Theory , vol.33 , pp. 124-131
    • Rueppel, R.A.1    Staffelbach, O.J.2
  • 391
    • 0033299654 scopus 로고    scopus 로고
    • An efficient algorithm for generating necklaces with fixed density
    • Ruskey F., Sawada J. An efficient algorithm for generating necklaces with fixed density. SIAM J Comput 1999, 29:671-684.
    • (1999) SIAM J Comput , vol.29 , pp. 671-684
    • Ruskey, F.1    Sawada, J.2
  • 392
    • 84942057137 scopus 로고    scopus 로고
    • Cryptological viewpoint of Boolean functions.
    • Ph.D. thesis. The Middle East Technical University
    • Sağdic{ogonek}oğlu S. Cryptological viewpoint of Boolean functions. Ph.D. thesis. The Middle East Technical University; 2003.
    • (2003)
    • Sağdicoğlu, S.1
  • 393
    • 84942066410 scopus 로고    scopus 로고
    • Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers.
    • Department of Computer Science
    • Sakthivel G. Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers. Master's project report, Rochester Institute of Technology, Department of Computer Science; 2005.
    • (2005) Master's project report, Rochester Institute of Technology
    • Sakthivel, G.1
  • 394
    • 0033723269 scopus 로고    scopus 로고
    • A note on the spectral characterization of Boolean functions
    • Sarkar P. A note on the spectral characterization of Boolean functions. Inform Process Lett 2000, 74:191-195.
    • (2000) Inform Process Lett , vol.74 , pp. 191-195
    • Sarkar, P.1
  • 395
    • 84969396978 scopus 로고    scopus 로고
    • Nonlinearity bounds and constructions of resilient Boolean functions
    • Springer, Berlin, Adv. in crypt.-Crypto 2000
    • Sarkar P., Maitra S. Nonlinearity bounds and constructions of resilient Boolean functions. LNCS 2000, vol. 1880:515-532. Springer, Berlin.
    • (2000) LNCS , vol.1880 , pp. 515-532
    • Sarkar, P.1    Maitra, S.2
  • 396
    • 84948968383 scopus 로고    scopus 로고
    • Construction of nonlinear Boolean functions with important cryptographic properties
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
    • Sarkar P., Maitra S. Construction of nonlinear Boolean functions with important cryptographic properties. LNCS 2000, vol. 1807:485-506. Springer, Berlin.
    • (2000) LNCS , vol.1807 , pp. 485-506
    • Sarkar, P.1    Maitra, S.2
  • 397
    • 0036005143 scopus 로고    scopus 로고
    • Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes
    • Sarkar P., Maitra S. Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes. Theory Comput Syst 2002, 35:39-57.
    • (2002) Theory Comput Syst , vol.35 , pp. 39-57
    • Sarkar, P.1    Maitra, S.2
  • 398
    • 4544354899 scopus 로고    scopus 로고
    • Construction of nonlinear resilient Boolean functions using 'small' affine functions
    • Sarkar P., Maitra S. Construction of nonlinear resilient Boolean functions using 'small' affine functions. IEEE Trans Inform Theory 2004, 50:2185-2193.
    • (2004) IEEE Trans Inform Theory , vol.50 , pp. 2185-2193
    • Sarkar, P.1    Maitra, S.2
  • 399
    • 84870532725 scopus 로고    scopus 로고
    • The Advanced Encryption Standard (Rijndael)
    • Savard J. The Advanced Encryption Standard (Rijndael), . http://www.quadibloc.com/crypto/co040401.htm.
    • Savard, J.1
  • 400
    • 37749041414 scopus 로고
    • On the bent Boolean functions that are symmetric
    • Savicky P. On the bent Boolean functions that are symmetric. European J Combin 1994, 15:407-410.
    • (1994) European J Combin , vol.15 , pp. 407-410
    • Savicky, P.1
  • 402
    • 84949206970 scopus 로고    scopus 로고
    • A note on the construction and upper bounds of correlation-immune functions
    • Springer, Berlin, Cryptography and coding 6th IMA conference
    • Schneider M. A note on the construction and upper bounds of correlation-immune functions. LNCS 1997, vol. 1355:295-306. Springer, Berlin.
