[1] |
COURTOIS N , MEIER W . Algebraic attacks on stream ciphers with linear feedback[C]// Cryptology-Eurocrypt 2003,LNCS 2656. Berlin:Springer-Verlag, 2003: 345-359.
|
[2] |
ARMKNECHT F , KRAUSE M . Algebraic attacks on combiners with memory[C]// Cryptology-Crypto. 2003: 162-175.
|
[3] |
MEIER W , PASALIC E , CARLET C . Algebraic attacks and decomposition of Boolean functions[C]// Cryptology -Eurocrypt 2004,LNCS 3027. 2004: 474-491.
|
[4] |
DALAI D , MAITRA S , SARKAR S . Cryptographically significant Boolean functions:construction and analysis in terms of algebraic immunity[J]. Fast Software Encryption , 2005,3557: 98-111.
|
[5] |
CARLET C , DALAI D , GUPTA C . Algebraic immunity for cryptographically significant Boolean function:analysis and construction[J]. IEEE Transactions on Information Theory, 2006,52(7): 3105-3121.
|
[6] |
CARLET C , FENG K . An infinite class of balanced functions with optimal algebraic immunity,good immunity to fast algebraic attacks and good nonlinearity[C]// Cryptology-Asiacrypt 2008,LNCS 5350. 2008, 5350: 425-440.
|
[7] |
RIZOMILIOTIS P . On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation[J]. IEEE Trans Information Theory, 2010,56(8): 4014-4024.
|
[8] |
TU Z , DENG Y . A conjecture on binary string and its applications on constructing Boolean functions of optimal algebraic immunity[J]. Designs Codes and Cryptography, 2011,60(1): 1-14.
|
[9] |
HELLESTH T , RONJOM S . Simplifying algebraic attacks with univariate analysis[C]// Information Theory and Applications Workshop (ITA). 2011: 1-7.
|
[10] |
TANG D , CARLET C , TANG X . Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks[J]. IEEE Trans Inf Theory, 2013,59(59): 653-664.
|
[11] |
LIN J , WANG M , LI Y . On annihilators in fewer variables:basic theory and applications[J]. Chinese Journal of Electronics, 2013,22(3): 489-494.
|
[12] |
欧智慧, 赵亚群, 李旭 . 一类密码函数的构造与分析[J]. 通信学报, 2013,4(4): 106-113. OU Z H , ZHAO Y Q , LI X . Construction and analysis of one class of cryptographic functions[J]. Journal on Communications, 2013,34(4): 106-113.
|
[13] |
MESNAGER S , . A note on linear codes and algebraic immunity of Boolean Functions[C]// 21st International Symposium on Mathematical Theory of Networks and Systems. 2014.
|
[14] |
MACWILLIAMS F , SLOANE N . The theory of error-correcting Codes[M]. North-Holland Mathematical Library. Amsterdam,The Netherlands: North-HollandPress, 1977.
|
[15] |
HUFFMAN W , PLESS V . Fundamentals of error-correcting codes[M]. Cambridge,UK: Cambridge Univ.PressPress, 2003.
|
[16] |
BETTI E , SALA M . A new bound for the minimum distance of a cyclic code from its defining set[J]. IEEE Trans Information Theory, 2006,52(8): 3700-3706.
|
[17] |
BETTEN A , BRAUN M , FRIPERTINGER H . Error- correcting linear codes[M]. Berlin,Germany: Springer- VerlagPress, 2006.
|
[18] |
GAO J , HU Y , LI X . Linear span of the optimal frequency hopping sequences from irreducible cyclic Codes[J]. Chinese Journal of Electronics, 2015,24(4): 818-823.
|
[19] |
DING C , DU X , ZHOU A . The bose and minimum distance of a class of BCH codes[J]. IEEE Trans Information Theory, 2015,61(5): 2351-2356.
|
[20] |
FENG X , GONG G . On algebraic immunity of trace inverse functions on finite fields of characteristic two[J]. Journal of Systems Science and Complexity, 2016,29(1): 272-288.
|
[21] |
WU D , QI W . On the spectral immunity of periodic sequences restricted to binary annihilators[J]. Designs Codes and Cryptography, 2016,78(2): 533-545.
|
[22] |
DING C . A construction of binary linear codes from Boolean functions[J]. Discrete Mathematics, 2016,339(9): 2288-2303.
|