Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Carlet, Claude
2020.
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions.
IEEE Transactions on Information Theory,
Vol. 66,
Issue. 12,
p.
7702.
Carlet, Claude
Djurasevic, Marko
Jakobovic, Domagoj
and
Picek, Stjepan
2020.
Parallel Problem Solving from Nature – PPSN XVI.
Vol. 12270,
Issue. ,
p.
343.
Mesnager, Sihem
Su, Sihong
and
Zhang, Hui
2021.
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity.
Designs, Codes and Cryptography,
Vol. 89,
Issue. 1,
p.
1.
Li, Yubo
Li, Kangquan
Mesnager, Sihem
and
Qu, Longjiang
2021.
More permutations and involutions for constructing bent functions.
Cryptography and Communications,
Vol. 13,
Issue. 3,
p.
459.
Fan, Yanhong
Mesnager, Sihem
Wang, Weijia
Li, Yongqing
Cui, Tingting
and
Wang, Meiqin
2021.
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
617.
Kaleyski, Nikolay S.
2021.
Invariants for EA- and CCZ-equivalence of APN and AB functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
995.
Potapov, Vladimir N.
2021.
An Upper Bound on the Number of Bent Functions.
p.
95.
Zhou, Yu
Hu, Jianyong
Miao, Xudong
Han, Yu
and
Zhang, Fuzhong
2021.
On the confusion coefficient of Boolean functions.
Journal of Mathematical Cryptology,
Vol. 16,
Issue. 1,
p.
1.
Méaux, Pierrick
2021.
On the fast algebraic immunity of threshold functions.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
741.
Carlet, Claude
Jakobovic, Domagoj
and
Picek, Stjepan
2021.
Evolutionary algorithms-assisted construction of cryptographic boolean functions.
p.
565.
Mesnager, Sihem
and
Su, Sihong
2021.
On constructions of weightwise perfectly balanced Boolean functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
951.
Zhou, Yu
Wei, Yongzhuang
Zhang, Hailong
Li, Luyang
Pasalic, Enes
and
Wu, Wenling
2021.
Information Security and Cryptology.
Vol. 13007,
Issue. ,
p.
351.
Zhiyao, Yang
Pinhui, Ke
Zhixiong, Chen
and
Shengyuan, Zhang
2022.
Secondary constructions of bm$p$-ary (non-)weakly regular bent functions.
SCIENTIA SINICA Mathematica,
Canteaut, Anne
Couvreur, Alain
and
Perrin, Leo
2022.
Recovering or Testing Extended-Affine Equivalence.
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 9,
p.
6187.
Kuijsters, Daniël
Verbakel, Denise
and
Daemen, Joan
2022.
Progress in Cryptology – INDOCRYPT 2022.
Vol. 13774,
Issue. ,
p.
336.
Isaev, Gleb Andreevich
2022.
О критерии распространения для монотонных булевых функций с одним или двумя минимальными векторами носителя.
Дискретная математика,
Vol. 34,
Issue. 2,
p.
32.
YANG, Zhiyao
KE, Pinhui
and
CHEN, Zhixiong
2022.
Characterization and Construction of Generalized Bent Functions with Flexible Coefficients.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E105.A,
Issue. 5,
p.
887.
Cristiani, Valence
Lecomte, Maxime
Hiscock, Thomas
and
Maurine, Philippe
2022.
Fit the Joint Moments: How to Attack Any Masking Scheme.
IEEE Access,
Vol. 10,
Issue. ,
p.
127412.
Canale, Federico
Leander, Gregor
and
Stennes, Lukas
2022.
Advances in Cryptology – CRYPTO 2022.
Vol. 13509,
Issue. ,
p.
779.
Beierle, Christof
and
Leander, Gregor
2022.
New Instances of Quadratic APN Functions.
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 1,
p.
670.