    • (1997) LNCS , vol.1355 , pp. 295-306
    • Schneider, M.1
  • 403
    • 85014196253 scopus 로고    scopus 로고
    • On the construction and upper bounds of balanced and correlation-immune functions
    • Schneider M. On the construction and upper bounds of balanced and correlation-immune functions. Selected Areas Crypt 1997, 73-87.
    • (1997) Selected Areas Crypt , pp. 73-87
    • Schneider, M.1
  • 406
    • 1642263842 scopus 로고    scopus 로고
    • Construction of cubic homogeneous Boolean bent functions
    • Seberry J., Xia T., Pieprzyk J.P. Construction of cubic homogeneous Boolean bent functions. Australas J Combin 2000, 22:233-245.
    • (2000) Australas J Combin , vol.22 , pp. 233-245
    • Seberry, J.1    Xia, T.2    Pieprzyk, J.P.3
  • 407
    • 85028888814 scopus 로고
    • Highly nonlinear 0-1 balanced Boolean functions satisfying strict avalanche criterion
    • Springer, Berlin, Adv. in crypt.-Auscrypt '92
    • Seberry J., Zhang X.-M. Highly nonlinear 0-1 balanced Boolean functions satisfying strict avalanche criterion. LNCS 1993, vol. 718:145-155. Springer, Berlin.
    • (1993) LNCS , vol.718 , pp. 145-155
    • Seberry, J.1    Zhang, X.-M.2
  • 408
    • 85007446434 scopus 로고
    • On construction and nonlinearity of correlation immune functions
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Seberry J., Zhang X.-M., Zheng Y. On construction and nonlinearity of correlation immune functions. LNCS 1994, vol. 765:181-199. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 181-199
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 409
    • 0028768217 scopus 로고
    • Improving the strict avalanche characteristics of cryptographic functions
    • Seberry J., Zhang X.-M., Zheng Y. Improving the strict avalanche characteristics of cryptographic functions. Inform Process Lett 1994, 50:37-41.
    • (1994) Inform Process Lett , vol.50 , pp. 37-41
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 410
    • 84961389779 scopus 로고
    • Nonlinearly balanced functions and their propagation characteristics
    • Springer, Berlin, Adv. in crypt.-Crypto '93
    • Seberry J., Zhang X.-M., Zheng Y. Nonlinearly balanced functions and their propagation characteristics. LNCS 1994, vol. 773:49-60. Springer, Berlin.
    • (1994) LNCS , vol.773 , pp. 49-60
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 411
    • 84948966990 scopus 로고
    • Relationships among nonlinearity criteria
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '94
    • Seberry J., Zhang X.-M., Zheng Y. Relationships among nonlinearity criteria. LNCS 1995, vol. 950:389-398. Springer, Berlin.
    • (1995) LNCS , vol.950 , pp. 389-398
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 412
    • 0012473975 scopus 로고
    • Nonlinearity and propagation characteristics of balanced Boolean functions
    • Seberry J., Zhang X.-M., Zheng Y. Nonlinearity and propagation characteristics of balanced Boolean functions. Inform Comput 1995, 119:1-13.
    • (1995) Inform Comput , vol.119 , pp. 1-13
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 413
    • 47649128017 scopus 로고    scopus 로고
    • Algebraic attacks from a Gröbner basis perspective.
    • Technische Universiteit Eindhoven, Netherlands
    • Segers AJM. Algebraic attacks from a Gröbner basis perspective. Master's Thesis. Technische Universiteit Eindhoven, Netherlands; 2004.
    • (2004) Master's Thesis
    • Segers, A.J.M.1
  • 415
    • 84955616491 scopus 로고
    • From the memoirs of a Norwegian cryptologist
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '93
    • Selmer E.S. From the memoirs of a Norwegian cryptologist. LNCS 1994, vol. 765:142-150. Springer, Berlin.
    • (1994) LNCS , vol.765 , pp. 142-150
    • Selmer, E.S.1
  • 416
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • Springer, Berlin, Adv. in crypt.-Eurocrypt 2000
    • Shamir A., Patarin J., Courtois N., Klimov A. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. LNCS 2000, vol. 1807:392-407. Springer, Berlin.
