共 15 条
- [1] [Anonymous], 2014, Construction and Analysis of Cryptographic Functions
- [2] [Anonymous], 2017, CRYPTOGRAPHIC BOOLEA
- [3] Aubry Y, 2010, CONTEMP MATH, V518, P23
- [5] Budaghyan L, 2009, 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), P374, DOI 10.1109/ITW.2009.5351383
- [7] Carlet C., 2010, BOOLEAN MODELS METHO, P398, DOI DOI 10.1017/CBO9780511780448.012
- [8] Carlet C., 2010, Encyclopedia of Mathematics and Its Applications, P257, DOI [10.1017/CBO9780511780448.011, DOI 10.1017/CBO9780511780448.011]
- [9] Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P356, DOI 10.1007/BFb0053450
- [10] Charpin P., 2017, INT J INFORM CODING, V4, P170, DOI DOI 10.1504/IJICOT.2017.083844