Author of the publication

Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.

, and . BalkanCryptSec, volume 9540 of Lecture Notes in Computer Science, page 3-16. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modifying Boolean Functions to Ensure Maximum Algebraic Immunity., , and . IACR Cryptology ePrint Archive, (2012)Best Quadratic Approximations of Cubic Boolean Functions., , and . IACR Cryptology ePrint Archive, (2007)Digital forensics cloud log unification: Implementing CADF in Apache CloudStack., , , and . J. Inf. Secur. Appl., (2020)Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems., , , , , , and . Internet Things, (December 2023)Factorization of determinants over finite fields and application in stream ciphers., , and . Cryptogr. Commun., 1 (2): 175-205 (2009)On the Nonlinear Complexity and Lempel-Ziv Complexity of Finite Length Sequences., , and . IEEE Trans. Inf. Theory, 53 (11): 4293-4302 (2007)On the Linear Complexity of Sequences Obtained by State Space Generators., , and . IEEE Trans. Inf. Theory, 54 (4): 1786-1793 (2008)Threat Landscape for Smart Grid Systems., , , , , and . CoRR, (2021)Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks., , , and . CoRR, (2021)The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions., and . IEEE Trans. Inf. Theory, 65 (12): 8345-8356 (2019)