    • (2000) LNCS , vol.1807 , pp. 392-407
    • Shamir, A.1    Patarin, J.2    Courtois, N.3    Klimov, A.4
  • 417
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • 623-56
    • Shannon C.E. A mathematical theory of communication. Bell System Tech J 1948, 27:379-423. 623-56.
    • (1948) Bell System Tech J , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 418
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C.E. Communication theory of secrecy systems. Bell System Tech J 1949, 28:656-715.
    • (1949) Bell System Tech J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 419
    • 0004112995 scopus 로고
    • IEEE Press, NY, (with a profile of Shannon by Anthony Liversidge), N.J.A. Sloane, A.D. Wyner (Eds.)
    • Claude Elwood Shannon: collected papers 1993, IEEE Press, NY, (with a profile of Shannon by Anthony Liversidge). N.J.A. Sloane, A.D. Wyner (Eds.).
    • (1993) Claude Elwood Shannon: collected papers
  • 421
    • 0009254836 scopus 로고
    • The uniqueness of the L2 association scheme
    • Shrikhande S.S. The uniqueness of the L2 association scheme. Ann Math Statist 1959, 30:781-798.
    • (1959) Ann Math Statist , vol.30 , pp. 781-798
    • Shrikhande, S.S.1
  • 422
    • 0021489155 scopus 로고
    • Correlation immunity of nonlinear combining functions for cryptographic applications
    • Siegenthaler T. Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans Inform Theory 1984, 30:776-780.
    • (1984) IEEE Trans Inform Theory , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 423
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans Comput 1985, 34:81-85.
    • (1985) IEEE Trans Comput , vol.34 , pp. 81-85
    • Siegenthaler, T.1
  • 424
    • 85034624593 scopus 로고
    • Cryptanalysts representation of nonlinearly filtered ML sequences
    • Springer, Berlin, Adv. in crypt.-Eurocrypt '85
    • Siegenthaler T. Cryptanalysts representation of nonlinearly filtered ML sequences. LNCS 1986, vol. 219:103-110. Springer, Berlin.
    • (1986) LNCS , vol.219 , pp. 103-110
    • Siegenthaler, T.1
  • 425
    • 84934224163 scopus 로고
    • Design of combiners to prevent divide and conquer attacks
    • Springer, Berlin, Adv. in crypt.-Crypto '85
    • Siegenthaler T. Design of combiners to prevent divide and conquer attacks. LNCS 1986, vol. 218:273-279. Springer, Berlin.
    • (1986) LNCS , vol.218 , pp. 273-279
    • Siegenthaler, T.1
  • 428
    • 84956857565 scopus 로고    scopus 로고
    • A probabilistic correlation attack on the shrinking generator
    • Springer, Berlin, Information security and privacy 1998
    • Simpson L., Golić J., Dawson E. A probabilistic correlation attack on the shrinking generator. LNCS 1998, vol. 1438:147-158. Springer, Berlin.
    • (1998) LNCS , vol.1438 , pp. 147-158
    • Simpson, L.1    Golić, J.2    Dawson, E.3
  • 431
    • 17444428523 scopus 로고    scopus 로고
    • On single-deletion-correcting codes
    • de Gruyter, K.T. Arasu, Á. Seress (Eds.)
    • Sloane N.J.A. On single-deletion-correcting codes. Codes and designs-Ray-Chaudhuri festschrift 2002, 273-292. de Gruyter. K.T. Arasu, Á. Seress (Eds.).
    • (2002) Codes and designs-Ray-Chaudhuri festschrift , pp. 273-292
    • Sloane, N.J.A.1
  • 432
    • 0242404240 scopus 로고    scopus 로고
    • Further observations on the structure of the AES algorithm
    • Springer, Berlin, Fast software encryption-Lund, Sweden 2003
    • Song B., Seberry J. Further observations on the structure of the AES algorithm. LNCS 2003, vol. 2887:223-234. Springer, Berlin.
    • (2003) LNCS , vol.2887 , pp. 223-234
    • Song, B.1    Seberry, J.2
  • 434
    • 33750682172 scopus 로고    scopus 로고
    • Chromos, Boolean functions and avalanche characteristics.
