Claude Carlet

Affiliations:
  • Universities of Paris 8, France
  • Universities of Paris 13, France


According to our database1, Claude Carlet authored at least 282 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On those Boolean functions that are coset leaders of first order Reed-Muller codes.
Ann. Math. Artif. Intell., January, 2024

Quasi-linear masking against SCA and FIA, with cost amortization.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes.
CoRR, 2024

2023
Editorial: Special issue on Boolean functions and their applications 2022.
Cryptogr. Commun., December, 2023

An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes.
IEEE Trans. Inf. Theory, October, 2023

Gold functions and switched cube functions are not 0-extendable in dimension n > 5.
Des. Codes Cryptogr., February, 2023

On cubic-like bent Boolean functions.
IACR Cryptol. ePrint Arch., 2023

Restricting vectorial functions to affine spaces and deducing infinite families of 4-uniform permutations, in relation to the strong D-property.
IACR Cryptol. ePrint Arch., 2023

A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost.
IACR Cryptol. ePrint Arch., 2023

Quasi-linear masking to protect against both SCA and FIA.
IACR Cryptol. ePrint Arch., 2023

On APN functions whose graphs are maximal Sidon sets.
IACR Cryptol. ePrint Arch., 2023

The weight spectrum of two families of Reed-Muller codes.
Discret. Math., 2023

Simplicity conditions for binary orthogonal arrays.
Des. Codes Cryptogr., 2023

Look into the Mirror: Evolving Self-Dual Bent Boolean Functions.
CoRR, 2023

A New Angle: On Evolving Rotation Symmetric Boolean Functions.
CoRR, 2023

The weight spectrum of several families of Reed-Muller codes.
CoRR, 2023

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
Adv. Math. Commun., 2023

Revisiting some results on APN and algebraic immune functions.
Adv. Math. Commun., 2023

Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023

Evolutionary Strategies for the Design of Binary Linear Codes.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2023

2022
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions.
IEEE Trans. Inf. Theory, 2022

A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function.
IEEE Trans. Inf. Theory, 2022

On Two Fundamental Problems on APN Power Functions.
IEEE Trans. Inf. Theory, 2022

A further study of quadratic APN permutations in dimension nine.
Finite Fields Their Appl., 2022

An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022

Gold Functions Are Not 0-Extendable in Dimension n>5.
CoRR, 2022

Editorial: Special issue on Boolean functions and their applications 2021.
Cryptogr. Commun., 2022

Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields.
Adv. Math. Commun., 2022

Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators.
Adv. Math. Commun., 2022

On generalizing the power function exponent constructions with genetic programming.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Evolving constructions for balanced, highly nonlinear boolean functions.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

2021
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.
IEEE Trans. Inf. Theory, 2021

On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences.
IEEE Trans. Inf. Theory, 2021

Optimizing Inner Product Masking Scheme by a Coding Theory Approach.
IEEE Trans. Inf. Forensics Secur., 2021

Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios.
IEEE Trans. Inf. Forensics Secur., 2021

Information Leakages in Code-based Masking: A Unified Quantification Approach.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Detecting faults in inner product masking scheme.
J. Cryptogr. Eng., 2021

Parameterization of Boolean functions by vectorial functions and associated constructions.
IACR Cryptol. ePrint Arch., 2021

Relation between o-equivalence and EA-equivalence for Niho bent functions.
Finite Fields Their Appl., 2021

A direct proof of APN-ness of the Kasami functions.
Des. Codes Cryptogr., 2021

Generalized isotopic shift construction for APN functions.
Des. Codes Cryptogr., 2021

The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions.
CoRR, 2021

Editorial: Special issue on Boolean functions and their applications 2020.
Cryptogr. Commun., 2021

Evolutionary algorithms-assisted construction of cryptographic boolean functions.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

2020
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions.
IEEE Trans. Inf. Theory, 2020

Handling Vectorial Functions by Means of Their Graph Indicators.
IEEE Trans. Inf. Theory, 2020

On the Distance Between APN Functions.
IEEE Trans. Inf. Theory, 2020

Constructing APN Functions Through Isotopic Shifts.
IEEE Trans. Inf. Theory, 2020

