Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Gorshkov S.P., Tarasov A.V., Slozhnost resheniya sistem bulevykh uravnenii, Kurs, M., 2017, 192 pp.
[2] Logachev O.A., Salnikov A.A., Smyshlyaev S.V., Yaschenko V.V., Bulevy funktsii v teorii kodirovaniya i kriptologii, LENAND, M., 2015, 576 pp.
[3] Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, EUROCRYPT'2003, Lect. Notes Comput. Sci., 2656, 2003, 345–359 | DOI | MR | Zbl
[4] Courtois N., “Fast algebraic attacks on stream ciphers with linear feedback”, CRYPTO'2003, Lect. Notes Comput. Sci., 2729, 2003, 176–194 | DOI | MR | Zbl
[5] Chen J.-M., Yang B.-Y., “All in the XL family: theory and practice”, ICISC 2004, Lect. Notes Comput. Sci., 3506, 2005, 67–86 | DOI | MR | Zbl
[6] Dantsin E.Ya., “Algoritmika zadachi vypolnimosti”, Voprosy kibernetiki, 131, 1987, 7–29
[7] Tarasov A.V., “Bulevy biyunktivnye funktsii, grafy 2-KNF i ikh poryadkovye funktsii. Otsenki vesa biyunktivnoi funktsii s zadannym chislom sloev”, Matematicheskie voprosy kriptografii, 12:1 (2021), 83–95 | DOI | MR | Zbl