-
1
-
-
0023985539
-
Privacy amplification by public discussion
-
april
-
C.H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion.SIAM J. Computing, 17(2):210-229, april 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
2
-
-
84996557101
-
Bounds for resilient functions and orthogonal arrays
-
In Y.G. Desmedt, editor,number 839 in Lecture Notes in Computer Science
-
J. Bierbrauer, K. Gopalakrishnan, and D.R. Stinson. Bounds for resilient functions and orthogonal arrays. In Y.G. Desmedt, editor,Advances in Cryptology-CRYPTO'94, number 839 in Lecture Notes in Computer Science, pages 247-256, 1994.
-
(1994)
Advances in Cryptology-CRYPTO'94
, pp. 247-256
-
-
Bierbrauer, J.1
Gopalakrishnan, K.2
Stinson, D.R.3
-
3
-
-
85002229923
-
On correlation-immune functions
-
In J. Feigenbaum, editor, number 576 in Lecture Notes in Computer Science. Springer-Verlag,
-
P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation-immune functions. In J. Feigenbaum, editor,Advances in Cryptology-CRYPTO'91, number 576 in Lecture Notes in Computer Science, pages 86-100. Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology-CRYPTO'91
, pp. 86-100
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
4
-
-
0022198802
-
The bit extraction problem or í: Resilient functions
-
B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich, and R. Smolensky. The bit extraction problem or í: resilient functions. InProc. 26th IEEE Symposium on Foundations of Computer Science, pages 396-407, 1985.
-
(1985)
Proc. 26th IEEE Symposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Freidmann, J.4
Rudich, S.5
Smolensky, R.6
-
6
-
-
0005275186
-
Three characterizations of non-binary correlation-immune and resilient functions
-
K. Gopalakrishnan and D.R. Stinson. Three characterizations of non-binary correlation-immune and resilient functions.Designs,Codes and Cryptography, 5:241-251, 1995.
-
(1995)
Designs,Codes and Cryptography
, vol.5
, pp. 241-251
-
-
Gopalakrishnan, K.1
Stinson, D.R.2
-
9
-
-
85032864411
-
Perfect local randomness in pseudo-random sequences
-
In G. Brassard, editor, number 435 in Lecture Notes in Computer Science. Springer-Verlag,
-
U.M. Maurer and J.L. Massey. Perfect local randomness in pseudo-random sequences. In G. Brassard, editor,Advances in Cryptology - CRYPTO'89, number 435 in Lecture Notes in Computer Science, pages 100-112. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - CRYPTO'89
, pp. 100-112
-
-
Maurer, U.M.1
Massey, J.L.2
-
10
-
-
0000580915
-
Factorial experiments derivable from combinatorial arrangements of arrays
-
C.R. Rao. Factorial experiments derivable from combinatorial arrangements of arrays.J. Roy. Statist., 9:128-139, 1947.
-
(1947)
J. Roy Statist
, vol.9
, pp. 128-139
-
-
Rao, C.R.1
-
11
-
-
84948980739
-
Black box cryptanalysis of hash networks based on multipermutations
-
In A. De Santis, editor,number 950 in Lecture Notes in Computer Science. Springer-Verlag,
-
C.-P. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In A. De Santis, editor,Advances in Cryptology - EU- ROCRYPT'94, number 950 in Lecture Notes in Computer Science, pages 47-57. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - EU- ROCRYPT'94
, pp. 47-57
-
-
Schnorr, C.-P.1
Vaudenay, S.2
-
12
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications.IEEE Trans. Inform. Theory, IT-30(5):776-780, 1984.
-
(1984)
IEEE Trans. Inform. Theory
, vol.IT-30
, Issue.5
, pp. 776-780
-
-
Siegenthaler, T.1
-
13
-
-
0012300042
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
Lecture Notes in Computer Science. Springer-Verlag, to appear
-
S. Vaudenay. On the need for multipermutations: cryptanalysis of MD4 and SAFER. InFast Software Encryption, Lecture Notes in Computer Science. Springer-Verlag, to appear.
-
Fast Software Encryption
-
-
Vaudenay, S.1
-
15
-
-
0024001951
-
A spectral characterization of correlation-immune combining functions
-
G. Xiao and J.L. Massey. A spectral characterization of correlation-immune combining functions.IEEE Trans. Inform. Theory, IT-34(3):569-571, 1988.
-
(1988)
IEEE Trans. Inform. Theory
, vol.IT-34
, Issue.3
, pp. 569-571
-
-
Xiao, G.1
Massey, J.L.2
-
16
-
-
84957367141
-
On nonlinear resilient functions
-
In L. Guillou and J.J. Quisquater, editors, Springer-Verlag,
-
X. Zhang and Y. Zheng. On nonlinear resilient functions. In L. Guillou and J.J. Quisquater, editors,Advances in Cryptology - EUROCRYPT'95, number 921 in Lecture Notes in Computer Science, pages 274-288. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT'95, number 921 in Lecture Notes in Computer Science
, pp. 274-288
-
-
Zhang, X.1
Zheng, Y.2
|