A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers.
IACR Cryptol. ePrint Arch., 2020

Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2020

On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions.
IACR Cryptol. ePrint Arch., 2020

On known constructions of APN and AB functions and their relation to each other.
IACR Cryptol. ePrint Arch., 2020

The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.
Cryptologia, 2020

On the Sixth International Olympiad in Cryptography NSUCRYPTO.
CoRR, 2020

Three parameters of Boolean functions related to their constancy on affine spaces.
Adv. Math. Commun., 2020

A Search for Additional Structure: The Case of Cryptographic S-boxes.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020

2019
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Construction of Efficient Codes for High-Order Direct Sum Masking.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

On the Derivative Imbalance and Ambiguity of Functions.
IEEE Trans. Inf. Theory, 2019

On $\sigma$ -LCD Codes.
IEEE Trans. Inf. Theory, 2019

New Characterization and Parametrization of LCD Codes.
IEEE Trans. Inf. Theory, 2019

Polynomial direct sum masking to protect against both SCA and FIA.
J. Cryptogr. Eng., 2019

Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptol. ePrint Arch., 2019

Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection.
IACR Cryptol. ePrint Arch., 2019

Boolean functions for homomorphic-friendly stream ciphers.
IACR Cryptol. ePrint Arch., 2019

Linear codes with small hulls in semi-primitive case.
Des. Codes Cryptogr., 2019

Some (almost) optimally extendable linear codes.
Des. Codes Cryptogr., 2019

Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2.
Des. Codes Cryptogr., 2019

On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures.
Des. Codes Cryptogr., 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

Editorial: Special issue on Boolean functions and their applications 2018.
Cryptogr. Commun., 2019

Editorial: Special Issue on Boolean functions and their applications.
Cryptogr. Commun., 2019

On Isotopic Shift Construction for Planar Functions.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Improved Filter Permutators for Efficient FHE: Better Instances and Implementations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018

Linear Codes Over 𝔽<sub>q</sub> Are Equivalent to LCD Codes for q>3.
IEEE Trans. Inf. Theory, 2018

On Linear Complementary Pairs of Codes.
IEEE Trans. Inf. Theory, 2018

Constructing Low-Weight <i>d</i>th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform.
IEEE Trans. Inf. Theory, 2018

Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform.
IEEE Trans. Inf. Theory, 2018

On Upper Bounds for Algebraic Degrees of APN Functions.
IEEE Trans. Inf. Theory, 2018

Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform.
IACR Cryptol. ePrint Arch., 2018

Changing Points in APN Functions.
IACR Cryptol. ePrint Arch., 2018

Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets.
Finite Fields Their Appl., 2018

A new concatenated type construction for LCD codes and isometry codes.
Discret. Math., 2018

Euclidean and Hermitian LCD MDS codes.
Des. Codes Cryptogr., 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

Statistical properties of side-channel and fault injection attacks using coding theory.
Cryptogr. Commun., 2018

On the nonlinearity of monotone Boolean functions.
Cryptogr. Commun., 2018

Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

A Search for Differentially-6 Uniform (n, n-2) Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity.
IEEE Trans. Inf. Theory, 2017

Stochastic Collision Attack.
IEEE Trans. Inf. Forensics Secur., 2017

Boolean functions with restricted input and their robustness; application to the FLIP cipher.
IACR Cryptol. ePrint Arch., 2017

Binary linear codes from vectorial boolean functions and their weight distribution.
Discret. Math., 2017

Characterizations of o-polynomials by the Walsh transform.
CoRR, 2017

On σ-LCD codes.
CoRR, 2017

Linear codes over Fq which are equivalent to LCD codes.
CoRR, 2017

Three basic questions on Boolean functions.
Adv. Math. Commun., 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions.
Proceedings of the Codes, Cryptology and Information Security, 2017

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Univariate Niho Bent Functions From o-Polynomials.
IEEE Trans. Inf. Theory, 2016

Cryptographic properties of monotone Boolean functions.
J. Math. Cryptol., 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
IACR Cryptol. ePrint Arch., 2016

Algebraic Decomposition for Probing Security.
IACR Cryptol. ePrint Arch., 2016

On the (non-)existence of APN (n, n)-functions of algebraic degree n.
IACR Cryptol. ePrint Arch., 2016

