10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography 203[176] Reynald Lercier and Christophe Ritzenthaler. Reconstruction of genus 3 hyperellitpiccurve. Talk given at GeoCrypt 2011, sli<strong>de</strong>s available at http://iml.univ-mrs.fr/ati/GeoCrypt2011/, June 2011. (Cited on page 182.)[177] Na Li and Wen-Feng Qi. Construction and analysis of Boolean functions of 2t + 1 variableswith maximum algebraic immunity. In Lai and Chen [158], pages 84–98. (Cited on page 11.)[178] Na Li, Longjiang Qu, Wen-Feng Qi, GuoZhu Feng, Chao Li, and DuanQiang Xie. On theconstruction of Boolean functions with optimal algebraic immunity. IEEE Transactions onInformation Theory, 54(3):1330–1334, 2008. (Cited on page 11.)[179] Rudolf Lidl, Gary Lee Mullen, and Gerhard Turnwald. Dickson polynomials, volume 65 ofPitman Monographs and Surveys in Pure and Applied Mathematics. Longman Scientific &Technical, Harlow, 1993. (Cited on pages 99 and 228.)[180] Petr Lisoněk. On the connection between Kloosterman sums and elliptic curves. InSolomon Wolf Golomb, Matthew Geoffrey Parker, Alexan<strong>de</strong>r Pott, and Arne Winterhof,editors, SETA, volume 5203 of Lecture Notes in Computer Science, pages 182–187. Springer,2008. (Cited on pages 110, 115, 120, 122, and 231.)[181] Petr Lisoněk. An efficient characterization of a family of hyperbent functions. IEEETransactions on Information Theory, 57(9):6010–6014, 2011. (Cited on pages 110, 115, 116,and 233.)[182] Petr Lisoněk. Hyperbent functions and hyperelliptic curves. Talk given at Arithmetic,Geometry, Cryptography and Coding Theory (AGCT-13), sli<strong>de</strong>s available at http://iml.univ-mrs.fr/~ritzenth/AGCT/talks/lisonek.pdf, March 2011. (Cited on pages 110,115, 116, and 233.)[183] Petr Lisoněk and Marko J. Moisio. On zeros of Kloosterman sums. Des. Co<strong>de</strong>s Cryptography,59(1-3):223–230, 2011. (Cited on page 110.)[184] Mikhail Sergeevich Lobanov. Exact relations between nonlinearity and algebraic immunity.Diskretn. Anal. Issled. Oper., 15(6):34–47, 95, 2008. (Cited on page 11.)[185] Florence Jessie MacWilliams and Neil James Alexan<strong>de</strong>r Sloane. The theory of errorcorrectingco<strong>de</strong>s. I. North-Holland Publishing Co., Amsterdam, 1977. North-HollandMathematical Library, Vol. 16. (Cited on page 13.)[186] Florence Jessie MacWilliams and Neil James Alexan<strong>de</strong>r Sloane. The theory of errorcorrectingco<strong>de</strong>s. II. North-Holland Publishing Co., Amsterdam, 1977. North-HollandMathematical Library, Vol. 16. (Cited on page 13.)[187] James Lee Massey. Shift-register synthesis and BCH <strong>de</strong>coding. Information Theory, IEEETransactions on, 15(1):122 – 127, jan 1969. (Cited on pages 10 and 219.)[188] Mitsuru Matsui. Linear cryptoanalysis method for DES cipher. In EUROCRYPT, pages386–397, 1993. (Cited on page 96.)[189] Mitsuru Matsui and Atsuhiro Yamagishi. A new method for known plaintext attack ofFEAL cipher. In EUROCRYPT, pages 81–91, 1992. (Cited on page 96.)[190] Willi Meier, Enes Pasalic, and Clau<strong>de</strong> Carlet. Algebraic attacks and <strong>de</strong>composition ofBoolean functions. In Cachin and Camenisch [34], pages 474–491. (Cited on page 10.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!