    • Ph.D. thesis. State University of New York at Buffalo
    • Stănică P. Chromos, Boolean functions and avalanche characteristics. Ph.D. thesis. State University of New York at Buffalo; 1998.
    • (1998)
    • Stănică, P.1
  • 435
    • 31244437333 scopus 로고    scopus 로고
    • Nonlinearity, local and global avalanche characteristics of balanced Boolean functions
    • Stănică P. Nonlinearity, local and global avalanche characteristics of balanced Boolean functions. Discrete Math 2002, 248:181-193.
    • (2002) Discrete Math , vol.248 , pp. 181-193
    • Stănică, P.1
  • 436
    • 84942019634 scopus 로고    scopus 로고
    • Graph eigenvalues and Walsh spectrum of Boolean functions.
    • celebration of the 70th birthday of Ron Graham, Carrollton, Georgia, 431-42. (Appeared also in Integers-J. Combinatorial Number Theory 7(2), Art. 32)
    • Stănică P. Graph eigenvalues and Walsh spectrum of Boolean functions. In: Combinatorial number theory, de Gruyter. In: Proc. of the 'Integers Conference 2005' in celebration of the 70th birthday of Ron Graham, Carrollton, Georgia, 431-42. (Appeared also in Integers-J. Combinatorial Number Theory 7(2), Art. 32).
    • Combinatorial number theory, de Gruyter. In: Proc. of the 'Integers Conference 2005'
    • Stănică, P.1
  • 437
    • 77950596474 scopus 로고    scopus 로고
    • On the nonexistence of homogeneous rotation symmetric bent Boolean functions of degree greater than two.
    • Stănică P. On the nonexistence of homogeneous rotation symmetric bent Boolean functions of degree greater than two. In: Proceedings of NATO adv. stud. instit.-Boolean functions; 2008. p. 214-8.
    • (2008) Proceedings of NATO adv. stud. instit.-Boolean functions , pp. 214-218
    • Stănică, P.1
  • 438
    • 0242607933 scopus 로고    scopus 로고
    • A constructive count of rotation symmetric functions
    • Stănică P., Maitra S. A constructive count of rotation symmetric functions. Inform Process Lett 2003, 88:299-304.
    • (2003) Inform Process Lett , vol.88 , pp. 299-304
    • Stănică, P.1    Maitra, S.2
  • 439
    • 45849113318 scopus 로고    scopus 로고
    • Rotation symmetric Boolean functions-count and cryptographic properties
    • preliminary version appeared in Electronic Notes in Discrete Math 15 (2003), 141-7
    • Stănică P., Maitra S. Rotation symmetric Boolean functions-count and cryptographic properties. Discrete Appl Math 2008, 156:1567-1580. preliminary version appeared in Electronic Notes in Discrete Math 15 (2003), 141-7.
    • (2008) Discrete Appl Math , vol.156 , pp. 1567-1580
    • Stănică, P.1    Maitra, S.2
  • 440
    • 21144456779 scopus 로고    scopus 로고
    • Results on rotation symmetric bent and correlation immune Boolean functions
    • Springer, Berlin, Fast software encryption-Delhi 2004
    • Stănică P., Maitra S., Clark J. Results on rotation symmetric bent and correlation immune Boolean functions. LNCS 2004, vol. 3017:161-177. Springer, Berlin.
    • (2004) LNCS , vol.3017 , pp. 161-177
    • Stănică, P.1    Maitra, S.2    Clark, J.3
  • 441
    • 0035882585 scopus 로고    scopus 로고
    • Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics
    • Stănică P., Sung S.H. Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics. Inform Process Lett 2001, 79:167-172.
    • (2001) Inform Process Lett , vol.79 , pp. 167-172
    • Stănică, P.1    Sung, S.H.2
  • 442
    • 10744223368 scopus 로고    scopus 로고
    • Boolean functions with five controllable cryptographic properties
    • Stănică P., Sung S.H. Boolean functions with five controllable cryptographic properties. Des Codes Cryptogr 2004, 31:147-157.