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Evol. Comput., 2016

Four decades of research on bent functions.
Des. Codes Cryptogr., 2016

Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016

Complementary dual codes for counter-measures to side-channel attacks.
Adv. Math. Commun., 2016

New secondary constructions of Bent functions.
Appl. Algebra Eng. Commun. Comput., 2016

Polynomial Evaluation and Side Channel Analysis.
Proceedings of the New Codebreakers, 2016

2015
Boolean and Vectorial Plateaued Functions and APN Functions.
IEEE Trans. Inf. Theory, 2015

More PS and H-like bent functions.
IACR Cryptol. ePrint Arch., 2015

Differentially 4-uniform bijections by permuting the inverse function.
Des. Codes Cryptogr., 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Enhanced Boolean functions suitable for the filter model of pseudo-random generator.
Des. Codes Cryptogr., 2015

Guest Editorial.
Cryptogr. Commun., 2015

A new construction of differentially 4-uniform (n, n-1)-functions.
Adv. Math. Commun., 2015

Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015

S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Optimized linear complementary codes implementation for hardware trojan prevention.
Proceedings of the European Conference on Circuit Theory and Design, 2015

On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Higher-Order CIS Codes.
IEEE Trans. Inf. Theory, 2014

Leakage squeezing: Optimal implementation and security evaluation.
J. Math. Cryptol., 2014

A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions.
J. Comb. Theory, Ser. A, 2014

Achieving side-channel high-order correlation immunity with leakage squeezing.
J. Cryptogr. Eng., 2014

Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions.
Inf. Sci., 2014

A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks.
Int. J. Found. Comput. Sci., 2014

Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

On the arithmetic Walsh coefficients of Boolean functions.
Des. Codes Cryptogr., 2014

Cryptographic properties of the hidden weighted bit function.
Discret. Appl. Math., 2014

Open Questions on Nonlinearity and on APN Functions.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014

On o-Equivalence of Niho Bent Functions.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014

Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Niho bent functions from quadratic o-monomials.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Open Problems on Binary Bent Functions.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2013

On the second-order nonlinearities of some bent functions.
Inf. Sci., 2013

Theory of masking with codewords in hardware: low-weight <i>d</i>th-order correlation-immune Boolean functions.
IACR Cryptol. ePrint Arch., 2013

Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions.
Adv. Math. Commun., 2013

Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Side-channel indistinguishability.
Proceedings of the HASP 2013, 2013

New Construction of Differentially 4-Uniform Bijections.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Boolean functions.
Proceedings of the Handbook of Finite Fields., 2013

2012
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions.
IEEE Trans. Inf. Theory, 2012

On Semibent Boolean Functions.
IEEE Trans. Inf. Theory, 2012

A New Class of Codes for Boolean Masking of Cryptographic Computations.
IEEE Trans. Inf. Theory, 2012

Further Results on Niho Bent Functions.
IEEE Trans. Inf. Theory, 2012

Analysis of the algebraic side channel attack.
J. Cryptogr. Eng., 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -.
IACR Cryptol. ePrint Arch., 2012

Optimal First-Order Masking with Linear and Non-Linear Bijections.
IACR Cryptol. ePrint Arch., 2012

Leakage Squeezing of Order Two.
IACR Cryptol. ePrint Arch., 2012

Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions
CoRR, 2012

Secondary constructions of bent functions and their enforcement.
Adv. Math. Commun., 2012

Bent functions on a Galois ring and systematic authentication codes.
Adv. Math. Commun., 2012

Generalized bent functions and their relation to Maiorana-McFarland class.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On Dillon's class H of Niho bent functions and o-polynomials.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Propagation Characteristics of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonlinearity of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Correlation Immune and Resilient Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Algebraic Immunity of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011

Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials".
IEEE Trans. Inf. Theory, 2011

More Vectorial Boolean Functions with Unbounded nonlinearity Profile.
Int. J. Found. Comput. Sci., 2011

Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency.
IACR Cryptol. ePrint Arch., 2011

Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions.
Des. Codes Cryptogr., 2011

