Claude Carlet

According to our database1, Claude Carlet authored at least 248 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the Derivative Imbalance and Ambiguity of Functions.
IEEE Trans. Information Theory, 2019

On $\sigma$ -LCD Codes.
IEEE Trans. Information Theory, 2019

New Characterization and Parametrization of LCD Codes.
IEEE Trans. Information Theory, 2019

Polynomial direct sum masking to protect against both SCA and FIA.
J. Cryptographic Engineering, 2019

Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptology ePrint Archive, 2019

Relation between o-equivalence and EA-equivalence for Niho bent functions.
IACR Cryptology ePrint Archive, 2019

Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection.
IACR Cryptology ePrint Archive, 2019

Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2.
Des. Codes Cryptogr., 2019

On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures.
Des. Codes Cryptogr., 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

The Fifth International Students' Olympiad in Cryptography - NSUCRYPTO: problems and their solutions.
CoRR, 2019

Editorial: Special Issue on Boolean functions and their applications.
Cryptography and Communications, 2019

On Isotopic Shift Construction for Planar Functions.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Information Theory, 2018

Linear Codes Over 𝔽q Are Equivalent to LCD Codes for q>3.
IEEE Trans. Information Theory, 2018

On Linear Complementary Pairs of Codes.
IEEE Trans. Information Theory, 2018

Constructing Low-Weight dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform.
IEEE Trans. Information Theory, 2018

Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform.
IEEE Trans. Information Theory, 2018

On Upper Bounds for Algebraic Degrees of APN Functions.
IEEE Trans. Information Theory, 2018

Polynomial direct sum masking to protect against both SCA and FIA.
IACR Cryptology ePrint Archive, 2018

Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m>n/2.
IACR Cryptology ePrint Archive, 2018

Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform.
IACR Cryptology ePrint Archive, 2018

Changing Points in APN Functions.
IACR Cryptology ePrint Archive, 2018

Constructing APN functions through isotopic shifts.
IACR Cryptology ePrint Archive, 2018

Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets.
Finite Fields and Their Applications, 2018

A new concatenated type construction for LCD codes and isometry codes.
Discrete Mathematics, 2018

Euclidean and Hermitian LCD MDS codes.
Des. Codes Cryptogr., 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

Statistical properties of side-channel and fault injection attacks using coding theory.
Cryptography and Communications, 2018

On the nonlinearity of monotone Boolean functions.
Cryptography and Communications, 2018

Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

A Search for Differentially-6 Uniform (n, n-2) Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Boolean functions with restricted input and their robustness; application to the FLIP cipher.
IACR Trans. Symmetric Cryptol., 2017

Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity.
IEEE Trans. Information Theory, 2017

Stochastic Collision Attack.
IEEE Trans. Information Forensics and Security, 2017

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
IACR Cryptology ePrint Archive, 2017

Boolean functions with restricted input and their robustness; application to the FLIP cipher.
IACR Cryptology ePrint Archive, 2017

Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets.
IACR Cryptology ePrint Archive, 2017

Characterizations of the differential uniformity of vectorial functions by the Walsh transform.
IACR Cryptology ePrint Archive, 2017

Binary linear codes from vectorial boolean functions and their weight distribution.
Discrete Mathematics, 2017

Characterizations of o-polynomials by the Walsh transform.
CoRR, 2017

New characterization and parametrization of LCD Codes.
CoRR, 2017

On σ-LCD codes.
CoRR, 2017

Linear codes over Fq which are equivalent to LCD codes.
CoRR, 2017

Euclidean and Hermitian LCD MDS codes.
CoRR, 2017

Three basic questions on Boolean functions.
Adv. in Math. of Comm., 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions.
Proceedings of the Codes, Cryptology and Information Security, 2017

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Univariate Niho Bent Functions From o-Polynomials.
IEEE Trans. Information Theory, 2016

Cryptographic properties of monotone Boolean functions.
J. Mathematical Cryptology, 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
IACR Cryptology ePrint Archive, 2016

Algebraic Decomposition for Probing Security.
IACR Cryptology ePrint Archive, 2016

On the nonlinearity of monotone Boolean functions.
IACR Cryptology ePrint Archive, 2016

On the (non-)existence of APN (n, n)-functions of algebraic degree n.
IACR Cryptology ePrint Archive, 2016

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Evolutionary Computation, 2016

Four decades of research on bent functions.
Des. Codes Cryptogr., 2016

Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016

Binary Linear Codes From Vectorial Boolean Functions and Their Weight Distribution.
CoRR, 2016

