[1] |
ZHANG X M , ZHENG Y L . GAC—the criterion for global avalanche characteristics of cryptographic functions[J]. Journal for Universal Computer Science, 1995,1(5): 316-333.
|
[2] |
ADAMS C M , TAVARES S E . Generating and counting binary bent sequences[J]. IEEE Transactions on Information Theory, 1995,36(5): 1170-1173.
|
[3] |
周宇 . 布尔函数的密码学性质研究[D]. 西安电子科技大学, 2009. ZHOU Y . Research on Cryptographic Properties of Boolean Functions[D]. Xi’an University of Electronic Science and Technology, 2009.
|
[4] |
CARLET C . Generalized partial spreads[J]. IEEE Trasactions on Informatiom Theory, 1995,41(5): 1482-1487.
|
[5] |
BIHAM E , SHAMIR A . Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991,4(1): 3-72.
|
[6] |
ZHOU J , CHEN W , GAO F . Best linear approximation and correlation immunity of functions over Zm[J]. IEEE Transaction on Information Theory, 1999,45(1): 303-308.
|
[7] |
ZENG X , CARLET C , SHAN J ,et al. More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks[J]. IEEE Transactions on Information Theory, 2011. 6310-6320.
|
[8] |
ROTHAUS O S . On `bent' functions[J]. J Combin Theory A, 1976,20: 300-305.
|
[9] |
XIAO G Z , MASSEY J L . A Spectral characterization of correlation immune combining functions[J]. IEEE Transaction on Information Theory, 1988,34(3): 569-571.
|
[10] |
张薇, 杨晓元, 韩益亮 . 密码基础理论与协议[M]. 北京: 清华大学出版社, 2012, 23-27. ZHANG W , YANG X Y , HAN Y L . Cryptography Based Theory and Agreement[M]. Beijing: Tsinghua University Press, 2012, 23-27.
|
[11] |
ZHENG Y , ZHANG X M . Plateaued functions[A]. advances in cryptology-ICIC'99,lecture notes in computer science[C]. Heidelberg,Ed,Springer-verlag,1999, 1726: 284-300.
|
[12] |
常志文, 张杰, 李红霞 . 由已知Bent序列构造新的Bent序列[J]. 哈尔滨理工大学学报, 2010,15: 78-81. CHANG Z W , ZHANG J , LI H X . Constructing Bent sequence form given bent sequence[J]. Journal of Harbin University of Science and Technology, 2010,15: 78-81.
|
[13] |
张恭庆 . 高维哈达玛矩阵理论与应用[M]. 北京: 科学出版社, 2010. 66-92. ZHANG G Q . High-dimensional Hadamard Matrix Theory and Application[M]. Beijing: Science PressPress, 2010. 66-92.
|
[14] |
张卫国 . 密码函数及其构造[D]. 西安电子科技大学, 2006. ZHANG W G . Research on Boolean Function and Construction[D]. Xi’an University of Electronic Science and Technology, 2006.
|
[15] |
MAITRA S . Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics[J]. Inform Process Lett, 2002,83: 281-286.
|
[16] |
LI N , QU L , QI W ,et al. On the construction of Boolean functionswith optimal algebraic immunity[J]. IEEE Transaction on Informations Theory, 2008,54: 1330-1334.
|
[17] |
CARLET C , DALAI D K , GUPTA K C ,et al. Algebraic immunity for cryptographically significant Boolean functions:analysis and construction[J]. IEEE Transactions on Information Theory, 2006,52: 3105-3121.
|
[18] |
DILLON J F . Elementary hardamard difference sets[A]. Proceeding of 6th S E Conference of Combinatorics,Graph Theory,and Computing[C]. Utility Mathematics,Winnipeg, 1975. 237-249.
|
[19] |
MAITRA S , SARKAR P . Modifications of pattterson-wiedemann functions for cryptographic applications[J]. IEEE Transactions on Information Theory, 2002,48(1): 278-284.
|