Author:
Man Yuying,Li Nian,Xiang Zejun,Zeng Xiangyong
Funder
National Natural Science Foundation of China
Natural Science Foundation of Hubei Province of China
Knowledge Innovation Program of Wuhan-Basic Research
National Key Research and Development Program of China
Innovation group project of the natural science foundation of Hubei Province of China
Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Aly, A., Ashur, T., Ben-Sasson, E., Dhooghe, S., Szepieniec, A.: Design of symmetric-key primitives for advanced cryptographic protocols. Cryptology ePrint Archive, Report 426 (2019) https://eprint.iacr.org/2019/426
2. Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of power functions. Int. J. Inf. Coding Theory 1(2), 149–170 (2010)
3. Blondeau, C., Canteaut, A., Charpin, P.: Differential properties of $${x\mapsto x^{2^{t}-1}}$$. IEEE Trans. Inf. Theory 57, 8127–8137 (2011)
4. Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel Counterpart of the Boomerang Connectivity Table: Introduction and Analysis of the FBCT. IACR Trans. Symm. Cryptol. 2020(1), 331–362 (2020)
5. Coulter, R., Henderson, M.: A note on the roots of trinomials over a finite field. Bull. Austral. Math. Soc. 69(3), 429–432 (2004)