Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2020_13_a22, author = {T. A. Bonich and M. A. Panferov and N. N. Tokareva}, title = {On the number of unsuitable {Boolean} functions in constructions of filter and combining models of stream ciphers}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {78--80}, publisher = {mathdoc}, number = {13}, year = {2020}, language = {en}, url = {http://geodesic.mathdoc.fr/item/PDMA_2020_13_a22/} }
TY - JOUR AU - T. A. Bonich AU - M. A. Panferov AU - N. N. Tokareva TI - On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2020 SP - 78 EP - 80 IS - 13 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2020_13_a22/ LA - en ID - PDMA_2020_13_a22 ER -
%0 Journal Article %A T. A. Bonich %A M. A. Panferov %A N. N. Tokareva %T On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers %J Prikladnaya Diskretnaya Matematika. Supplement %D 2020 %P 78-80 %N 13 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDMA_2020_13_a22/ %G en %F PDMA_2020_13_a22
T. A. Bonich; M. A. Panferov; N. N. Tokareva. On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers. Prikladnaya Diskretnaya Matematika. Supplement, no. 13 (2020), pp. 78-80. http://geodesic.mathdoc.fr/item/PDMA_2020_13_a22/
[1] Key E., “An analysis of the structure and complexity of nonlinear binary sequence generators”, IEEE Trans. Inform Theory, 22 (1976), 732–736 | DOI | Zbl
[2] Gluhov M. M., Elizarov V. P., Nechaev A. A., Algebra, Gelios ARV Publ., M., 2003 (in Russian)
[3] Roman'kov V. A., Introduction to Cryptography, Forum Publ., M., 2012 (in Russian)
[4] Tokareva N. N., Symmetric Cryptography. A Short Course, NSU Publ., Novosibirsk, 2012
[5] Carlet C., “Boolean functions for cryptography and error-correcting codes.”, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Ch. 8, eds. P. Hammer, Y. Crama, Cambridge Univ. Press, Cambridge, 2010, 257–397 www.math.univ-paris13.fr/c̃arlet/ | DOI | Zbl
[6] Hell M., Johansson T., Meier W., “A stream cipher for constrained environments”, Int. J. Wireless Mobile Comput., 2:1 (2007), 86–93 | DOI | MR
[7] Kumar N., Ojha S., Jain K., Lal S., “BEAN: A lightweight stream cipher”, Proc. 2nd Intern. Conf. SIN'2009, ACM, 2009, 168–171