Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
30
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,451
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - ASIACRYPT 2008
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
other
Author(s):
Claude Carlet
,
Keqin Feng
Publication date
(Print):
2008
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Numerical Algebra, Matrix Theory, Differential-Algebraic Equations, and Control Theory
Most cited references
30
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1046
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Nicolas T. Courtois
,
Josef Pieprzyk
(2002)
0
comments
Cited
50
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Algebraic Attacks on Stream Ciphers with Linear Feedback
Nicolas T. Courtois
,
Willi Meier
(2003)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2008
Pages
: 425-440
DOI:
10.1007/978-3-540-89255-7_26
SO-VID:
b22ccc66-1129-4da4-96c8-a772a985b070
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 539
A New Attack on the LEX Stream Cipher
pp. 108
On the Security of HB# against a Man-in-the-Middle Attack
pp. 179
Universally Composable Adaptive Oblivious Transfer
pp. 344
On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols
pp. 372
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
pp. 425
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
pp. 441
An Improved Impossible Differential Attack on MISTY1
pp. 455
Generalized Identity Based and Broadcast Encryption Schemes
Similar content
2,451
Fractional Order Models Are Doubly Infinite Dimensional Models and thus of Infinite Memory: Consequences on Initialization and Some Solutions
Authors:
Jocelyn Sabatier
On a stochastic difference equation and a representation of non–negative infinitely divisible random variables
Authors:
Wim Vervaat
Activity Coefficients at Infinite Dilution of Organic Compounds in 1-Butyl-3-methylimidazolium Tetrafluoroborate Using Inverse Gas Chromatography
Authors:
Fabrice Mutelet
,
Mireille Turmine
,
Roland Solimando
…
See all similar
Cited by
6
Generalized Maiorana–McFarland Construction of Resilient Boolean Functions With High Nonlinearity and Good Algebraic Properties
Authors:
Wei-Guo Zhang
,
Enes Pasalic
Perfect Algebraic Immune Functions
Authors:
Meicheng Liu
,
Yin Zhang
,
Dongdai Lin
On the Resistance of Boolean Functions against Fast Algebraic Attacks
Authors:
Yusong Du
,
Fangguo Zhang
,
Meicheng Liu
See all cited by