    • (2004) Des Codes Cryptogr , vol.31 , pp. 147-157
    • Stănică, P.1    Sung, S.H.2
  • 443
    • 84942033673 scopus 로고    scopus 로고
    • Gröbner basis timings page
    • Steel A. Gröbner basis timings page, ; 2004. http://magma.maths.usyd.edu.au/users/allan/gb.
    • (2004)
    • Steel, A.1
  • 444
    • 0000371364 scopus 로고
    • Resilient functions and large sets of orthogonal arrays
    • Stinson D.R. Resilient functions and large sets of orthogonal arrays. Congr Numer 1993, 92:105-110.
    • (1993) Congr Numer , vol.92 , pp. 105-110
    • Stinson, D.R.1
  • 446
    • 34250487811 scopus 로고
    • Gaussian elimination is not optimal
    • Strassen V. Gaussian elimination is not optimal. Numer Math 1969, 13:354-356.
    • (1969) Numer Math , vol.13 , pp. 354-356
    • Strassen, V.1
  • 447
    • 84947755706 scopus 로고    scopus 로고
    • On resilient Boolean functions with maximal possible nonlinearity
    • Springer, Berlin, Indocrypt 2000
    • Tarannikov Y. On resilient Boolean functions with maximal possible nonlinearity. LNCS 2000, vol. 1977:19-30. Springer, Berlin.
    • (2000) LNCS , vol.1977 , pp. 19-30
    • Tarannikov, Y.1
  • 448
    • 84888076142 scopus 로고    scopus 로고
    • Spectral analysis of high order correlation immune functions
    • preprint 2000
    • Tarannikov Y. Spectral analysis of high order correlation immune functions, preprint 2000.
    • Tarannikov, Y.1
  • 449
    • 84958968845 scopus 로고    scopus 로고
    • New constructions of resilient Boolean functions with maximal nonlinearity
    • Springer, Berlin, Fast software encryption-Yokohama 2001
    • Tarannikov Y. New constructions of resilient Boolean functions with maximal nonlinearity. LNCS 2002, vol. 2355:66-77. Springer, Berlin.
    • (2002) LNCS , vol.2355 , pp. 66-77
    • Tarannikov, Y.1
  • 450
    • 1642349094 scopus 로고    scopus 로고
    • Autocorrelation coefficients and correlation immunity of Boolean functions
    • Springer, Berlin, Adv. in crypt.-Asiacrypt 2001
    • Tarannikov Y., Korolev P., Botev A. Autocorrelation coefficients and correlation immunity of Boolean functions. LNCS 2001, vol. 2248:460-479. Springer, Berlin.
    • (2001) LNCS , vol.2248 , pp. 460-479
    • Tarannikov, Y.1    Korolev, P.2    Botev, A.3
  • 451
    • 84900988686 scopus 로고    scopus 로고
    • Looking inside AES and BES
    • Kluwer, USA, J.-J. Levy, E.W. Mayr, J.C. Mitchell (Eds.) Exploring new frontiers of theoretical informatics
    • Toli I., Zanoni A. Looking inside AES and BES. Proc. 18th IFIP world computer congress (TCS 2004) 2004, 23-36. Kluwer, USA. J.-J. Levy, E.W. Mayr, J.C. Mitchell (Eds.).
    • (2004) Proc. 18th IFIP world computer congress (TCS 2004) , pp. 23-36
    • Toli, I.1    Zanoni, A.2
  • 452
    • 84942032408 scopus 로고
    • Select Committee on Intelligence.
    • involvement of NSA in the development of the data encryption standard
    • U.S. Senate, Select Committee on Intelligence. Unclassified summary: involvement of NSA in the development of the data encryption standard; 1978.
    • (1978) Unclassified summary:
    • Senate, U.S.1
  • 453
    • 84948973102 scopus 로고
    • On the need for multipermutations: cryptanalysis of MD4 and SAFER
    • Springer, Berlin, Fast software encryption-Leuven 1994
    • Vaudenay S. On the need for multipermutations: cryptanalysis of MD4 and SAFER. LNCS 1995, vol. 1008:286-297. Springer, Berlin.
