Author:
Zhang F.,Pasalic E.,Cepak N.,Wei Y.
Publisher
Springer International Publishing
Reference13 articles.
1. Blokhuis, A., Coulter, R.S., Henderson, M., O’Keefe, C.M.: Permutations amongst the Dembowski-Ostrom polynomials. In: Jungnickel, D., Niederreiter, H. (eds.) Proceedings of the Fifth International Conference on Finite Fields and Applications
$$F_{q5}$$
, pp. 37–42. Springer, Berlin (2001)
2. Lecture Notes in Computer Science;C Carlet,1994
3. Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P.L. (eds.) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257–397. Cambridge University Press, Cambridge (2010). Chapter of the monograph.
http://www-roc.inria.fr/secret/Claude.Carlet/pubs.html
4. Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models, pp. 398–469. Cambridge University Press, Cambridge (2010).
http://www-roc.inria.fr/secret/Claude.Carlet/pubs.html
5. Carlet, C., Mesnager, S.: Four decades of research on bent functions. Des. Codes Crypt. 78(1), 5–50 (2016)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献