On the annihilators of cryptographic Boolean functions

被引:0
|
作者
State Key Lab. of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Tien Tzu Hsueh Pao | 2006年 / 1卷 / 51-54期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] On cryptographic complexity of Boolean functions
    Carlet, C
    [J]. FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, : 53 - 69
  • [2] The Annihilators and the Correlation Immunity of H Boolean Functions
    Huang, Jinglian
    Wang, Zhuo
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING AND COMMUNICATIONS TECHNOLOGY (IECT 2016), 2016, : 494 - 500
  • [3] Annihilators and Algebraic Immunity of Symmetric Boolean Functions
    Peng, Jie
    Kan, Haibin
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1434 - 1440
  • [4] Cryptographic Boolean Functions with R
    Lafitte, Frederic
    Van Heule, Dirk
    Van Hamme, Julien
    [J]. R JOURNAL, 2011, 3 (01): : 44 - 47
  • [5] Cryptographic Boolean Functions and Applications
    Joyner, David
    [J]. CRYPTOLOGIA, 2013, 37 (02) : 189 - 192
  • [6] Cryptographic Boolean functions with biased inputs
    Gangopadhyay, Sugata
    Gangopadhyay, Aditi Kar
    Pollatos, Spyridon
    Stanica, Pantelimon
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (02): : 301 - 314
  • [7] Metaheuristics in the Optimization of Cryptographic Boolean Functions
    Lopez-Lopez, Isaac
    Sosa-Gomez, Guillermo
    Segura, Carlos
    Oliva, Diego
    Rojas, Omar
    [J]. ENTROPY, 2020, 22 (09)
  • [8] Count of Annihilators of Boolean Functions with Given Algebraic Immunity
    Du, Yusong
    Pei, Dingyi
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 640 - 643
  • [9] Cryptographic Boolean functions with biased inputs
    Sugata Gangopadhyay
    Aditi Kar Gangopadhyay
    Spyridon Pollatos
    Pantelimon Stănică
    [J]. Cryptography and Communications, 2017, 9 : 301 - 314
  • [10] On cryptographic propagation criteria for Boolean functions
    Carlet, C
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149