Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Coding and Cryptography - MaRDI portal

Coding and Cryptography

From MaRDI portal
Publication:5899181

DOI10.1007/11779360zbMath1151.94488OpenAlexW2504517155MaRDI QIDQ5899181

Anne Canteaut

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11779360




Related Items (24)

Statistical properties of half-\(\ell\)-sequencesAlgebraic attacks on a class of stream ciphers with unknown output functionA characterization of balanced Boolean functions with optimal algebraic immunityImproving the high order nonlinearity lower bound for Boolean functions with given algebraic immunityDistribution Properties of Half-$$\ell $$-SequenceA new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearityOn designated-weight Boolean functions with highest algebraic immunityOn ideal \(t\)-tuple distribution of filtering de Bruijn sequence generatorsA matrix construction of Boolean functions with maximum algebraic immunityOn extended algebraic immunityOn the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacksConstruction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearityA design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementationEnhanced Boolean functions suitable for the filter model of pseudo-random generatorALGORITHMS FOR COMPUTING CRYPTOGRAPHIC CHARACTERISTICS OF VECTORIAL BOOLEAN FUNCTIONSTwo constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacksImproving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\)A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller codeCryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipherAn Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good NonlinearityThe Linear Vector Space Spanned by the Nonlinear Filter GeneratorFurther properties of several classes of Boolean functions with optimum algebraic immunityOn second-order nonlinearity and maximum algebraic immunity of some bent functions in \(\mathcal{PS}^{+}\)A New Construction of Boolean Functions with Maximum Algebraic Immunity


Uses Software



This page was built for publication: Coding and Cryptography