Computer Science ›› 2013, Vol. 40 ›› Issue (11): 94-97.
Previous Articles Next Articles
ZHANG Zhe-lin and ZHOU Meng
[1] Armknecht F.Improving fast algebraic attacks:FSE 2004[C]∥ LNCS 3017.Springer Verlag,2004:65-82 [2] Batten L M.Algebraic attacks over GF(q):Cryptology-INDOCRYPT 2004[C]∥ LNCS 3348.Springer Verlag,2004:84-91 [3] Courtois N,Meier W.Algebraic attacks on stream ciphers with linear feedback:Cryptology-EUROCRYPT 2003[C]∥ LNCS 2656.Springer Verlag,2003:345-359 [4] Courtois N.Fast algebraic attacks on stream ciphers with linear feedback:Advances in Cryptology-CRYPTO 2003[C]∥ LNCS 2729.Springer Verlag,2003:176-194 [5] Meier W,Pasalic E,Carlet C.Algebraic attacks and decomposition of Boolean functions:Cryptology-EUROCRYPT 2004[C]∥ LNCS 3027.Springer Verlag,2004:474-491 [6] 孟强,陈鲁生,符方伟.一类代数免疫度达到最优的布尔函数的构造[J].软件学报,2010:1758-1767 [7] 涂自然,邓映蒲.代数免疫度为1的布尔函数[J].系统科学与数学,2011,1(5):512-518 [8] 李超,薛朝红,付绍静.代数免疫度最优的旋转对称布尔函数的构造[J].国防科技大学学报,2012,4(2):34-38 [9] Tu Z,Deng Y.A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity:Des[J].Codes Cryptogr, 2011,60(1):1-14 [10] Tang D,Carlet C,Tang X.Highly nonlinear Boolean functions with optimum algebraic immunity and good behavior against fast algebraic attacks[J].Cryptology ePrint Archive,2013,59(1):653-664 [11] Jin Q,Liu Z,Wu B,et al.A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity[C]∥ Cryptology ePrint Archive 2011.2011:515 [12] Lidl R,Niederreiter H.Finite Fields,Encyclopedia of Mathemati-cs and its Applications [M].1983 [13] Carlet C,Feng K.An infinite class of balanced functions with optimal algebraic immunity,good immunity to fast algebraic attacks and good nonlinearity:Asiacrypt 2008[C]∥LNCS 5350.SpringernVerlag,2008:425-440 |
No related articles found! |
|