Complementary dual codes for counter-measures to side-channel attacks.
Adv. in Math. of Comm., 2016

New secondary constructions of Bent functions.
Appl. Algebra Eng. Commun. Comput., 2016

On the (non-)existence of APN (n, n)-functions of algebraic degree n.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Polynomial Evaluation and Side Channel Analysis.
Proceedings of the New Codebreakers, 2016

2015
Boolean and Vectorial Plateaued Functions and APN Functions.
IEEE Trans. Information Theory, 2015

Complementary Dual Codes for Counter-measures to Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2015

More PS and H-like bent functions.
IACR Cryptology ePrint Archive, 2015

Differentially 4-uniform bijections by permuting the inverse function.
Des. Codes Cryptogr., 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Enhanced Boolean functions suitable for the filter model of pseudo-random generator.
Des. Codes Cryptogr., 2015

Guest Editorial.
Cryptography and Communications, 2015

A new construction of differentially 4-uniform (n, n-1)-functions.
Adv. in Math. of Comm., 2015

Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015

S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Optimized linear complementary codes implementation for hardware trojan prevention.
Proceedings of the European Conference on Circuit Theory and Design, 2015

Algebraic Decomposition for Probing Security.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Higher-Order CIS Codes.
IEEE Trans. Information Theory, 2014

Leakage squeezing: Optimal implementation and security evaluation.
J. Mathematical Cryptology, 2014

A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions.
J. Comb. Theory, Ser. A, 2014

Achieving side-channel high-order correlation immunity with leakage squeezing.
J. Cryptographic Engineering, 2014

Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions.
Inf. Sci., 2014

A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks.
Int. J. Found. Comput. Sci., 2014

Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptology ePrint Archive, 2014

On the arithmetic Walsh coefficients of Boolean functions.
Des. Codes Cryptogr., 2014

Cryptographic properties of the hidden weighted bit function.
Discrete Applied Mathematics, 2014

Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs.
CoRR, 2014

Higher-order CIS codes.
CoRR, 2014

Univariate Niho Bent Functions from o-Polynomials.
CoRR, 2014

Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Open Questions on Nonlinearity and on APN Functions.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014

On o-Equivalence of Niho Bent Functions.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014

Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Niho bent functions from quadratic o-monomials.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.
Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014

Open Problems on Binary Bent Functions.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks.
IEEE Trans. Information Theory, 2013

On the second-order nonlinearities of some bent functions.
Inf. Sci., 2013

Differentially 4-Uniform Bijections by Permuting the Inverse Function.
IACR Cryptology ePrint Archive, 2013

Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions.
IACR Cryptology ePrint Archive, 2013

Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions.
Adv. in Math. of Comm., 2013

Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Side-channel indistinguishability.
Proceedings of the HASP 2013, 2013

New Construction of Differentially 4-Uniform Bijections.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions.
IEEE Trans. Information Theory, 2012

On Semibent Boolean Functions.
IEEE Trans. Information Theory, 2012

A New Class of Codes for Boolean Masking of Cryptographic Computations.
IEEE Trans. Information Theory, 2012

Further Results on Niho Bent Functions.
IEEE Trans. Information Theory, 2012

Analysis of the algebraic side channel attack.
J. Cryptographic Engineering, 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -.
IACR Cryptology ePrint Archive, 2012

Optimal First-Order Masking with Linear and Non-Linear Bijections.
IACR Cryptology ePrint Archive, 2012

Leakage Squeezing of Order Two.
IACR Cryptology ePrint Archive, 2012

Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions
CoRR, 2012

Secondary constructions of bent functions and their enforcement.
Adv. in Math. of Comm., 2012

Bent functions on a Galois ring and systematic authentication codes.
Adv. in Math. of Comm., 2012

Generalized bent functions and their relation to Maiorana-McFarland class.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On Dillon's class H of Niho bent functions and o-polynomials.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2012

Leakage Squeezing of Order Two.
Proceedings of the Progress in Cryptology, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Optimal First-Order Masking with Linear and Non-linear Bijections.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Propagation Characteristics of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonlinearity of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Correlation Immune and Resilient Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Algebraic Immunity of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Information Theory, 2011

Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials".
IEEE Trans. Information Theory, 2011

On Dillon's class H of bent functions, Niho bent functions and o-polynomials.
J. Comb. Theory, Ser. A, 2011

