Author:
Camion Paul,Canteaut Anne
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. C.H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Computing, 17(2):210–229, april 1988.
2. Lect Notes Comput Sci;J. Bierbrauer,1994
3. Lect Notes Comput Sci;P. Camion,1992
4. B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In Proc. 26th IEEE Symposium on Foundations of Computer Science, pages 396–407, 1985.
5. P. Delsarte. An algebraic approach to the association schemes of coding theory. Thesis, Université catholique de Louvain, 1973.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secret Sharing Schemes with General Access Structures;Information Security and Cryptology;2016
2. Correlation Immunity of Boolean Functions;Advances in Computer Science and Technology;2016
3. t-resilient functions and the partial exposure problem;Applicable Algebra in Engineering, Communication and Computing;2008-02-07
4. Highly nonlinear mappings;Journal of Complexity;2004-04
5. Correlation immunity and resiliency of symmetric Boolean functions;Theoretical Computer Science;2004-01