References
- C. Carlet and E. Prouff, On a new notion of nonlinearity relevant to multi-output pseudo- random generators, in Selected Areas in Cryptography 2003, M. Matsui and R.J. Zuccherato, eds., Lecture Notes in Computer Science, Vol. 3006, Springer, Berlin, 2003, pp. 291–305.
- C. Carlet, K. Khoo, C. Lim, and C. Loe, On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity, Adv. Math. Commun. 2(2) (2008), pp. 201–221. doi: 10.3934/amc.2008.2.201
- J. Cheon, Nonlinear vector resilient functions, in Advances in Cryptology – CRYPTO 2001, J. Kilian, ed., Lecture Notes in Computer Science, Vol. 2139, Springer, Berlin, 2001, pp. 485–469.
- N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, in Advances in Cryptology – CRYPTO 2003, D. Boneh, ed., Lecture Notes in Computer Science, Vol. 2729, Springer, Berlin, 2003, pp. 176–194.
- J. Dillon, Elementary Haddamard difference sets, Ph.D. thesis, University of Maryland, 1974.
- C. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers, Lecture Notes in Computer Science, Vol. 561, Springer, Berlin, 1991.
- H. Evertse, Linear structures in block ciphers, in Advances in Cryptology – EUROCRYPT’87, D. Chaum and W. L. Price, eds., Lecture Notes in Computer Science, Vol. 304, Springer, Berlin, 1987, pp. 249–266.
- K. Gupta and P. Sarkar, Improved construction of nonlinear resilient S-boxes, IEEE Trans. Inf. Theory 51(1) (2005), pp. 339–348. doi: 10.1109/TIT.2004.839524
- T. Johansson and E. Pasalic, A construction of resilient functions with high nonlinearity, IEEE Trans. Inf. Theory 49(2) (2003), pp. 494–501. doi: 10.1109/TIT.2002.807297
- J. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Inf. Theory 15(1) (1969), pp. 122–127. doi: 10.1109/TIT.1969.1054260
- W. Meier, E. Pasalic, and C. Carlet, Algebraic attacks and decomposition of Boolean functions, in Advanced in Cryptology – EUROCRYPT 2004, C. Cachin and J.L. Camenisch, eds., Lecture Notes in Computer Science, Vol. 3027, Springer, New York, 2004, pp. 474–491.
- A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
- E. Pasalic and S. Maitra, Linear codes in generalized construction of resilient functions with very high nonlinearity, IEEE Trans. Inf. Theory 48(8) (2002), pp. 2182–2191. doi: 10.1109/TIR.2002.800492
- E. Pasalic, Maiorana–McFarland class: Degree optimization and algebraic properties, IEEE Trans. Inf. Theory 52(10) (2006), pp. 4581–4595. doi: 10.1109/TIT.2006.881721
- T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Inf. Theory 30(5) (1984), pp. 776–780. doi: 10.1109/TIT.1984.1056949
- X.-M. Zhang and Y. Zheng, Cryptographically resilient functions, IEEE Trans. Inf. Theory 43(5) (1997), pp. 1740–1747. doi: 10.1109/18.623184
- W.-G. Zhang and E. Pasalic, Constructions of resilient S-Boxes with strictly almost optimal nonlinearity through disjoint linear codes, IEEE Trans. Inf. Theory 60(3) (2014), pp. 1638–1651. doi: 10.1109/TIT.2014.2300067
- M. Zhang and A. Chan, Maximum correlation analysis of nonlinear S-boxes in stream ciphers, in Advances in Cryptology–CRYPTO 2000, M. Bellare, ed., Lecture Notes in Computer Science, Vol. 1880, Springer, Berlin, 2000, pp. 501–514.