[1]
Q. Wen, X. Niu , Y. Yang. The Boolean Functions in modern cryptology. Beijing: Science Press(2000).
Google Scholar
[2]
G. Xiao, J. Massey. A Spectral Characterization of Correlation-Immune Combining Functions,. IEEE Trans. on Inform. Theory. Vol. 34(3): 569-571(1988).
DOI: 10.1109/18.6037
Google Scholar
[3]
S. Li, B. Zeng, Y. Lian, et al. Logical functions in cryptography. Beijing: China National Computer Software and Technology Service Corporation Press(2003).
Google Scholar
[4]
Q. Wen, J. Zhang, X. Niu , Y. Yang. "Review of Boolean Functions of Modern Cryptography. Telecommunication Science, Vol. 20(12): 43-46(2004).
Google Scholar
[5]
J. Peng, Q. Wu, H. Kan. On symmetric boolean functions with high algebraic immunity on even number of variables,. IEEE Transactions on Information Theory, Vol. 57(10): 7205–7220(2011).
DOI: 10.1109/tit.2011.2132113
Google Scholar
[6]
C. Carlet, D. K. Dalai, K. C. Gupta, et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction,. IEEE Transactions on Information Theory, Vol. 52(7): 3105–3121(2006).
DOI: 10.1109/tit.2006.876253
Google Scholar
[7]
C. Carlet and K. Feng. An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity,. in Advances in Cryptology—ASIACRYPT 2008, Berlin, Germany, vol. 5350, pp: 425–440(2008).
DOI: 10.1007/978-3-540-89255-7_26
Google Scholar
[8]
D. K. Dalai, S. Maitra, and S. Sarkar. Basic theory in construction and analysis of Boolean functions of variables with maximum algebraic immunity,. Designs, Codes Cryptogr., vol. 40(1): 41–58(2006).
DOI: 10.1007/s10623-005-6300-x
Google Scholar
[9]
J. Huang, Z. Wang. The relationship between correlation immune and weight of H Boolean functions,. Journal on Communications, Vol. 33(2): 110-118(2012). (In Chinese).
Google Scholar
[10]
W. Li, Z. Wang, J. Huang. The e-derivative of boolean functions and its application in the fault detection and cryptographic system,. Kybernetes, Vol. 40(5-6): 905-911(2011).
DOI: 10.1108/03684921111142458
Google Scholar
[11]
Y. Ding, Z. Wang, J. Ye. Initial-value problem of the Boolean function's primary function and its application in cryptographic system,. Kybernetes, Vol. 39(6): 900-906(2010).
DOI: 10.1108/03684921011046663
Google Scholar