共 23 条
- [1] Albert A.A., 1960, S APPL MATH, V10, P53
- [2] [Anonymous], 2014, Construction and Analysis of Cryptographic Functions
- [3] Beth T., 1993, ADV CRYPTOLOGY EUROC, V765
- [4] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
- [5] Browning K., 2009, Special volume of Journal of Combinatorics, Information and System Sciences, V34, P135
- [6] On relations between CCZ- and EA-equivalences [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2020, 12 (01): : 85 - 100
- [8] Budaghyan L, 2019, IEEE INT SYMP INFO, P2962, DOI [10.1109/ISIT.2019.8849339, 10.1109/isit.2019.8849339]
- [9] Budaghyan L, 2009, 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), P374, DOI 10.1109/ITW.2009.5351383
- [10] Constructing new APN functions from known ones [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2009, 15 (02) : 150 - 159