Author of the publication

Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions.

, , and . IMACC, volume 14421 of Lecture Notes in Computer Science, page 17-33. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions.. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes.. EUROCODE, volume 514 of Lecture Notes in Computer Science, page 42-50. Springer, (1990)On the construction of bent vectorial functions., and . Int. J. Inf. Coding Theory, 1 (2): 133-148 (2010)A further study of quadratic APN permutations in dimension nine., , , and . Finite Fields Their Appl., (2022)Editorial: Special issue on Boolean functions and their applications 2018., , and . Cryptogr. Commun., 11 (6): 1145-1146 (2019)Simplicity conditions for binary orthogonal arrays., , and . Des. Codes Cryptogr., 91 (1): 151-163 (2023)On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences.. IEEE Trans. Inf. Theory, 67 (10): 6926-6939 (2021)Vectorial Functions and Covering Sequences., and . International Conference on Finite Fields and Applications, volume 2948 of Lecture Notes in Computer Science, page 215-248. Springer, (2003)Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m>n/2., , and . IACR Cryptology ePrint Archive, (2018)An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 425-440. Springer, (2008)