Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Carlet, Claude
Djurasevic, Marko
Jakobovic, Domagoj
and
Picek, Stjepan
2020.
Parallel Problem Solving from Nature – PPSN XVI.
Vol. 12270,
Issue. ,
p.
343.
Carlet, Claude
2020.
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions.
IEEE Transactions on Information Theory,
Vol. 66,
Issue. 12,
p.
7702.
Zhou, Yu
Wei, Yongzhuang
Zhang, Hailong
Li, Luyang
Pasalic, Enes
and
Wu, Wenling
2021.
Information Security and Cryptology.
Vol. 13007,
Issue. ,
p.
351.
Li, Yubo
Li, Kangquan
Mesnager, Sihem
and
Qu, Longjiang
2021.
More permutations and involutions for constructing bent functions.
Cryptography and Communications,
Vol. 13,
Issue. 3,
p.
459.
Mesnager, Sihem
and
Su, Sihong
2021.
On constructions of weightwise perfectly balanced Boolean functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
951.
Carlet, Claude
Jakobovic, Domagoj
and
Picek, Stjepan
2021.
Evolutionary algorithms-assisted construction of cryptographic boolean functions.
p.
565.
Potapov, Vladimir N.
2021.
An Upper Bound on the Number of Bent Functions.
p.
95.
Zhou, Yu
Hu, Jianyong
Miao, Xudong
Han, Yu
and
Zhang, Fuzhong
2021.
On the confusion coefficient of Boolean functions.
Journal of Mathematical Cryptology,
Vol. 16,
Issue. 1,
p.
1.
Fan, Yanhong
Mesnager, Sihem
Wang, Weijia
Li, Yongqing
Cui, Tingting
and
Wang, Meiqin
2021.
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
617.
Méaux, Pierrick
2021.
On the fast algebraic immunity of threshold functions.
Cryptography and Communications,
Vol. 13,
Issue. 5,
p.
741.
Kaleyski, Nikolay S.
2021.
Invariants for EA- and CCZ-equivalence of APN and AB functions.
Cryptography and Communications,
Vol. 13,
Issue. 6,
p.
995.
Mesnager, Sihem
Su, Sihong
and
Zhang, Hui
2021.
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity.
Designs, Codes and Cryptography,
Vol. 89,
Issue. 1,
p.
1.
Dougherty, Randall
Mauldin, R. Daniel
and
Tiefenbruck, Mark
2022.
The Covering Radius of the Reed–Muller Code RM(m – 4, m) in RM(m – 3, m).
IEEE Transactions on Information Theory,
Vol. 68,
Issue. 1,
p.
560.
Kuijsters, Daniël
Verbakel, Denise
and
Daemen, Joan
2022.
Progress in Cryptology – INDOCRYPT 2022.
Vol. 13774,
Issue. ,
p.
336.
Babueva, Aleksandra Alekseevna
Logachev, Oleg Aleksejevich
and
Yashchenko, Valerii Vladimirovich
2022.
О связи локальных аффинностей булевой функции с некоторыми видами ее вырожденности.
Дискретная математика,
Vol. 34,
Issue. 2,
p.
7.
Baksova, I. P.
and
Tarannikov, Yu. V.
2022.
The Bounds on the Number of Partitions of the Space $$\mathbf{F}_{\mathbf{2}}^{\boldsymbol{m}}$$ into $$\boldsymbol{k}$$-Dimensional Affine Subspaces.
Moscow University Mathematics Bulletin,
Vol. 77,
Issue. 3,
p.
131.
Flórez-Gutiérrez, Antonio
2022.
Advances in Cryptology – ASIACRYPT 2022.
Vol. 13794,
Issue. ,
p.
447.
Meidl, Wilfried
2022.
A survey on p-ary and generalized bent functions.
Cryptography and Communications,
Vol. 14,
Issue. 4,
p.
737.
Ayyagari, Tarun
Saji, Anirudh
John, Anita
and
Jose, Jimmy
2022.
Cellular Automata.
Vol. 13402,
Issue. ,
p.
17.
Canale, Federico
Leander, Gregor
and
Stennes, Lukas
2022.
Advances in Cryptology – CRYPTO 2022.
Vol. 13509,
Issue. ,
p.
779.