共 16 条
[1]
Carlet C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P77
[2]
Carlet C., 2010, BOOLEAN MODELS METHO, P398, DOI DOI 10.1017/CBO9780511780448.012
[3]
Carlet C., 2010, BOOLEAN MODELS METHO, DOI [DOI 10.1017/CBO9780511780448.011, 10.1017/CBO9780511780448.011]
[4]
Celerier C., 2012, TBILISI MATH J, V5, P19
[5]
Courtois NT, 2003, LECT NOTES COMPUT SC, V2656, P345
[6]
Crama Y., 2011, ENCY MATH ITS APPL, V142
[7]
Cusick TW, 2009, CRYPTOGRAPHIC BOOLEAN FUNCTIONS AND APPLICATIONS, P1
[9]
DILLON JF, 1975, P 6 SE C COMB GRAPH, P237
[10]
Dobbertin H., 1995, Fast Software Encryption. Second International Workshop. Proceedings, P61