|
[1]
|
Armknecht, F. (2004) Improving fast algebraic attacks: FSE 2004. Springer Verlag, 65-82.
|
|
[2]
|
Batten, L.M. (2004) Algebraic attacks over GF(q): Cryptology-INDOCRYPT 2004. Springer Verlag, 84-91.
|
|
[3]
|
Courtois, N. and Meier, W. (2003) Algebraic attacks on stream ciphers with linear feedback: Cryptology-EURO- CRYPT 2003. Springer Verlag, 345-359.
|
|
[4]
|
Courtois, N. (2003) Fast algebraic attacks on stream ciphers with linear feedback: Advances in Cryptology-CRYPTO 2003. Springer Verlag, 176-194.
|
|
[5]
|
Meier, W., Pasalic, E. and Carlet, C. (2004) Algebraic attacks and decomposition of Boolean functions: Cryptology- EUROCRYPT 2004. Springer Verlag, 474-491.
|
|
[6]
|
Rothaus, O.S. (1976) On bent functions. Journal of Combinatorial Theory A, 20,300-305.
|
|
[7]
|
Tu, Z. and Deng, Y. (2010) A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Designs, Codes and Cryptography, 1-14.
|
|
[8]
|
Tang, D., Carlet, C. and Tang, X. Highly nonlinear Boolean functions with optimum algebraic immunity and good be- havior against fast algebraic attacks. Cryptology ePrint Archive. http://eprint.iacr.org/2011/366.pdf
|
|
[9]
|
Cohen, G. and Flori, J.P. On a generalized combinatorial conjecture involving addition mod 2k-1. Cryptology ePrint Archive. http://eprint.iacr.org/2011/400.pdf
|
|
[10]
|
Jin, Q., Liu, Z., Wu, B. and Zhang, X. A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. Cryptology ePrint Archive.
http://eprint.iacr.org/2011/515.pdf
|
|
[11]
|
Feng, K., Liao, Q. and Yang, J. (2009) Maximal values of generalized algebraic immunity. Designs, Codes and Cryp- tography, 50, 243-252.
|
|
[12]
|
MacWilliams, F.J. and Sloane, N.J.A. (1977) The Theory of Error-Correcting Codes. North-Holland, Amsterdam.
|
|
[13]
|
Dillon, J.F. (1974) Elementary hadamard difference sets. Ph.D. Thesis, University of Maryland, College Park.
|
|
[14]
|
Feng,K.,Yang,J.(2011)Vectorial Boolean Functions With Good Cryptographic Properties.International Journal of Foundations of Computer Science,Vol. 22, No. 6 , 1271–1282.
|