Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. on Information Theory, 1984, IT-30(5): 776-780.[2]Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only[J].IEEE Trans. on Computer.1985, C-34(1):81-85[3]丁存生,肖国镇.流密码学及其应用.北京:国防工业出版社,1994,160-180[4]杨义先,胡正名.用于序列密码的布尔函数计数问题.通信学报,1992,13(4):18-24[5]Pichier F. On the Walsh-Fourier analysis of correlation-immune switching functions. Proc. of Eurocrypt86, Linkoping: 1986, 237-241.[6]Mitchell C. Enumerating Boolean functions of cryptographic significance. J. of Cryptology, 1990,2(3): 155-170.[7]单炜娟.相关免疫函数的结构与构造.应用数学学报,1991,14(3):331-336[8]杨义先.相关免疫布尔函数的计数.电子科学学刊,1993,15(2):140-146[9]郭宝安.非线性序列的分析和综合:[博士论文].北京:北京邮电大学,1993[10]王建宇.线性结构函数与一阶相关免疫函数的计数.通信学报,1996,17(1):87-91.[11]杨义先.高维Hadamard矩阵的几个猜想之证明.科学通报,1986,31(2):85-89.[12]张建州.非相关布尔函数个数的精确值.电子科技大学学报,1994,23(1):89-94.[13]Palmer E M, Read R C, Robinson R W. Balancing the n-cube: A census of colorings[J].J of Algebraic Combinatorics.1992, 1(4):257-273[14]柯召,魏万迪.组合论.北京:科学出版社,1984,85-88.[15]Bondy J A, Murty U S R. Graph Theory with Applications. London: The MacMillan Press Ltd.1976, 8-10.
|