[1] Courtois N,Meier W. Algebraic attacks on stream ciphers with linear feedback//Advances in Cryptology-EUROCRYPT 2003. Warsaw: Springer Verlag, 2003: 345-359. [2] Carlet C, Dalai D K, Gupta K C, et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121. [3] Carlet C. On the higher order nonlinearities of algebraic immune functions//Proceedings of CRYPTO 2006. Santa Barbara: Springer Verlag, 2006: 584-601. [4] Dalai D K,Gupta K C,Maitra S. Results on algebraic immunity for cryptographically significant Boolean functions//Indocrypt 2004. Chennai: Springer Verlag, 2004: 92-106. [5] Dalai D K,Gupta K C, Maitra S. Cryptographically significant Boolean functions: construction and analysis in terms of algebraic immunity//Workshop on Fast Software Encryption, FSE 2005. Paris: Springer-Verlag, 2005: 98-111. [6] Li Na, Qu Longjiang, Qi Wenfeng, et al. On the construction of Boolean functions with optimal algebraic immunity[J]. IEEE Transactions on Information Theory,2008, 54(3): 1330-1334. [7] Li Na, Qi Wenfeng. Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity[J]. IEEE Transactions on Information Theory,2006, 52(5): 2271-2273. [8] Li Na, Qi Wenfeng. Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity//Proceedings of Asiacrypt 2006. Shanghai: Springer Verlag, 2006: 84-98. |