Claude Carlet
Orcid: 0000-0002-6118-7927Affiliations:
- Universities of Paris 8, France
- Universities of Paris 13, France
According to our database1,
Claude Carlet
authored at least 291 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, July, 2024
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost.
J. Cryptogr. Eng., June, 2024
Ann. Math. Artif. Intell., January, 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2024
On the vector subspaces of 픽<sub>2<sup>n</sup></sub> over which the multiplicative inverse function sums to zero.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Parameterization of Boolean functions by vectorial functions and associated constructions.
Adv. Math. Commun., 2024
On the APN-ness and differential uniformity of some classes of $ (n, n) $-functions over $ \mathbb{F}_2^n $.
Adv. Math. Commun., 2024
Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVIII, 2024
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024
Proceedings of the Applications of Evolutionary Computation - 27th European Conference, 2024
Proceedings of the Genetic Programming - 27th European Conference, 2024
2023
Cryptogr. Commun., December, 2023
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes.
IEEE Trans. Inf. Theory, October, 2023
Des. Codes Cryptogr., February, 2023
Restricting vectorial functions to affine spaces and deducing infinite families of 4-uniform permutations, in relation to the strong D-property.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
Adv. Math. Commun., 2023
Adv. Math. Commun., 2023
Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2023
2022
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions.
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
Finite Fields Their Appl., 2022
An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022
Cryptogr. Commun., 2022
Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields.
Adv. Math. Commun., 2022
Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators.
Adv. Math. Commun., 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022
2021
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.
IEEE Trans. Inf. Theory, 2021
On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences.
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios.
IEEE Trans. Inf. Forensics Secur., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Finite Fields Their Appl., 2021
Des. Codes Cryptogr., 2021
The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions.
CoRR, 2021
Cryptogr. Commun., 2021
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021
2020
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions.
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Theory, 2020
A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.
Cryptologia, 2020
Adv. Math. Commun., 2020
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020
2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
IEEE Trans. Inf. Theory, 2019
J. Cryptogr. Eng., 2019
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2.
Des. Codes Cryptogr., 2019
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures.
Des. Codes Cryptogr., 2019
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019
Cryptogr. Commun., 2019
Cryptogr. Commun., 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
Constructing Low-Weight <i>d</i>th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform.
IEEE Trans. Inf. Theory, 2018
Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform.
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform.
IACR Cryptol. ePrint Arch., 2018
Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets.
Finite Fields Their Appl., 2018
Discret. Math., 2018
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018
Statistical properties of side-channel and fault injection attacks using coding theory.
Cryptogr. Commun., 2018
Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
2017
Boolean functions with restricted input and their robustness; application to the FLIP cipher.
IACR Trans. Symmetric Cryptol., 2017
Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity.
IEEE Trans. Inf. Theory, 2017
Discret. Math., 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Evol. Comput., 2016
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016
Adv. Math. Commun., 2016
Appl. Algebra Eng. Commun. Comput., 2016
Proceedings of the New Codebreakers, 2016
2015
IEEE Trans. Inf. Theory, 2015
Des. Codes Cryptogr., 2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015
Des. Codes Cryptogr., 2015
Adv. Math. Commun., 2015
Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015
S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Proceedings of the European Conference on Circuit Theory and Design, 2015
On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
J. Math. Cryptol., 2014
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions.
J. Comb. Theory A, 2014
J. Cryptogr. Eng., 2014
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions.
Inf. Sci., 2014
A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks.
Int. J. Found. Comput. Sci., 2014
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Discret. Appl. Math., 2014
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2013
Theory of masking with codewords in hardware: low-weight <i>d</i>th-order correlation-immune Boolean functions.
IACR Cryptol. ePrint Arch., 2013
Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions.
Adv. Math. Commun., 2013
Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Boolean functions.
Proceedings of the Handbook of Finite Fields., 2013
2012
IEEE Trans. Inf. Theory, 2012
IEEE Trans. Inf. Theory, 2012
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
CoRR, 2012
Adv. Math. Commun., 2012
Adv. Math. Commun., 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011
Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials".
IEEE Trans. Inf. Theory, 2011
J. Comb. Theory A, 2011
Int. J. Found. Comput. Sci., 2011
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency.
IACR Cryptol. ePrint Arch., 2011
Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions.
Des. Codes Cryptogr., 2011
Des. Codes Cryptogr., 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Boolean Models and Methods in Mathematics, 2010
Proceedings of the Boolean Models and Methods in Mathematics, 2010
2009
On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009
Cryptogr. Commun., 2009
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications.
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity.
Adv. Math. Commun., 2008
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations.
Proceedings of the Sequences and Their Applications, 2008
Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity.
Proceedings of the Advances in Cryptology, 2008
2007
IEEE Trans. Inf. Theory, 2007
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2006
IEEE Trans. Inf. Theory, 2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Another class of quadratic APN binomials over F<sub>2<sup>n</sup></sub>: the case n divisible by 4.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Sequences and Their Applications, 2006
Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Complexity of Boolean Functions, 12.03. - 17.03.2006, 2006
Proceedings of the Advances in Cryptology, 2006
On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities.
Proceedings of the Applied Algebra, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IEEE Trans. Inf. Theory, 2005
IACR Cryptol. ePrint Arch., 2005
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version).
IACR Cryptol. ePrint Arch., 2005
An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Des. Codes Cryptogr., 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Designing bent functions and resilient functions from known ones, without extending their number of variables.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Progress in Cryptology, 2005
2004
IEEE Trans. Inf. Theory, 2004
On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions.
IEEE Trans. Inf. Theory, 2004
On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions.
J. Complex., 2004
IACR Cryptol. ePrint Arch., 2004
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Finite Fields and Applications, 2003
2002
Covering Sequences of Boolean Functions and Their Cryptographic Significance.
Des. Codes Cryptogr., 2002
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions.
Proceedings of the Sequences and their Applications, 2001
2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Codes and Association Schemes, 1999
1998
Des. Codes Cryptogr., 1998
Des. Codes Cryptogr., 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
1995
1994
IEEE Trans. Inf. Theory, 1994
SIAM J. Discret. Math., 1994
1993
Discret. Math., 1993
1991
1990
A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes.
Proceedings of the EUROCODE '90, 1990
1988
Proceedings of the Coding Theory and Applications, 1988