Author of the publication

Linear Nonequivalence versus Nonlinearity.

, and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 156-164. Springer, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem., , and . IACR Cryptology ePrint Archive, (2007)MRD Hashing., , and . FSE, volume 1372 of Lecture Notes in Computer Science, page 134-149. Springer, (1998)Homogeneous bent functions of degree n in 2n variables do not exist for nge3., , , and . Discret. Appl. Math., 142 (1-3): 127-132 (2004)The eight variable homogeneous degree three bent functions., , and . J. Discrete Algorithms, 6 (1): 66-72 (2008)Combinatorial aspects of jump codes., and . Discret. Math., 294 (1-2): 43-51 (2005)Conditionally Secure Secret Sharing Schemes with Disenrollment Capability., , and . ACM Conference on Computer and Communications Security, page 89-95. ACM, (1994)Attacking the SL2 Hashing Scheme., and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 322-330. Springer, (1994)Crypto Topics and Applications II., , , and . Algorithms and Theory of Computation Handbook, CRC Press, (1999)A New Class of Designs Which Protect against Quantum Jumps., , , , , and . Des. Codes Cryptogr., 29 (1-3): 51-70 (2003)Linear Nonequivalence versus Nonlinearity., and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 156-164. Springer, (1992)