10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

194 Bibliography[42] Clau<strong>de</strong> Carlet, Xiangyong Zeng, Chunlei Li, and Lei Hu. Further properties of severalclasses of Boolean functions with optimum algebraic immunity. Des. Co<strong>de</strong>s Cryptography,52(3):303–338, 2009. (Cited on page 11.)[43] Robert Carls, David Russell Kohel, and David Lubicz. Higher-dimensional 3-adic CMconstruction. J. Algebra, 319(3):971–1006, 2008. (Cited on page 184.)[44] John William Scott Cassels. Lectures on elliptic curves, volume 24 of London MathematicalSociety Stu<strong>de</strong>nt Texts. Cambridge University Press, Cambridge, 1991. (Cited on page 99.)[45] Jinhui Chao, Osamu Nakamura, Kohji Sobataka, and Shigeo Tsujii. Construction of secureelliptic cryptosystems using CM tests and liftings. In Kazuo Ohta and Dingyi Pei, editors,ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, pages 95–109. Springer,1998. (Cited on page 153.)[46] Pascale Charpin and Guang Gong. Hyperbent functions, Kloosterman sums, and Dicksonpolynomials. IEEE Transactions on Information Theory, 54(9):4230–4238, 2008. (Cited onpages 96, 110, 111, 113, and 232.)[47] Pascale Charpin, Tor Helleseth, and Victor Zinoviev. Divisibility properties of Kloostermansums over finite fields of characteristic two. In Information Theory, 2008. ISIT 2008. IEEEInternational Symposium on, pages 2608 –2612, july 2008. (Cited on pages 118 and 234.)[48] Pascale Charpin, Tor Helleseth, and Victor Zinoviev. Divisibility properties of classicalbinary Kloosterman sums. Discrete Mathematics, 309(12):3975–3984, 2009. (Cited onpage 120.)[49] Wei-Liang Chow. On compact complex analytic varieties. Amer. J. Math., 71:893–914,1949. (Cited on page 167.)[50] Marcus Tullius Cicero, Jules Martha, and Carlos Lévy. Des termes extrêmes <strong>de</strong>s biens et<strong>de</strong>s maux: Livres I-II. Collection <strong>de</strong>s universités <strong>de</strong> France. Série latine. Les Belles Lettres,1990. (Cited on page 1.)[51] Alfred Clebsch. Zur Theorie <strong>de</strong>r binären algebraischen Formen. Math. Ann., 3(2):265–267,1870. (Cited on page 181.)[52] Clifford Cocks. An i<strong>de</strong>ntity based encryption scheme based on quadratic residues. InBahram Honary, editor, IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science,pages 360–363. Springer, 2001. (Cited on page 156.)[53] Gérard Denis Cohen and Jean-Pierre Flori. On a generalized combinatorial conjectureinvolving addition mod 2 k − 1. Cryptology ePrint Archive, Report 2011/400, 2011.http://eprint.iacr.org/. (Cited on page 20.)[54] Henri Cohen. A course in computational algebraic number theory, volume 138 of GraduateTexts in Mathematics. Springer-Verlag, Berlin, 1993. (Cited on pages 105 and 170.)[55] Henri Cohen. Advanced topics in computational number theory, volume 193 of GraduateTexts in Mathematics. Springer-Verlag, New York, 2000. (Cited on page 170.)[56] Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen,and Fre<strong>de</strong>rik Vercauteren, editors. Handbook of elliptic and hyperelliptic curve cryptography.Discrete Mathematics and its Applications (Boca Raton). Chapman & Hall/CRC, BocaRaton, FL, 2006. (Cited on pages 99, 105, 154, and 181.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!