G. R. Blakley, Safeguarding cryptographic keys, Proceedings of AFIPS 1979 National Computer Conference, pp.313-317, 1979.

A. [. Biham and . Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol.36, issue.4, pp.3-72, 1991.
DOI : 10.1007/BF00630563

M. Carpentieri, A perfect threshold secret sharing scheme to identify cheaters. Designs, Codes and Cryptography, pp.183-187, 1995.

C. [. Camion, P. Carlet, N. Charpin, and . Sendrier, On Correlation-immune functions, Advances in Cryptology -CRYPTO'91, pp.87-100, 1991.
DOI : 10.1007/3-540-46766-1_6

M. Carpentieri, A. D. Santis, and U. Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, Advances in Cryptology -EUROCRYPT'93, pp.118-125, 1993.
DOI : 10.1007/3-540-48285-7_10

Y. Desmedt, Society and Group Oriented Cryptography: a New Concept, Lecture Notes in Computer Science, vol.293, pp.120-127, 1988.
DOI : 10.1007/3-540-48184-2_8

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EU- ROCRYPT'93, pp.386-397, 1994.
DOI : 10.1007/3-540-48285-7_33

N. [. Macwilliams and . Sloane, The Theory of Error-Correcting Codes, 1978.

. Pll-+-91-]-b, W. V. Preneel, L. V. Leekwijck, R. Linden, J. Govaerts et al., Propagation characteristics of boolean functions, Advances in Cryptology -EUROCRYPT'90, pp.155-165, 1991.

J. Pieprzyk and X. M. Zhang, Nonlinear secret sharing immune against cheating, Proceedings of 2001 International Workshop on Cryptology and Network Security, parallel to The Seventh International Conference on Distributed Multimedia Systems, pp.154-161, 2001.

M. [. Rabin and . Ben-or, Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85
DOI : 10.1145/73007.73014

]. O. Rot76 and . Rothaus, On " bent " functions, Journal of Combinatorial Theory, vol.20, pp.300-305, 1976.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

]. T. Sie84 and . Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information Theory, IT-30, issue.5, pp.776-779, 1984.

S. [. Sarkar and . Maitra, Highly nonlinear balanced boolean functions with important cryptographic properties, Advances in Cryptology -EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pp.485-506, 2000.

]. D. Sti95 and . Stinson, Cryptography: Theory and practice, 1995.

M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, vol.22, issue.11, pp.133-138, 1988.
DOI : 10.1007/BF02252871

S. [. Webster and . Tavares, On the design of S-boxes. In Advances in Cryptology - CRYPTO'85, Lecture Notes in Computer Science, vol.219, pp.523-534, 1986.

J. [. Xiao and . Massey, A spectral characterization of correlation-immune combining functions, IEEE Transactions on Information Theory, vol.34, issue.3, pp.569-571, 1988.
DOI : 10.1109/18.6037

Y. [. Zhang and . Zheng, Cryptographically resilient functions, IEEE Transactions on Information Theory, vol.43, issue.5, pp.1740-1747, 1997.
DOI : 10.1109/18.623184