共 16 条
[1]
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[4]
Budaghyan L., 2015, Construction and Analysis of Cryptographic Functions
[7]
Carlet C., 2010, BOOLEAN MODELS METHO, P398, DOI DOI 10.1017/CBO9780511780448.012
[8]
Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P356, DOI 10.1007/BFb0053450
[9]
Dobbertin H, 2001, FINITE FIELDS AND APPLICATIONS, P113