Four decades of research on bent functions

C Carlet, S Mesnager - Designs, codes and cryptography, 2016 - Springer
In this survey, we revisit the Rothaus paper and the chapter of Dillon's thesis dedicated to
bent functions, and we describe the main results obtained on these functions during these …

Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Differential Cryptanalysis.

E Biham, A Shamir, J Cryptol - 2011 - Springer
FEAL was suggested as a software-oriented'cryptosystem which can be easily and efficiently
implemented on microprocessors. The structure of FEAL is similar to DES with a modified F …

[图书][B] Signal design for good correlation: for wireless communication, cryptography, and radar

SW Golomb, G Gong - 2005 - books.google.com
This book provides a comprehensive, up-to-date description of the methodologies and the
application areas, throughout the range of digital communication, in which individual signals …

[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

[PDF][PDF] Codes, bent functions and permutations suitable for DES-like cryptosystems

C Carlet, P Charpin, V Zinoviev - Designs, Codes and …, 1998 - researchgate.net
Almost bent functions oppose an optimum resistance to linear and differential cryptanalysis.
We present basic properties of almost bent functions; particularly we give an upper bound …

[图书][B] Hadamard matrices and their applications

KJ Horadam - 2012 - books.google.com
In Hadamard Matrices and Their Applications, KJ Horadam provides the first unified account
of cocyclic Hadamard matrices and their applications in signal and data processing. This …

Vectorial Boolean Functions for Cryptography.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
This chapter deals with multi-output Boolean functions viewed from a cryptographic
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …

Links between differential and linear cryptanalysis

F Chabaud, S Vaudenay - Workshop on the Theory and Application of of …, 1994 - Springer
Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to
new attack methods which may be made more efficient when compared or combined with …

[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …