[1]
W. Meier, E. Pasalic, C. Carle . Algebraic attacks and decomposition of Boolean functions. In Advances in Cryptology-EUROCRYPT 2004. LNCS 3027, Berlin: Springer-Verlag, 2004. 474-491.
DOI: 10.1007/978-3-540-24676-3_28
Google Scholar
[2]
Ding C, Xiao G, Shan W. The stability theory of stream ciphers,. LNCS. Berlin: Springer-Verlag, 1991, vol. 561.
Google Scholar
[3]
C. Carlet, Boolean functions for cryptography and error correcting codes, chapter of the monography, in Boolean Models and Methods in Mathematics, Computer Science and Engineering, P. Hammer and Y. Crama, Eds. Cambridge U.K.: Cambridge University Press, 2010, pp.257-397.
DOI: 10.1017/cbo9780511780448.011
Google Scholar
[4]
J. Huang, Z. Wang. The relationship between correlation immune and weight of H Boolean functions,. Journal on Communications, Vol. 33(2): 110-118 (2012). (In Chinese).
Google Scholar
[5]
Q. Wen, X. Niu , Y. Yang. The Boolean Functions in modern cryptology. Beijing: Science Press (2000).
Google Scholar
[6]
G. Xiao, J. Massey. A Spectral Characterization of Correlation-Immune Combining Functions,. IEEE Trans. on Inform. Theory. Vol. 34(3): 569-571(1988).
DOI: 10.1109/18.6037
Google Scholar
[7]
S. Li, B. Zeng, Y. Lian, et al. Logical functions in cryptography. Beijing: China National Computer Software and Technology Service Corporation Press (2003).
Google Scholar
[8]
Q. Wen, J. Zhang, X. Niu, Y. Yang. "Review of Boolean Functions of Modern Cryptography. Telecommunication Science, Vol. 20(12): 43-46 (2004). (In Chinese).
Google Scholar
[9]
W. Li, Z. Wang, J. Huang. The e-derivative of boolean functions and its application in the fault detection and cryptographic system,. Kybernetes, Vol. 40(5-6): 905-911 (2011).
DOI: 10.1108/03684921111142458
Google Scholar
[10]
L. He, Z. Wang, W. Li. Algorithm of reducing the balanced H-Boolean function correlation-measure and research on correlation issue. Journal on Communications, Vol. 31(2): 93-99 (2011). (In Chinese).
Google Scholar
[11]
Y. Ding, Z. Wang, J. Ye. Initial-value problem of the Boolean function's primary function and its application in cryptographic system,. Kybernetes, Vol. 39(6): 900-906 (2010).
DOI: 10.1108/03684921011046663
Google Scholar