共 34 条
- [1] Biham E, 2002, LECT NOTES COMPUT SC, V2365, P1
- [2] Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
- [4] Budaghyan L., 2014, Construction and Analysis of Cryptographic Functions, DOI [10.1007/978-3-319-12991-4, DOI 10.1007/978-3-319-12991-4]
- [5] On the boomerang uniformity of some permutation polynomials [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2020, 12 (06): : 1161 - 1178
- [6] Carlet C., 2010, BOOLEAN MODELS METHO, P398
- [7] Carlet C., 2010, THEORY ALGORITHMS AP, V142, P257, DOI 10.1017/CBO9780511780448.011
- [9] EVALUATION OF SOME EXPONENTIAL-SUMS OVER A FINITE-FIELD [J]. MATHEMATISCHE NACHRICHTEN, 1980, 96 : 319 - 339
- [10] Boomerang Connectivity Table: A New Cryptanalysis Tool [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 683 - 713