More Vectorial Boolean Functions with Unbounded nonlinearity Profile.
Int. J. Found. Comput. Sci., 2011

Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2011

Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency.
IACR Cryptology ePrint Archive, 2011

Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions.
Des. Codes Cryptogr., 2011

CCZ-equivalence of bent vectorial functions and related constructions.
Des. Codes Cryptogr., 2011

A new class of codes for Boolean masking of cryptographic computations
CoRR, 2011

Guest editorial for the special issue for Jacques Wolfmann.
Cryptography and Communications, 2011

On bent functions associated to AB functions.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

On the dual of bent functions with 2r Niho exponents.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On Known and New Differentially Uniform Functions.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
On the construction of bent vectorial functions.
IJICoT, 2010

Self-dual bent functions.
IJICoT, 2010

Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptology ePrint Archive, 2010

ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS.
IACR Cryptology ePrint Archive, 2010

A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS.
IACR Cryptology ePrint Archive, 2010

Vectorial Boolean Functions for Cryptography.
Proceedings of the Boolean Models and Methods in Mathematics, 2010

Boolean Functions for Cryptography and Error-Correcting Codes.
Proceedings of the Boolean Models and Methods in Mathematics, 2010

2009
On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

On a weakness of the Tu-Deng function and its repair.
IACR Cryptology ePrint Archive, 2009

On the nonlinearity profile of the Dillon function.
IACR Cryptology ePrint Archive, 2009

CCZ-equivalence and Boolean functions.
IACR Cryptology ePrint Archive, 2009

On CCZ-equivalence and its use in secondary constructions of bent functions.
IACR Cryptology ePrint Archive, 2009

Constructing new APN functions from known ones.
Finite Fields and Their Applications, 2009

Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009

Editorial: Cryptography and Communications, Volume 1, Issue 1.
Cryptography and Communications, 2009

An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

On the Higher Order Nonlinearities of Boolean Functions and S-boxes.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications.
IEEE Trans. Information Theory, 2008

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions.
IEEE Trans. Information Theory, 2008

Classes of Quadratic APN Trinomials and Hexanomials and Related Structures.
IEEE Trans. Information Theory, 2008

On Almost Perfect Nonlinear Functions.
IEICE Transactions, 2008

New balanced Boolean functions satisfying all the main cryptographic criteria.
IACR Cryptology ePrint Archive, 2008

On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity.
Adv. in Math. of Comm., 2008

On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations.
Proceedings of the Sequences and Their Applications, 2008

Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity.
Proceedings of the Advances in Cryptology, 2008

2007
Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes.
IEEE Trans. Information Theory, 2007

Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity.
IACR Cryptology ePrint Archive, 2007

On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity.
IACR Cryptology ePrint Archive, 2007

Constructing new APN functions from known ones.
IACR Cryptology ePrint Archive, 2007

Classes of Quadratic APN Trinomials and Hexanomials and Related Structures.
IACR Cryptology ePrint Archive, 2007

Nonlinearities of S-boxes.
Finite Fields and Their Applications, 2007

Constructing balanced functions with optimum algebraic immunity.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Generalized Correlation Analysis of Vectorial Boolean Functions.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
The weight distribution of a class of linear codes from perfect nonlinear functions.
IEEE Trans. Information Theory, 2006

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Information Theory, 2006

New classes of almost bent and almost perfect nonlinear polynomials.
IEEE Trans. Information Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

Hyper-bent functions and cyclic codes.
J. Comb. Theory, Ser. A, 2006

Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications.
IACR Cryptology ePrint Archive, 2006

A method of construction of balanced functions with optimum algebraic immunity.
IACR Cryptology ePrint Archive, 2006

A class of quadratic APN binomials inequivalent to power functions.
IACR Cryptology ePrint Archive, 2006

Another class of quadratic APN binomials over F2n: the case n divisible by 4.
IACR Cryptology ePrint Archive, 2006

Authentication Schemes from Highly Nonlinear Functions.
Des. Codes Cryptogr., 2006

On Immunity Profile of Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

Authentication Schemes from Highly Nonlinear Functions.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

An infinite class of quadratic APN functions which are not equivalent to power mappings.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

The complexity of Boolean functions from cryptographic viewpoint.
Proceedings of the Complexity of Boolean Functions, 12.03. - 17.03.2006, 2006

On the Higher Order Nonlinearities of Algebraic Immune Functions.
Proceedings of the Advances in Cryptology, 2006

On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities.
Proceedings of the Applied Algebra, 2006