CCZ-equivalence of bent vectorial functions and related constructions.
Des. Codes Cryptogr., 2011

Guest editorial for the special issue for Jacques Wolfmann.
Cryptogr. Commun., 2011

On bent functions associated to AB functions.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

On the dual of bent functions with 2<sup>r</sup> Niho exponents.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On Known and New Differentially Uniform Functions.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
On the construction of bent vectorial functions.
Int. J. Inf. Coding Theory, 2010

Self-dual bent functions.
Int. J. Inf. Coding Theory, 2010

Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010

ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS.
IACR Cryptol. ePrint Arch., 2010

A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS.
IACR Cryptol. ePrint Arch., 2010

Vectorial Boolean Functions for Cryptography.
Proceedings of the Boolean Models and Methods in Mathematics, 2010

Boolean Functions for Cryptography and Error-Correcting Codes.
Proceedings of the Boolean Models and Methods in Mathematics, 2010

2009
On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

On a weakness of the Tu-Deng function and its repair.
IACR Cryptol. ePrint Arch., 2009

On the nonlinearity profile of the Dillon function.
IACR Cryptol. ePrint Arch., 2009

CCZ-equivalence and Boolean functions.
IACR Cryptol. ePrint Arch., 2009

On CCZ-equivalence and its use in secondary constructions of bent functions.
IACR Cryptol. ePrint Arch., 2009

Constructing new APN functions from known ones.
Finite Fields Their Appl., 2009

Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009

Editorial: Cryptography and Communications, Volume 1, Issue 1.
Cryptogr. Commun., 2009

An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

On the Higher Order Nonlinearities of Boolean Functions and S-boxes.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications.
IEEE Trans. Inf. Theory, 2008

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions.
IEEE Trans. Inf. Theory, 2008

Classes of Quadratic APN Trinomials and Hexanomials and Related Structures.
IEEE Trans. Inf. Theory, 2008

On Almost Perfect Nonlinear Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

New balanced Boolean functions satisfying all the main cryptographic criteria.
IACR Cryptol. ePrint Arch., 2008

On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity.
Adv. Math. Commun., 2008

On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations.
Proceedings of the Sequences and Their Applications, 2008

Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity.
Proceedings of the Advances in Cryptology, 2008

2007
Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes.
IEEE Trans. Inf. Theory, 2007

On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity.
IACR Cryptol. ePrint Arch., 2007

Nonlinearities of S-boxes.
Finite Fields Their Appl., 2007

Constructing balanced functions with optimum algebraic immunity.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Generalized Correlation Analysis of Vectorial Boolean Functions.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
The weight distribution of a class of linear codes from perfect nonlinear functions.
IEEE Trans. Inf. Theory, 2006

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006

New classes of almost bent and almost perfect nonlinear polynomials.
IEEE Trans. Inf. Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

Hyper-bent functions and cyclic codes.
J. Comb. Theory, Ser. A, 2006

A method of construction of balanced functions with optimum algebraic immunity.
IACR Cryptol. ePrint Arch., 2006

A class of quadratic APN binomials inequivalent to power functions.
IACR Cryptol. ePrint Arch., 2006

Another class of quadratic APN binomials over F<sub>2<sup>n</sup></sub>: the case n divisible by 4.
IACR Cryptol. ePrint Arch., 2006

Authentication Schemes from Highly Nonlinear Functions.
Des. Codes Cryptogr., 2006

On Immunity Profile of Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

The complexity of Boolean functions from cryptographic viewpoint.
Proceedings of the Complexity of Boolean Functions, 12.03. - 17.03.2006, 2006

On the Higher Order Nonlinearities of Algebraic Immune Functions.
Proceedings of the Advances in Cryptology, 2006

On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities.
Proceedings of the Applied Algebra, 2006

2005
Propagation Characteristics of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Nonlinearity of Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Correlation Immune and Resilient Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Boolean Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear codes from perfect nonlinear mappings and their secret sharing schemes.
IEEE Trans. Inf. Theory, 2005

Cubic Boolean functions with highest resiliency.
IEEE Trans. Inf. Theory, 2005

A lower bound on the higher order nonlinearity of algebraic immune functions.
IACR Cryptol. ePrint Arch., 2005

