Author of the publication

On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.

, , , and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 82-92. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Cusick-Cheon Conjecture About Balanced Boolean Functions in the Cosets of the Binary Reed-Muller Code.. IEEE Trans. Inf. Theory, 55 (1): 16-18 (2009)On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions., , , and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 82-92. Springer, (2003)On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials., , and . IACR Cryptology ePrint Archive, (2007)On a Connection between Ideal Two-level Autocorrelation and Almost Balancedness of $p$-ary Sequences. CoRR, (2011)Computing the Weight Distribution of the Binary Reed-Muller Code R(4, 9)., and . CoRR, (2023)Computing the number of finite field elements with prescribed absolute trace and co-trace., , and . Cryptogr. Commun., 11 (3): 497-507 (2019)On Jacket transforms over finite fields., and . ISIT, page 2803-2807. IEEE, (2009)Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequences., and . CUBE, page 11-16. ACM, (2012)On the Non-minimal Codewords in Binary Reed-Muller Codes., , and . Discret. Appl. Math., 128 (1): 65-74 (2003)Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties., , , and . IACR Cryptology ePrint Archive, (2004)