T. Siegenthaler, Correlation immunity of nonlinear combining function for cryptographic applications, IEEE Trans. on IT, 1984, 30(5), 776-780.[2]P. Camion, C. Carlet, P. Charpin, N. Sendrier, On correlation-immune functions, Advances in Cryptology-CRYPTO91, Lecture Notes in Computer Science, 1992, Springer-Verlag, vol.576,86-100.[3]J. Seberry, X. M. Zhang, Y. L. Zheng, Construction and nonlinearity of correlation-immune functions.[J]. Advances in Cryptology-EUROCRYPT93 Lecture Notes in Computer Science.1994,Springer-Verlag:-[4]Xiao Guo Zhen, J. L. Massey, A spectral characterization of correlation-immune combining functions, IEEE Trans. on IT, 1988, 34(3), 569-571.[5]楊義先,林須端,胡正名,編碼密碼學,北京,人民郵電出版社,1992.[6]單煒娟,相關免疫函數的結構與構造及其在流密碼中的應用,[碩士學位論文],西北電訊工程學院,1987,第三、四章.[7]X. M. Zhang, Y. L. Zheng, On nonlinear resilent functions, Advances in CryptologyEUROCRYPT95, Lecture Notes in Computer Science, 1995, Springer-Verlag, vol.921,274-288.[8]C. Adams, S. Tavares, The structured design of cryptographically good S-boxes, Journal of Cryptology, 1990, 2(3), 27-41.[9]武傳坤,王新梅,非線性置換的構造,科學通報,1992,37(12),1147-1150.
|