[1]
Q. Wen, X. Niu , Y. Yang. The Boolean Functions in modern cryptology. Beijing: Science Press(2000).
Google Scholar
[2]
G. Xiao, J. Massey. "A Spectral Characterization of Correlation-Immune Combining Functions". IEEE Trans. on Inform.Theory. Vol.34(3): 569-571(1988).
DOI: 10.1109/18.6037
Google Scholar
[3]
S. Li, B. Zeng, Y. Lian, et al. Logical functions in cryptography. Beijing: China National Computer Software and Technology Service Corporation Press(2003).
Google Scholar
[4]
Q. Wen, J. Zhang, X. Niu , Y. Yang. "Review of Boolean Functions of Modern Cryptography. Telecommunication Science,Vol.20(12):43-46(2004).
Google Scholar
[5]
L. He. "On Boolean Functions with Highest Algebraic Immune Degree". Chinese Journal of Computers, Vol.29(10):1579-1583(2006).
Google Scholar
[6]
J. Peng, Q. Wu, H. Kan. "On symmetric boolean functions with high algebraic immunity on even number of variables". IEEE Transactions on Information Theory, Vol. 57(10):7205–7220(2011).
DOI: 10.1109/tit.2011.2132113
Google Scholar
[7]
C. Carlet, D. K. Dalai, K. C. Gupta,et al. "Algebraic immunity for cryptographically significant Boolean functions: analysis and construction".IEEE Transactions on Information Theory, Vol. 52(7):3105–3121(2006).
DOI: 10.1109/tit.2006.876253
Google Scholar
[8]
D. K. Dalai, S. Maitra, and S. Sarkar. "Basic theory in construction and analysis of Boolean functions of variables with maximum algebraic immunity". Designs, Codes Cryptogr., vol. 40(1):41–58(2006).
DOI: 10.1007/s10623-005-6300-x
Google Scholar
[9]
J. Huang, Z. Wang. "The relationship between correlation immune and weight of H Boolean functions". Journal on Communications, Vol.33(2):110-118(2012). (In Chinese)
Google Scholar
[10]
W. Li, Z. Wang, J. Huang. "The e-derivative of boolean functions and its application in the fault detection and cryptographic system". Kybernetes, Vol.40(5-6):905-911(2011).
DOI: 10.1108/03684921111142458
Google Scholar
[11]
Y. Ding, Z. Wang, J. Ye. "Initial-value problem of the Boolean function's primary function and its application in cryptographic system". Kybernetes, Vol.39(6): 900-906(2010).
DOI: 10.1108/03684921011046663
Google Scholar