    • (1995) LNCS , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 454
    • 0021901103 scopus 로고
    • Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly random sources.
    • 17th symposium on theory of computing
    • Vazirani UV. Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly random sources. In: Proc. 17th symposium on theory of computing; 1985. p. 366-78.
    • (1985) Proc. , pp. 366-378
    • Vazirani, U.V.1
  • 455
    • 0021548502 scopus 로고
    • Efficient and secure pseudo-random number generation.
    • 25th IEEE symposium on foundations of computer science
    • Vazirani UV, Vazirani VV. Efficient and secure pseudo-random number generation. In: Proc. 25th IEEE symposium on foundations of computer science; 1984. p. 458-63.
    • (1984) Proc. , pp. 458-463
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 456
    • 85034622087 scopus 로고
    • Efficient and secure pseudo-random number generation
    • Springer, Berlin, Adv. in crypt.-Crypto '84
    • Vazirani U.V., Vazirani V.V. Efficient and secure pseudo-random number generation. LNCS 1985, vol. 196:193-202. Springer, Berlin.
    • (1985) LNCS , vol.196 , pp. 193-202
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 457
    • 85020573990 scopus 로고
    • On the design of S-boxes
    • Springer, Berlin, Adv. in crypt.-Crypto '85
    • Webster A.F., Tavares S.E. On the design of S-boxes. LNCS 1986, vol. 218:523-534. Springer, Berlin.
    • (1986) LNCS , vol.218 , pp. 523-534
    • Webster, A.F.1    Tavares, S.E.2
  • 458
    • 84942068348 scopus 로고    scopus 로고
    • Evaluating algebraic attacks on the AES.
    • Diplomarbeit, Darmstadt University, Germany
    • Weinmann R-P. Evaluating algebraic attacks on the AES. Diplomarbeit, Darmstadt University, Germany; 2004.
    • (2004)
    • Weinmann, R-P.1
  • 460
    • 1842531284 scopus 로고    scopus 로고
    • Efficient DES key search.
    • (School of Computer Science, Carleton University, Ottawa, Canada), May 1994. Presented at the Rump Session of Crypto' 93
    • Wiener MJ. Efficient DES key search. Technical report TR-244 (School of Computer Science, Carleton University, Ottawa, Canada), May 1994. Presented at the Rump Session of Crypto' 93.
    • Technical report TR-244
    • Wiener, M.J.1
  • 461
    • 0003030518 scopus 로고    scopus 로고
    • Efficient DES key search-an update
    • Wiener M.J. Efficient DES key search-an update. CryptoBytes 1998, 3(2):6-8.
    • (1998) CryptoBytes , vol.3 , Issue.2 , pp. 6-8
    • Wiener, M.J.1
  • 462
    • 85014160597 scopus 로고    scopus 로고
    • Wikipedia. http://en_wikipedia.org/wiki/Data_Encryption_Standard.
  • 463
    • 85014136255 scopus 로고    scopus 로고
    • Wikipedia. http://enwikipedia.org/wiki/Linearfeedbackshiftregister.
  • 464
    • 84963063024 scopus 로고
    • The eigenvalues of a graph and its chromatic number
    • Wilf H.S. The eigenvalues of a graph and its chromatic number. J London Math Soc 1967, 42:330-332.
    • (1967) J London Math Soc , vol.42 , pp. 330-332
    • Wilf, H.S.1
  • 465
    • 3142537092 scopus 로고    scopus 로고
    • Homogeneous bent functions of degree n in 2n variables do not exist for n>3
    • Xia T., Seberry J., Pieprzyk J.P., Charnes C. Homogeneous bent functions of degree n in 2n variables do not exist for n>3. Discrete Appl Math 2004, 142:127-132.
    • (2004) Discrete Appl Math , vol.142 , pp. 127-132
    • Xia, T.1    Seberry, J.2    Pieprzyk, J.P.3    Charnes, C.4
  • 467
    • 0024001951 scopus 로고
    • A spectral characterization of correlation-immune combining functions
    • Xiao G.-Z., Massey J.L. A spectral characterization of correlation-immune combining functions. IEEE Trans Inform Theory 1988, 34:569-571.
