Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Crama Y., Hammer P. L., Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Encyclopedia of Mathematics and its Applications, Cambridge University Press, 2010 | MR | Zbl
[2] Oliynykov R., Kazymyrov O., “An impact of S-box Boolean function properties to strength of modern symmetric block ciphers”, Radio Engineering, 166, Kharkiv, 2011, 11–17
[3] Rijmen V., Cryptanalysis and design of iterated block ciphers, PhD Thesis, University of Leuven, 1997
[4] Kazymyrov O., Oliynykov R., Vectorial Boolean functions application for substitutions generation for symmetric cryptographic transformation, Applied Radio Electronics, Kharkiv, 2012 (In Russian)
[5] Budaghyan L., Kazymyrov O., “Verification of restricted EA-equivalence for vectorial Boolean functions”, Lect. Notes Comput. Sci., 7369, 2012, 108–118 | DOI | MR | Zbl
[6] Tesa Ř. P., “A new method for generating high non-linearity S-boxes”, Radioengineering, 19:1 (2010), 23–26
[7] Izbenko Y., Kovtun V., Kuznetsov A., The design of Boolean functions by modified hill climbing method, , 10.03.2013 http://eprint.iacr.org/2008/111.pdf
[8] Millan W., Clark A., Dawson E., “Boolean function design using hill climbing methods”, Lect. Notes Comput. Sci., 1587, 1999, 1–11 | DOI | Zbl
[9] Daemen J., Rijmen V., AES proposal: Rijndael, , 10.03.2013 http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
[10] Logachev O. A., Salnikov A. A., Yaschenko V. V., Boolean functions in coding theory and cryptology, MCCME, Moscow, 2004 (In Russian) | MR
[11] Yu Y., Wang M., Li Y., Constructing differential 4-uniform permutations from know ones, , 10.03.2013 http://eprint.iacr.org/2011/047.pdf