Author of the publication

On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions.

, , , and . Int. J. Softw. Informatics, 8 (2): 177-192 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of cubic rotation symmetric bent functions in power-of-two variables., , , and . ISIT, page 486-490. IEEE, (2015)Conditional Cube Searching and Applications on Trivium-Variant Ciphers., , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 151-168. Springer, (2018)Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOT., , , and . Inscrypt, volume 13007 of Lecture Notes in Computer Science, page 171-190. Springer, (2021)Cryptanalysis of Ciminion., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 234-251. Springer, (2022)New Collision Attacks on Round-Reduced Keccak., , , and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 216-243. (2017)Perfect Algebraic Immune Functions., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 172-189. Springer, (2012)On the Resistance of Boolean Functions against Fast Algebraic Attacks., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 261-274. Springer, (2011)Lightweight MDS Generalized Circulant Matrices., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 101-120. Springer, (2016)A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair., , and . SAC, volume 13742 of Lecture Notes in Computer Science, page 306-327. Springer, (2022)Cube Cryptanalysis of Round-Reduced ACORN., , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 44-64. Springer, (2019)