[1] Armknecht F. Improving fast algebraic attacks, 2004, LNCS 3017: 65-82. [2] Courtois N and Meier W. Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-EUROCRYPT 2003, 2003, LNCS 2656: 345-359. [3] Meier W, Pasalic E, and Carlet C. Algebraic attacks and decomposition of Boolean functions, Advances in Cryptology -EUROCRYPT 2004, 2004, LNCS 3027: 474-491. [4] Zhang Xiao-mo, Pieprzyk J, and Zheng Yu-liang. On algebraic immunity and annihilators, ICISC 2006, 2006, [5] LNCS 4296: 65-80. [6] Dalai D K. Basic theory in construction of Boolean functions with maximum possible annihilator immunity[J].Designs, Codes and Cryptography.2006, 40(1):41-58 [7] Du Yu-song and Pei Ding-yi. Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. Science in China, 2010, 50(4): 780-787. [8] Li Na and Qu Long-jiang, et al.. On the construction of Boolean functions with optimal algebraic immunity[J].IEEE Transactions on Information Theory.2008, 54(3):1330-1334 [9] Carlet C and Feng K Q. An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. ASIACRYPT 2008, 2008, LNCS 5350: 425-440. [10] Carlet C, Dalai D K, Gupta K C, and Maitra S. Algebraic immunity for cryptographically significant Boolean functions:analysis and construction[J].IEEE Transactions on Information Theory.2006, 52(7):3105-3121 [11] Qu L J, Feng K Q, Liu F, and Wang L. Construction symmetric Boolean functions with maximum algebraic immunity[J].IEEE Transactions on Information Theory.2009, 55(5):2406-2412 [12] Carlet C and Zeng X Y. Further properties of several classes of Boolean functions with optimum AI[J].Designs, Codes and Cryptography.2009, 52(3):303-338 [13] Wang Chun-peng and Chen Xiao-song. On extended algebraic immunity[J].Designs, Codes and Cryptography.2010, 57(3):271-281
|