Information Technology Reference
In-Depth Information
39. Kasami, T., Tokura, N., Azumi, S.: On the weight enumeration of weights less than
2.5d of Reed-Muller codes. Report of faculty of Eng. Sci, Osaka Univ., Japan
40. Knudsen, L.R., Robshaw, M.J.B.: Non-linear approximations in linear cryptanal-
ysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 224-236.
Springer, Heidelberg (1996)
41. Lachaud, G., Wolfmann, J.: The Weights of the Orthogonals of the Extended
Quadratic Binary Goppa Codes. IEEE Trans. Inform. Theory 36, 686-692 (1990)
42. Lobanov, M.: Tight bound between nonlinearity and algebraic immunity. Paper
2005/441 http://eprint.iacr.org/
43. MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. North-
Holland, Amsterdam (1977)
44. Maurer, U.M.: New approaches to the design of self-synchronizing stream ciphers.
In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 458-471. Springer,
Heidelberg (1991)
45. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean
functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS,
vol. 3027, pp. 474-491. Springer, Heidelberg (2004)
46. Mesnager, S.: Improving the lower bound on the higher order nonlinearity of
Boolean functions with prescribed algebraic immunity. IEEE Trans. Inform. The-
ory 54(8) (August 2008); Preliminary version available at Cryptology ePrint
Archive, no. 2007/117
47. Millan, W.: Low order approximation of cipher functions. In: Dawson, E.P., Golic,
J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 144-
155. Springer, Heidelberg (1996)
48. Shanbhag, A., Kumar, V., Helleseth, T.: An upper bound for the extended Kloost-
erman sums over Galois rings. Finite Fields and their Applications 4, 218-238
(1998)
49. Shannon, C.E.: Communication theory of secrecy systems. Bell system technical
journal 28, 656-715 (1949)
50. Shimoyama, T., Kaneko, T.: Quadratic Relation of S-box and Its Application to
the Linear Attack of Full Round DES. In: Krawczyk, H. (ed.) CRYPTO 1998.
LNCS, vol. 1462, pp. 200-211. Springer, Heidelberg (1998)
 
Search WWH ::




Custom Search