Subject
General Computer Science,Theoretical Computer Science
Reference16 articles.
1. Privacy amplification by public discussion;Bennett;SIAM J. Comput.,1988
2. J. Bierbrauer, K. Gopalakrishnan, D.R. Stinson, Bounds on resilient functions and orthogonal arrays, Advances in Cryptology—CRYPTO’94, Springer, Berlin, 1994, pp. 247–256.
3. P. Camion, A. Canteaut, Construction of t-resilient functions over a finite alphabet, Advances in Cryptology—Eurocrypt’96, Springer, Berlin, 1996, pp. 283–293.
4. B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, R. Smolensky, The bit extraction problem or t-resilient functions, Proc. 26th IEEE Symp. on Foundations of Computer Science, 1985, pp. 396–407.
5. J. Daemen, R. Govaerts, J. Vandewalle, On the design of high-speed self-synchronizing stream ciphers, Proc. ISCC/ISITA’92, Singapore, 1992, pp. 279–283.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Several Classes of Boolean Functions with Four-Valued Walsh Spectra;International Journal of Foundations of Computer Science;2017-06
2. Special Types of Boolean Functions;Cryptographic Boolean Functions and Applications;2017
3. Bibliography;Cryptographic Boolean Functions and Applications;2017
4. Constructions ofp-variable 1-resilient rotation symmetric functions overGF(p);Security and Communication Networks;2016-12
5. The Symmetric Property of Boolean Functions;Advances in Computer Science and Technology;2016