Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing plateaued Boolean functions in spectral domain and their classification., , , and . CoRR, (2018)Design methods for semi-bent functions., , , and . Inf. Process. Lett., (2019)Large Sets of Orthogonal Sequences Suitable for Applications in CDMA Systems., , and . CoRR, (2016)Two secondary constructions of bent functions without initial conditions., , , , and . Des. Codes Cryptogr., 90 (3): 653-679 (2022)Bent functions from nonlinear permutations and conversely., , , and . Cryptogr. Commun., 11 (2): 207-225 (2019)Linear Codes in Constructing Resilient Functions with High Nonlinearity., and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 60-74. Springer, (2001)When does a bent concatenation not belong to the completed Maiorana-McFarland class?, , , and . CoRR, (2024)Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class.. IMACC, volume 2898 of Lecture Notes in Computer Science, page 93-114. Springer, (2003)Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis.. ICISC, volume 5461 of Lecture Notes in Computer Science, page 399-414. Springer, (2008)Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher., , , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 197-215. Springer, (2012)