References
- M. Albrecht, Algebraic Attacks on the Courtois Toy Cipher, Cryptologia 32(3) (2008), pp. 220–276. doi: 10.1080/01611190802058139
- F. Armknecht and M. Krause, Constructing Single- and Multi-Output Boolean Functions with Maximal Algebraic Immunity, Automata, Languages and Programming, Lecture Notes in Computer Science, Vol. 4052, Venice, Italy, 2006, pp. 180–191.
- P. Berger and M. Minier, Two algebraic attacks against the F-FCSRs using the IV mode, Progress in Cryptology-INDOCRYPT 2005, Lecture Notes in Computer Science, Vol. 3797, Bangalore, India, 2005, pp. 143–154.
- C. Carlet, Vectorial Boolean functions for cryptography, in Boolean Methods and Models, E.Y. Crama and P. Hammer, eds., Cambridge University Press, Cambridge, 2009, pp. 398–469.
- C. Carlet and K. Feng, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, Advances in Cryptology-ASIACRYPT 2008, Lecture Notes in Computer Science, Vol. 5350, Melbourne, Australia, 2008, pp. 425–440.
- C. Carlet and K. Feng, An infinite class of balanced vectorial Boolean functions with optimal algebraic immunity and good nonlinearity, Coding and Cryptology, Lecture Notes in Computer Science, Vol. 5557, Zhangjiajie, China, 2009, pp. 1–11. doi: 10.1007/978-3-642-01877-0_1
- C. Carlet and P. Gaborit, Hyper-bent functions and cyclic codes, J. Comb. Theory, Ser. A 113(3) (2006), pp. 466–482. doi: 10.1016/j.jcta.2005.04.008
- P. Charpin and G. Gong, Hyperbent functions, Kloosterman sums, and Dickson polynomials, IEEE Trans. Inf. Theory 54(9) (2008), pp. 4230–4238. doi: 10.1109/TIT.2008.928273
- N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology – CRYPTO 2003, Lecture Notes in Computer Science, Vol. 2729, Santa Barbara, CA, 2003, pp. 176–194.
- N. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-EUROCRYPT 2003, Lecture Notes in Computer Science, Vol. 2656, Springer Berlin Heidelberg, 2003, pp. 345–359.
- N. Courtois, G. Bard, and D. Wagner, Algebraic and slide attacks on KeeLoq, Fast Software Encryption (2008), Lecture Notes in Computer Science, Vol. 5086, Lausanne, Switzerland, 2008, pp. 97–115.
- K. Feng and J. Yang, Vectorial Boolean Functions with Good Cryptographic Properties, Int. J. Found. Comput Sc. 22(6) (2011), 1271–1282. doi: 10.1142/S0129054111008702
- K. Feng, Q. Liao, and J. Yang, Maximal values of generalized algebraic immunity, Designs, Codes Cryptogr. 50(2) (2009), 243–252. doi: 10.1007/s10623-008-9228-0
- W. Meier, E. Pasalic, and C. Carlet, Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology – EUROCRYPT 2004, Lecture Notes in Computer Science, Vol. 3027, Interlaken, Switzerland, 2004, pp. 474–491.
- G. Sun, A class of vectorial Boolean functions with optimum algebraic immunity, Energy Procedia 13 (2011), pp. 317–326. doi: 10.1016/S1876-6102(14)00454-8
- Z. Tu and Y. Deng, A conjecture about binary strings and its applications on constructing boolean functions with optimal algebraic immunity, Designs, Codes Cryptogr. 60(1) (2011), pp. 1–14. doi: 10.1007/s10623-010-9413-9
- A.M. Youssef and G. Gong, Hyper-Bent Functions, Advances in Cryptology – EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Innsbruck, Austria, 2001, pp. 406–419.