Author:
Fu Shaojing,Matsuura Kanta,Li Chao,Qu Longjiang
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference18 articles.
1. Bennett C.H., Brassard G., Robert J.M.: Privacy amplification by public discassion. SIAM J. Comput. 17, 210–229 (1988)
2. Cheon J.H.: Nonlinear vector resilient functions. In: Advances in Cryptology Crypto2001, Lecture Notes in Computer Science, vol. 2139, pp. 458–469, Springer, Berlin (2001).
3. Chor B., Goldreich O., Hastad J., Friedman J., Rudich S., Smolensky R.: The bit extraction problem or T-resilient functions. In: 26th IEEE Symposium on Foundations of Computer Science, pp. 396–407 (1985).
4. Carlet C.: Vectorial Boolean functions for cryptography, chapter of the monograph. In: Crama, Y., Hammer P.L., (eds) Boolean models and methods in Mathematics, Computer Science, and Engineering, pp. 398–469. Cambridge University Press, Cambridge (2010)
5. Chaum D., Evertse J.H.: Cryptanalysis of DES with a reduced number of rounds sequences of linear factors in block cipher. In: Advances in Cryptology-CRYPTO’85, Lecture Notes in Computer Science, vol. 218, pp. 192–211, Springer, Berlin (1986).
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献