Pavel V. Roldugin, Alexey V. Tarasov
|
|
|
References
|
|
|
1. |
Glushkov V.M., Sintez tsifrovykh avtomatov, M.: GIFML, 1962 |
2. |
Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, EUROCRYPT, Lect. Notes Comput. Sci., 2656, Springer-Verlag, 2003, 346-359 |
3. |
Logachev O.A., Salnikov A.A., Smyshlyaev S.V., Yaschenko V.V., Bulevy funktsii v teorii kodirovaniya i kriptologii, M.: MTsNMO, 2012, 583 pp. |
4. |
Dalai D., Maitra S., Sarkar S., “Basic theory in construction of Boolean functions with maximum possible annihilator immunity”, Designs, Codes and Cryptography, 40:1 (2006), 41-58 |
5. |
Jiao L., Wang M., Li Y., Liu M., “On annihilators in fewer variables: basic theory and applications”, Chinese Journal of Electronics, 22:3 (2013), 489-494 |
6. |
Glukhov M.M., Shishkov A.B., Matematicheskaya logika. Diskretnye funktsii. Teoriya algoritmov, SPb.: Lan, 2012 |
7. |
Gorshkov S.P., “Primenenie teorii NP-polnykh zadach dlya otsenki slozhnosti resheniya sistem bulevykh uravnenii”, Obozr. prikl. i prom. matem., 2:3 (1995), 325–399 |
8. |
Roldugin P.V., Tarasov A.V., “O bulevykh funktsiyakh bez verkhnikh biyunktivnykh analogov”, Matematicheskie problemy kriptografii, 4:1 (2013), 123–140 |
9. |
Slovar kriptograficheskikh terminov. Pod red. B.A. Pogorelova i V.N. Sachkova, M.: MTsNMO, 2006 |