On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version).
IACR Cryptol. ePrint Arch., 2005

An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptol. ePrint Arch., 2005

Piecewise Constructions of Bent and Almost Optimal Boolean Functions.
Des. Codes Cryptogr., 2005

Concatenating Indicators of Flats for Designing Cryptographic Functions.
Des. Codes Cryptogr., 2005

Improving the upper bounds on the covering radii of Reed-Muller codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

On the construction of balanced boolean functions with a good algebraic immunity.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Designing bent functions and resilient functions from known ones, without extending their number of variables.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks.
Proceedings of the Progress in Cryptology, 2005

2004
Spectral methods for cross correlations of geometric sequences.
IEEE Trans. Inf. Theory, 2004

Normal Extensions of Bent Functions.
IEEE Trans. Inf. Theory, 2004

On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions.
IEEE Trans. Inf. Theory, 2004

Highly nonlinear mappings.
J. Complex., 2004

On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions.
J. Complex., 2004

On the supports of the Walsh transforms of Boolean functions.
IACR Cryptol. ePrint Arch., 2004

Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions.
IACR Cryptol. ePrint Arch., 2004

Hyper-bent functions and cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Cubic Boolean functions with highest resiliency.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On the secondary constructions of resilient functions.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Algebraic Attacks and Decomposition of Boolean Functions.
Proceedings of the Advances in Cryptology, 2004

2003
Preface.
Discret. Appl. Math., 2003

On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

On the algebraic thickness and non-normality of Boolean functions.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

On Plateaued Functions and Their Constructions.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Vectorial Functions and Covering Sequences.
Proceedings of the Finite Fields and Applications, 2003

2002
Covering Sequences of Boolean Functions and Their Cryptographic Significance.
Des. Codes Cryptogr., 2002

A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.
Proceedings of the Advances in Cryptology, 2002

An Upper Bound on the Number of m-Resilient Boolean Functions.
Proceedings of the Advances in Cryptology, 2002

2001
On cryptographic properties of the cosets of R(1, m).
IEEE Trans. Inf. Theory, 2001

Preface: Volume 6.
Electron. Notes Discret. Math., 2001

Foreword.
Discret. Appl. Math., 2001

On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions.
Proceedings of the Sequences and their Applications, 2001

2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
On Cryptographic Propagation Criteria for Boolean Functions.
Inf. Comput., 1999

Bent, resilient functions and the numerical normal form.
Proceedings of the Codes and Association Schemes, 1999

A New Representation of Boolean Functions.
Proceedings of the Applied Algebra, 1999

1998
Z<sub>2<sup>k</sup></sub>-Linear Codes.
IEEE Trans. Inf. Theory, 1998

An Alternate Characterization of the Bentness of Binary Functions, with Uniqueness.
Des. Codes Cryptogr., 1998

Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems.
Des. Codes Cryptogr., 1998

On the Propagation Criterion of Degree l and Order k.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings.
Proceedings of the Advances in Cryptology, 1997

1996
A Characterization of Binary Bent Functions.
J. Comb. Theory, Ser. A, 1996

1995
On Z<sub>4</sub>-duality.
IEEE Trans. Inf. Theory, 1995

Generalized partial spreads.
IEEE Trans. Inf. Theory, 1995

1994
Comments on 'Generating and counting binary Bent sequences'.
IEEE Trans. Inf. Theory, 1994

The Divisors of x<sup>2</sup>m+x of Constant Derivatives and Degree 2<sup>m</sup>-2.
SIAM J. Discret. Math., 1994

1993
A general case of normal duality between binary nonlinear codes.
Discret. Math., 1993

The Automorphism Groups of the Delsarte-Goethals Codes.
Des. Codes Cryptogr., 1993

Partially-Bent Functions.
Des. Codes Cryptogr., 1993

Two New Classes of Bent Functions.
Proceedings of the Advances in Cryptology, 1993

1991
On Correlation-Immune Functions.
Proceedings of the Advances in Cryptology, 1991

1990
A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes.
Proceedings of the EUROCODE '90, 1990

1988
A simple description of Kerdock codes.
Proceedings of the Coding Theory and Applications, 1988


  Loading...