    • (1988) IEEE Trans Inform Theory , vol.34 , pp. 569-571
    • Xiao, G.-Z.1    Massey, J.L.2
  • 468
    • 0008436928 scopus 로고
    • Further enumerating Boolean functions of cryptographic significance
    • Yang Y.X., Guo B. Further enumerating Boolean functions of cryptographic significance. J Cryptology 1995, 8:115-122.
    • (1995) J Cryptology , vol.8 , pp. 115-122
    • Yang, Y.X.1    Guo, B.2
  • 469
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions.
    • 23rd IEEE symposium on foundations of computer science
    • Yao A. Theory and applications of trapdoor functions. In: Proc. 23rd IEEE symposium on foundations of computer science; 1982. p. 80-91.
    • (1982) Proc. , pp. 80-91
    • Yao, A.1
  • 470
    • 0008959743 scopus 로고
    • A note on the eigenvectors of Hadamard matrices of order 2n
    • Yarlagadda R., Hershey J.E. A note on the eigenvectors of Hadamard matrices of order 2n. Linear Algebra & Appl 1982, 45:43-53.
    • (1982) Linear Algebra & Appl , vol.45 , pp. 43-53
    • Yarlagadda, R.1    Hershey, J.E.2
  • 471
    • 0024620268 scopus 로고
    • Analysis and synthesis of bent sequences
    • Yarlagadda R., Hershey J.E. Analysis and synthesis of bent sequences. IEE Proc E 1989, 136:112-123.
    • (1989) IEE Proc E , vol.136 , pp. 112-123
    • Yarlagadda, R.1    Hershey, J.E.2
  • 472
  • 473
    • 0030577335 scopus 로고    scopus 로고
    • Comment on Bounds on the number of functions satisfying the strict avalanche criterion (1996)
    • Youssef A.M., Tavares S.E. Comment on Bounds on the number of functions satisfying the strict avalanche criterion (1996). Inform Process Lett 1996, 60:271-275.
    • (1996) Inform Process Lett , vol.60 , pp. 271-275
    • Youssef, A.M.1    Tavares, S.E.2
  • 474
    • 33746913093 scopus 로고    scopus 로고
    • Constructions of quadratic bent functions in polynomial forms
    • Yu N.Y., Gong G. Constructions of quadratic bent functions in polynomial forms. IEEE Trans Inform Theory 2006, 52:3291-3299.
    • (2006) IEEE Trans Inform Theory , vol.52 , pp. 3291-3299
    • Yu, N.Y.1    Gong, G.2
  • 475
    • 85031821528 scopus 로고
    • On the linear syndrome method in cryptanalysis
    • Springer, Berlin, Adv. in crypt.-Crypto '88
    • Zeng K., Huang M. On the linear syndrome method in cryptanalysis. LNCS 1990, vol. 403:469-478. Springer, Berlin.
    • (1990) LNCS , vol.403 , pp. 469-478
    • Zeng, K.1    Huang, M.2
  • 476
    • 0346602660 scopus 로고
    • On the linear consistency test (LCT) in cryptanalysis with applications
    • Springer, Berlin, Adv. in crypt.-Crypto '89
    • Zeng K., Yang C.H., Rao T.R.N. On the linear consistency test (LCT) in cryptanalysis with applications. LNCS 1990, vol. 435:164-174. Springer, Berlin.
    • (1990) LNCS , vol.435 , pp. 164-174
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.N.3
  • 477
    • 84955610054 scopus 로고
    • An improved linear syndrome algorithm in cryptanalysis with applications
    • Springer, Berlin, Adv. in crypt.-Crypto '90
    • Zeng K., Yang C.H., Rao T.R.N. An improved linear syndrome algorithm in cryptanalysis with applications. LNCS 1991, vol. 537:34-47. Springer, Berlin.
    • (1991) LNCS , vol.537 , pp. 34-47
    • Zeng, K.1    Yang, C.H.2    Rao, T.R.N.3
  • 478
    • 84958766851 scopus 로고    scopus 로고
    • Improved cryptanalysis of the self-shrinking generator
    • Springer, Berlin, Information security and privacy 2001
    • Zenner E., Krause M., Lucks S. Improved cryptanalysis of the self-shrinking generator. LNCS 2001, vol. 2119:21-35. Springer, Berlin.
