[1] Chor B, Goldreich O, astad J H°, Friedman J, astad Ruǘ S,Friednan J, Rudi ch S. Extraction problem or t-resilient functions[A]. 26th IEEE Symp. Foundations of Computer Science[C].1985,26:396-407.
[2] Bennett C H, Brassard G, Robert J M. Privacy amplification by publicdiscus PPri vacy a mp[J]. Comput.,1988, 17(2):210-229.
[3] Bierbrauer Jurgen, Gopalakrishnan K, Stinson D R. Bounds for resilient functions and orthogonal arrays[C]. Advance in Cry,, Adv-CRYPTO'94, Le 994,Le 994, Le cture Not es in Comput er Scienc 839, Springer-verlag, Berlin, Heidelberg, New York, 247-256.
[4] Gopalakrishnan K, Hoffman D G, Stinson D R. A note on a conjecture concerning symmetric resilient functions[J]. Inform Processing Lett, 1993,47:139-143.
[5] Stinson D R, Massey J L. A infinite class of count A Infinite class of counter examples to a conjecture concerning nonlinear resilient functions[J]. J. Cryptology, 1995,8(3):173.
[6] ZHANG Xiaomo, ZHANG Yuliang. Cryptographically resilient functions[J]. IEEE Trans. Inform. Theory, 1997,43:1 740-1 747.
[7] ZHANG Xiaomo, ZHANG Yuliang. On nonlinear resiliert functions[A]. In Advance in cryptology-Eurocrypt'95[C]. Berlin 1995, Berlin: Spring-verlag,1996,274-290.
[8] CHEN Lusheng, FU Fangwei. On the constructions of new resilient functions from old ones[J]. IEEE Trans. Inform Theory, 1999,45(6):2 077-2 082.
[9] 温巧燕等.现代密码学中的布尔函数[M].北京:科学出版社,2000.
[10] 温巧燕,杨义先.弹性函数的递归构造[J].北京邮电大学学报,2002,25(2):47-51. |