共 14 条
- [1] Courtois N., Meier W., Algebraic attacks on stream ciphers with linear feedbake, Advances in Cryptology-Eurocrypt 2003, pp. 345-359, (2003)
- [2] Meier W., Pasalic E., Carlet C., Algebraic attacks and decomposition of Boolean functions, (2004)
- [3] Dalai D.K., Maitra S., Sarkar S., Basic theory in constructions with maximum possible annihilator immunity, Designs, Codes and Cryptography, 40, 1, pp. 41-58, (2006)
- [4] Qu L.J., Feng K.Q., Liu F., Constructing symmetric Boolean functions with maximum algebraic immunity, IEEE Trans Inf Theory, 55, 5, pp. 2406-2412, (2009)
- [5] Chen Y.D., Lu P.Z., Two classes of symmetric Boolean functions with optimum algebraic immunity: Construction and analysis, IEEE Trans Inf Theory, 57, 4, pp. 2522-2538, (2011)
- [6] Li N., Qi W., Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity, IEEE Trans Inf Theory, 52, 5, pp. 2271-2273, (2006)
- [7] Qu L.J., Li C., Weight support technique and the symmetric Boolean functions with maximum algebraic immunity on even number of variables, Information Security and Cryptology 2007, pp. 271-282, (2008)
- [8] Qu L.J., Li C., On the 2<sup>m</sup>-variable symmetric Boolean functions with maximum algebraic immunit, Sci China F: Inf Sci, 51, 2, pp. 120-127, (2008)
- [9] Qu L.J., Li L., Feng K.Q., A note on symmetric Boolean functionswith maximum algebraic immunity in odd number of variables, IEEE Trans Inf Theory, 53, 8, pp. 2908-2910, (2007)
- [10] Li C., Qu L.J., Zhou Y., Et al., Analysis on Security Index of Cryptographic Functions, pp. 256-262, (2011)