    • (2001) LNCS , vol.2119 , pp. 21-35
    • Zenner, E.1    Krause, M.2    Lucks, S.3
  • 479
    • 0035964108 scopus 로고    scopus 로고
    • Enumeration of binary orthogonal arrays of strength 1
    • Zhang J.-Z., You Z.-S., Li Z.-L. Enumeration of binary orthogonal arrays of strength 1. Discrete Math 2001, 239:191-198.
    • (2001) Discrete Math , vol.239 , pp. 191-198
    • Zhang, J.-Z.1    You, Z.-S.2    Li, Z.-L.3
  • 480
    • 0031238366 scopus 로고    scopus 로고
    • Cryptographically resilient functions
    • Zhang X.-M., Zheng Y. Cryptographically resilient functions. IEEE Trans Inform Theory 1997, 43:1740-1747.
    • (1997) IEEE Trans Inform Theory , vol.43 , pp. 1740-1747
    • Zhang, X.-M.1    Zheng, Y.2
  • 481
    • 33748539035 scopus 로고    scopus 로고
    • On bent functions with some symmetric properties
    • Zhao Y., Li H. On bent functions with some symmetric properties. Discrete Appl Math 2006, 154:2537-2543.
    • (2006) Discrete Appl Math , vol.154 , pp. 2537-2543
    • Zhao, Y.1    Li, H.2
  • 482
    • 84949214198 scopus 로고    scopus 로고
    • Improved upper bound on the nonlinearity of high order correlation immune functions
    • Springer, Berlin, Selected areas crypt. 2000
    • Zheng Y., Zhang X.-M. Improved upper bound on the nonlinearity of high order correlation immune functions. LNCS 2001, vol. 2012:262-274. Springer, Berlin.
    • (2001) LNCS , vol.2012 , pp. 262-274
    • Zheng, Y.1    Zhang, X.-M.2
  • 483
    • 84959064917 scopus 로고    scopus 로고
    • New results on correlation immune functions
    • Springer, Berlin, Proc. 3rd inter. conf. on inform. security and cryptology 2000
    • Zheng Y., Zhang X.-M. New results on correlation immune functions. LNCS 2001, vol. 2015:49-63. Springer, Berlin.
    • (2001) LNCS , vol.2015 , pp. 49-63
    • Zheng, Y.1    Zhang, X.-M.2
  • 484
    • 84937399833 scopus 로고    scopus 로고
    • On relationships among avalanche, nonlinearity and correlation immunity
    • Springer, Berlin, Adv. in crypt.-Asiacrypt 2000
    • Zheng Y., Zhang X.-M. On relationships among avalanche, nonlinearity and correlation immunity. LNCS 2000, vol. 1976:470-482. Springer, Berlin.
    • (2000) LNCS , vol.1976 , pp. 470-482
    • Zheng, Y.1    Zhang, X.-M.2
  • 486
    • 0004905418 scopus 로고    scopus 로고
    • Restriction, terms and nonlinearity of Boolean functions
    • Zheng Y., Zhang X.-M., Imai H. Restriction, terms and nonlinearity of Boolean functions. Theoret Comput Sci 1999, 226:207-223.
    • (1999) Theoret Comput Sci , vol.226 , pp. 207-223
    • Zheng, Y.1    Zhang, X.-M.2    Imai, H.3
  • 488
    • 0001707701 scopus 로고
    • Products of linear recurring sequences
    • Zierler N., Mills W.H. Products of linear recurring sequences. J Algebra 1973, 27:147-157.
    • (1973) J Algebra , vol.27 , pp. 147-157
    • Zierler, N.1    Mills, W.H.2
  • 489
    • 0026219481 scopus 로고
    • An algorithm for the initial state reconstruction of the clock controlled shift register
    • Živković M. An algorithm for the initial state reconstruction of the clock controlled shift register. IEEE Trans Inform Theory 1991, 37:1488-1490.
    • (1991) IEEE Trans Inform Theory , vol.37 , pp. 1488-1490
    • Živković, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.