2005
Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear codes from perfect nonlinear mappings and their secret sharing schemes.
IEEE Trans. Information Theory, 2005

Cubic Boolean functions with highest resiliency.
IEEE Trans. Information Theory, 2005

A lower bound on the higher order nonlinearity of algebraic immune functions.
IACR Cryptology ePrint Archive, 2005

On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version).
IACR Cryptology ePrint Archive, 2005

An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptology ePrint Archive, 2005

Piecewise Constructions of Bent and Almost Optimal Boolean Functions.
Des. Codes Cryptogr., 2005

Concatenating Indicators of Flats for Designing Cryptographic Functions.
Des. Codes Cryptogr., 2005

Improving the upper bounds on the covering radii of Reed-Muller codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

On the construction of balanced boolean functions with a good algebraic immunity.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Designing bent functions and resilient functions from known ones, without extending their number of variables.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks.
Proceedings of the Progress in Cryptology, 2005

2004
Spectral methods for cross correlations of geometric sequences.
IEEE Trans. Information Theory, 2004

Normal Extensions of Bent Functions.
IEEE Trans. Information Theory, 2004

On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions.
IEEE Trans. Information Theory, 2004

Highly nonlinear mappings.
J. Complexity, 2004

On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions.
J. Complexity, 2004

On the supports of the Walsh transforms of Boolean functions.
IACR Cryptology ePrint Archive, 2004

Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions.
IACR Cryptology ePrint Archive, 2004

Hyper-bent functions and cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Cubic Boolean functions with highest resiliency.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On the secondary constructions of resilient functions.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Algebraic Attacks and Decomposition of Boolean Functions.
Proceedings of the Advances in Cryptology, 2004

2003
Preface.
Discrete Applied Mathematics, 2003

On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

On the algebraic thickness and non-normality of Boolean functions.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

On Plateaued Functions and Their Constructions.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Vectorial Functions and Covering Sequences.
Proceedings of the Finite Fields and Applications, 2003

2002
Covering Sequences of Boolean Functions and Their Cryptographic Significance.
Des. Codes Cryptogr., 2002

A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.
Proceedings of the Advances in Cryptology, 2002

An Upper Bound on the Number of m-Resilient Boolean Functions.
Proceedings of the Advances in Cryptology, 2002

2001
On cryptographic properties of the cosets of R(1, m).
IEEE Trans. Information Theory, 2001

Preface: Volume 6.
Electronic Notes in Discrete Mathematics, 2001

Foreword.
Discrete Applied Mathematics, 2001

On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions.
Proceedings of the Sequences and their Applications, 2001

2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
On Cryptographic Propagation Criteria for Boolean Functions.
Inf. Comput., 1999

Bent, resilient functions and the numerical normal form.
Proceedings of the Codes and Association Schemes, 1999

A New Representation of Boolean Functions.
Proceedings of the Applied Algebra, 1999

1998
Z2k-Linear Codes.
IEEE Trans. Information Theory, 1998

An Alternate Characterization of the Bentness of Binary Functions, with Uniqueness.
Des. Codes Cryptogr., 1998

Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems.
Des. Codes Cryptogr., 1998

On the Propagation Criterion of Degree l and Order k.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings.
Proceedings of the Advances in Cryptology, 1997

1996
A Characterization of Binary Bent Functions.
J. Comb. Theory, Ser. A, 1996

1995
On Z4-duality.
IEEE Trans. Information Theory, 1995

Generalized partial spreads.
IEEE Trans. Information Theory, 1995

1994
Comments on 'Generating and counting binary Bent sequences'.
IEEE Trans. Information Theory, 1994

The Divisors of x2m+x of Constant Derivatives and Degree 2m-2.
SIAM J. Discrete Math., 1994

1993
A general case of normal duality between binary nonlinear codes.
Discrete Mathematics, 1993

The Automorphism Groups of the Delsarte-Goethals Codes.
Des. Codes Cryptogr., 1993

Partially-Bent Functions.
Des. Codes Cryptogr., 1993

Two New Classes of Bent Functions.
Proceedings of the Advances in Cryptology, 1993

1992
Partially-Bent Functions.
Proceedings of the Advances in Cryptology, 1992

1991
On Correlation-Immune Functions.
Proceedings of the Advances in Cryptology, 1991

1990
A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes.
Proceedings of the EUROCODE '90, 1990

1988
A simple description of Kerdock codes.
Proceedings of the Coding Theory and Applications, 1988


  Loading...