Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Alekseev E. K., “Some algebraic and combinatorial properties of correlation-immune Boolean functions”, Diskretnaya matematika, 22:3 (2010), 110–126 (in Russian) | DOI | MR | Zbl
[2] Alekseev E. K., “Some measures of nonlinearity of Boolean functions”, Prikladnaya diskretnaya matematika, 2 (2011), 5–16 (in Russian)
[3] Alekseev E. K., “Filtering generator attacks with function close to algebraically degenerate”, Sbornik statej molodyh uchenyh fakul'teta VMK MSU, 8 (2011), 19–32 (in Russian)
[4] Alekseev E. K., Karelina E. K., “Classification of correlation-immune and minimal correlationimmune functions of 4 and 5 variables”, Diskretnaya matematika, 27:1 (2015), 22–33 (in Russian) | DOI | MR | Zbl
[5] Kuschinskaja L. A., Research in applicability limits of shift register-based stream ciphers cryptanalysis methods, Master degree thesis, MSU, CMC Faculty, 2015, 34 pp. (in Russian)
[6] Logachev O. A., Salnikov A. A., Smyshlyaev S. V., Yashchenko V. V., Boolean functions in coding theory and cryptology, URSS, M., 2015, 576 pp. (in Russian) | MR
[7] Information technology. Information security. Block ciphers, GOST R 34.12-2015, Federal Agency on Technical Regulating and Metrology, 2015 (in Russian)
[8] Tarannikov Yu. V., “Correlation-immune and resilient Boolean functions”, Matematicheskie voprosy kibernetiki, 11 (2002), 91–148 (in Russian) | MR | Zbl
[9] Siegenthaler T., “Decrypting a class of stream cipher using ciphertext only”, IEEE Trans. Comput., 34:1 (1985), 81–85 | DOI
[10] Meier W., Staffelbach O., “Fast correlation attacks on certain stream ciphers”, J. of Cryptology, 1 (1989), 159–176 | DOI | MR | Zbl
[11] Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, EUROCRYPT'03, Lect. Notes Comput. Sci., 2656, 346–359 | MR
[12] Matsui M., “Linear cryptanalysis method for DES cipher”, EUROCRYPT'93, Lect. Notes Comput. Sci., 765, 1994, 386–397 | DOI | Zbl
[13] Dawson E., Clark A., Golich J., Millan W., Penna L., Simpson L., “The LILI-128 keystream generator”, Proc. of the first NESSIE workshop, 2000, 1–14 | MR | Zbl