1. [1] C.M. Adams and S.E. Tavares, “Generating and counting binary bent sequences,” IEEE Trans. Inf. Theory, vol.36, no.5, pp.1170-1173, 1990.
2. [2] P. Charpin and E. Psaslic, “On propagation characteristics of resilient functions,” SAC 2002, Lect. Notes Comput. Sci. 2595, pp.175-195, 2002.
3. [3] N.T. Courtois and M. Willi, “Algebraic attacks on stream ciphers with linear feedback,” Advances in Cryptology-Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, pp.346-359, 2003.
4. [4] F. Göloglu and M.D. Yücel, “Necessary conditions on balanced Boolean functions with maximum nonlinearity,” Boolean functions: Cryptography and Applications, pp.1-10, 2005.
5. [5] B. Preneel, W. Leekwijck, L.V. Linden, et al., “Propagation characteristics of Boolean functions,” Advances in Cryptology-Eurocrypt'90, Lect. Notes Comput. Sci. 437, pp.155-165, 1991.