1. Anderson, R.J.: Searching for the optimum correlation attacks. In: Proceedings of K.U.Leuven Workshop on Cryptographic Algorithms, Leuven, pp. 56–62 (1994)
2. Beth, T., Jungnickel, D., Lenz, H.: Design Theory. Bibliographisches Institute, Z
ü
$$\ddot{u}$$
rich (1986)
3. Bierbrauer, J., Gopalakrishnan, K., Stinson, D.R.: Bounds on resilient functions and orthogonal arrays. In: Advances in Cryptology, Proceedings of Crypto’94. LNCS 839, pp. 247–256. Springer, Berlin/Heidelberg (1994)
4. Brickell, E.: A few results in message authentication. Congr. Numer. 43, 141–154 (1984)
5. Camion, P., Canteaut, A.: Construction of t-resilient functions over a finite alphabet. In: Advances in Cryptology, Proceedings of Eurocrypt’96. LNCS 1070, pp. 283–293. Springer, Berlin/Heidelberg (1996)