Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 5785317 - MaRDI portal

scientific article; zbMATH DE number 5785317

From MaRDI portal
Publication:5747625

zbMath1196.06001MaRDI QIDQ5747625

No author found.

Publication date: 14 September 2010


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

A characterization of nested canalyzing functions with maximum average sensitivityAlgorithmic issues of AND-decomposition of Boolean formulasOn the \(p\)-ary (cubic) bent and plateaued (vectorial) functionsA novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulatorsEquivalences among plateaued APN functionsThe graph of minimal distances of bent functions and its propertiesCompressed representation of learning spacesHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxAffine Equivalency and Nonlinearity Preserving Bijective Mappings over $$\mathbb {F}_2$$Differential and linear properties of vectorial Boolean functions based on chiThe polyhedral-surface cutting plane method of optimization over a vertex-located setFurther research results on confusion coefficient of Boolean functionsA Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic AttacksLower bounds on the degree of block ciphersThe case for algebraic biology: from research to educationGold functions and switched cube functions are not 0-extendable in dimension \(n > 5\)Algebraic cryptanalysis of stream ciphers using decomposition of Boolean functionМетод генерации сильно нелинейных S-блоков на основе градиентного спускаQuantum algorithms for the resiliency of vectorial Boolean functionsA non-cyclic triple-error-correcting BCH-like code and some minimum distance resultsDistance regular graphs arising from dimensional dual hyperovalsAlmost perfect nonlinear trinomials and hexanomialsA Theoretical Study of Kolmogorov-Smirnov DistinguishersWide minimal binary linear codes from the general Maiorana-Mcfarland classDecomposing 1-Sperner hypergraphsAffine equivalence for quadratic rotation symmetric Boolean functionsLinear codes from vectorial Boolean functions in the context of algebraic attacks


Uses Software