Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Carlet, Claude
2020.
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions.
IEEE Transactions on Information Theory,
Vol. 66,
Issue. 12,
p.
7702.
Carlet, Claude
Djurasevic, Marko
Jakobovic, Domagoj
and
Picek, Stjepan
2020.
Parallel Problem Solving from Nature – PPSN XVI.
Vol. 12270,
Issue. ,
p.
343.
Mesnager, Sihem
Su, Sihong
and
Zhang, Hui
2021.
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity.
Designs, Codes and Cryptography,
Vol. 89,
Issue. 1,
p.
1.
Zhou, Yu
Hu, Jianyong
Miao, Xudong
Han, Yu
and
Zhang, Fuzhong
2021.
On the confusion coefficient of Boolean functions.
Journal of Mathematical Cryptology,
Vol. 16,
Issue. 1,
p.
1.
Zhou, Yu
Wei, Yongzhuang
Zhang, Hailong
Li, Luyang
Pasalic, Enes
and
Wu, Wenling
2021.
Information Security and Cryptology.
Vol. 13007,
Issue. ,
p.
351.
Mesnager, Sihem
and
Su, Sihong
2021.
On constructions of weightwise perfectly balanced Boolean functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
951.
Li, Yubo
Li, Kangquan
Mesnager, Sihem
and
Qu, Longjiang
2021.
More permutations and involutions for constructing bent functions.
Cryptography and Communications,
Vol. 13,
Issue. 3,
p.
459.
Fan, Yanhong
Mesnager, Sihem
Wang, Weijia
Li, Yongqing
Cui, Tingting
and
Wang, Meiqin
2021.
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
617.
Méaux, Pierrick
2021.
On the fast algebraic immunity of threshold functions.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
741.
Kaleyski, Nikolay S.
2021.
Invariants for EA- and CCZ-equivalence of APN and AB functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
995.
Potapov, Vladimir N.
2021.
An Upper Bound on the Number of Bent Functions.
p.
95.
Carlet, Claude
Jakobovic, Domagoj
and
Picek, Stjepan
2021.
Evolutionary algorithms-assisted construction of cryptographic boolean functions.
p.
565.
Meidl, Wilfried
2022.
A survey on p-ary and generalized bent functions.
Cryptography and Communications,
Vol. 14,
Issue. 4,
p.
737.
Babueva, Aleksandra Alekseevna
Logachev, Oleg Aleksejevich
and
Yashchenko, Valerii Vladimirovich
2022.
О связи локальных аффинностей булевой функции с некоторыми видами ее вырожденности.
Дискретная математика,
Vol. 34,
Issue. 2,
p.
7.
Zheng, Lijing
Kan, Haibin
Li, Yanjun
Peng, Jie
and
Tang, Deng
2022.
Constructing New APN Functions Through Relative Trace Functions.
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 11,
p.
7528.
Li, Kangquan
Chen, Hao
and
Qu, Longjiang
2022.
Generalized hamming weights of linear codes from cryptographic functions.
Advances in Mathematics of Communications,
Vol. 16,
Issue. 4,
p.
859.
Canteaut, Anne
Couvreur, Alain
and
Perrin, Leo
2022.
Recovering or Testing Extended-Affine Equivalence.
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 9,
p.
6187.
Beierle, Christof
and
Leander, Gregor
2022.
New Instances of Quadratic APN Functions.
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 1,
p.
670.
Cristiani, Valence
Lecomte, Maxime
Hiscock, Thomas
and
Maurine, Philippe
2022.
Fit the Joint Moments: How to Attack Any Masking Scheme.
IEEE Access,
Vol. 10,
Issue. ,
p.
127412.
Baksova, I. P.
and
Tarannikov, Yu. V.
2022.
The Bounds on the Number of Partitions of the Space $$\mathbf{F}_{\mathbf{2}}^{\boldsymbol{m}}$$ into $$\boldsymbol{k}$$-Dimensional Affine Subspaces.
Moscow University Mathematics Bulletin,
Vol. 77,
Issue. 3,
p.
131.