最优代数免疫布尔函数的完全构造 |
|
|
194. [3] ARMKNECHT F, KRAUSE M. Algebraic attacks on combiners with memory [C]// Advance in Cryptology-EUROCRYPT 2003, LNCS 2729. Berlin: SpringerVerlag, 2003: 162-175. [4] MIHALJEVIE M, IMAI H. Cryptanalysis of ToyocryptHSI stream cipher [J]. IEICE Transactions on Fundamentals, 2002, E85A(1): 66-73. [5] MEIER W, PASALIC E, CARLET C. Algebraic attacks and decomposition of Boolean function [C]// Advances in Cryptology-Eurocrypt 2004, LNCS 3027. Berlin: SpringerVerlag, 2004: 474-491. [6] DALAI D K, GUPTA K C, MAITRA S. Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity [C]// FSE 2005: Proceedings of the 12th International Workshop on Fast Software Encryption, LNCS 3557. Berlin: SpringerVerlag, 2005: 98-111.
|
|
|
|