1]T Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. Congressus Numerantium, 1993, 92:105~110[2]A Menezes,P van Oorschot, S Vanstone. Handbook of applied cryptography. CRC Press, 1997[3]CDing, G Xiao, WShan. The stability theory of stream ciphers. Number561, Lectures Notes in Computer Science. Springer-Verlag, 1991[4]K Kurosawa, T Satoh, K Yamamoto. Highly nonlinear t-Resilient functions. Journal of Univer Computer Science, 1997, 3(6) :721~729[5]X M Zhang, Y. Zheng. On nonlinear resilient functions. Advances in Cryptography-EUROCRYPT' 95. Lecture Notes in Computer Science, 1995, 921:274~288[6]B Preneel, W V Leekwijck, L V Linden, R Govaerts, J Vandewalle. Propagation characteristics of Boolean function. Advances in Cryptography-EUROCRYPT' 1990. Lecture Notes in Computer Science, 1991,473:161~173[7]Thomas Johnsson, Enes Pasalic. A construction of resilient functions with high nonlinearity. Lectures Notes in Computer Science.Springer-Verlag, 2000[8]E Pasalic, S maitra, T Johnsson, P Sarkar. New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Journal of Computing, 1999, 18:197~207 |