Pieprzyk J and Qu C X. Fast hashing and rotation-symmetricfunctions. Journal of Universal Computer Science, 1999, 5(1):20-31.[2]Stnic P, Maitra S, and Clark J A. Results on rotationsymmetric bent and correlation immune boolean functions.Software Encryption 2004, Lecture Notes in ComputerScience, 2004. Vol.3017: 161-177.[3]StnicP and Maitra S. Rotation symmetric booleanfunctions-count and cryptographic properties. R. C. BoseCentenary Symposium on Discrete Mathematics andApplications, Electronic Notes in Discrete Mathematics,Elsevier, December 2002, Vol.15: 162, 164, 165, 174.[4]Maximov A, Hell M, and Maitra S. Plateaued rotationsymmetric boolean functions on odd number of variables.First Workshop on Boolean Functions: Cryptography andApplications, BFCA 05, LIFAR, University of Rouen,France, March 2005: 83-104.[5]Dalai D K and Maitra S. Results on rotation symmetric bentfunctions. Second International Workshop on BooleanFunctions: Cryptography and Applications, BFCA 06,LIFAR, University of Rouen, France, March 2006: 137-156.[6]王永娟. 特征矩阵在逻辑函数性质和构造研究中的应用. [硕士论文], 信息工程大学, 2005.Wang Yong-juan. The applications of characteristic matrix onthe properties and constructions of logical functions. [Masterdissertation], Information Engineering University, 2005.[7]Li Yuan. Results on rotation symmetric polynomials overGF(p)[J].Information Sciences.2008, 178(1):280-286[8]冯登国. 频谱理论及其在密码学中的应用. 北京:科学出版社,2000: 141-142.Feng Deng-guo. Spectrum Theory and Its Applications inCryptography. Beijing: Science Press, 2000: 141-142.[9]丁存生, 肖国镇. 流密码学及其应用. 北京: 国防工业出版社,1994: 28-30.Ding Cun-sheng and Xiao Guo-zhen. Stream Cipher and ItsApplications. Beijing: National Defense Industry Press, 1994:28-30.[10]李世取, 曾本胜, 廉玉忠, 等.. 密码学中的逻辑函数. 北京:北京中软电子出版社, 2003: 254-255.Li Shi-qu, Zeng Ben-sheng, and Lian Yu-zhong, et al.. LogicalFunctions in Cryptography. Beijing: Software and ElectronicPress, 2003: 254-255.
|