Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
22
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,714
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
other
Author(s):
Claude Carlet
Publication date
(Online):
September 13 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
NTT Journal for Theology and the Study of Religion
Most cited references
22
Record
: found
Abstract
: not found
Article
: not found
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
T. Siegenthaler
(1984)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Nonlinearity Criteria for Cryptographic Functions
Willi Meier
,
Othmar Staffelbach
(1990)
0
comments
Cited
34
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The covering radius of the<tex>(2^{15}, 16)</tex>Reed-Muller code is at least 16276
D Wiedemann
,
N Patterson
(1983)
0
comments
Cited
27
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
September 13 2002
Pages
: 549-564
DOI:
10.1007/3-540-45708-9_35
SO-VID:
3821deee-b4e4-4201-a10b-6390d2a36860
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Essential Algebraic Structure within the AES
pp. 17
Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC
pp. 31
Tweakable Block Ciphers
pp. 47
The LSD Broadcast Encryption Scheme
pp. 77
Provably Secure Steganography
pp. 93
Flaws in Applying Proof Methodologies to Signature Schemes
pp. 111
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
pp. 127
On the Security of RSA Encryption in TLS
pp. 143
Security Analysis of IKE’s Signature-Based Key-Exchange Protocol
pp. 162
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
pp. 178
On 2-Round Secure Multiparty Computation
pp. 194
Private Computation — k-Connected versus 1-Connected Networks
pp. 210
Analysis and Improvements of NTRU Encryption Paddings
pp. 226
Universal Padding Schemes for RSA
pp. 242
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
pp. 257
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors
pp. 272
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
pp. 304
(Not So) Random Shuffles of RC4
pp. 320
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
pp. 336
Supersingular Abelian Varieties in Cryptology
pp. 369
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
pp. 385
Threshold Password-Authenticated Key Exchange
pp. 401
A Threshold Pseudorandom Function Construction and Its Applications
pp. 417
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
pp. 433
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
pp. 449
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security
pp. 481
Deniable Ring Authentication
pp. 499
SiBIR: Signer-Base Intrusion-Resilient Signatures
pp. 515
Cryptanalysis of Stream Ciphers with Linear Masking
pp. 533
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
pp. 549
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
pp. 565
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks
pp. 581
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
pp. 597
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
pp. 613
Security Proof for Partial-Domain Hash Signature Schemes
Similar content
5,714
McFarland, M. Carter, "Federal Government and Urban Problems: HUD: Successes, Failures and the Fate of our Cities" (Book Review)
Authors:
Earl Finbar Murphy
Preparation of routine media and reagents used in antimicrobial susceptibility testing. Part 1. McFarland standards
Authors:
J Hindler
,
L Hochstein
,
A. Howell
Nitrate treatment in McFarland: Final study results and costs
Authors:
GA GUTER
See all similar
Cited by
11
Algebraic Attacks and Decomposition of Boolean Functions
Authors:
Willi Meier
,
Enes Pasalic
,
Claude Carlet
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions
Authors:
Deepak Kumar Dalai
,
Kishan Chand Gupta
,
Subhamoy Maitra
On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities
Authors:
Claude Carlet
See all cited by