Safeguarding cryptographic keys, Proceedings of AFIPS 1979 National Computer Conference, pp.313-317, 1979. ,
Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol.36, issue.4, pp.3-72, 1991. ,
DOI : 10.1007/BF00630563
A perfect threshold secret sharing scheme to identify cheaters. Designs, Codes and Cryptography, pp.183-187, 1995. ,
On Correlation-immune functions, Advances in Cryptology -CRYPTO'91, pp.87-100, 1991. ,
DOI : 10.1007/3-540-46766-1_6
Size of Shares and Probability of Cheating in Threshold Schemes, Advances in Cryptology -EUROCRYPT'93, pp.118-125, 1993. ,
DOI : 10.1007/3-540-48285-7_10
Society and Group Oriented Cryptography: a New Concept, Lecture Notes in Computer Science, vol.293, pp.120-127, 1988. ,
DOI : 10.1007/3-540-48184-2_8
Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EU- ROCRYPT'93, pp.386-397, 1994. ,
DOI : 10.1007/3-540-48285-7_33
The Theory of Error-Correcting Codes, 1978. ,
Propagation characteristics of boolean functions, Advances in Cryptology -EUROCRYPT'90, pp.155-165, 1991. ,
Nonlinear secret sharing immune against cheating, Proceedings of 2001 International Workshop on Cryptology and Network Security, parallel to The Seventh International Conference on Distributed Multimedia Systems, pp.154-161, 2001. ,
Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85 ,
DOI : 10.1145/73007.73014
On " bent " functions, Journal of Combinatorial Theory, vol.20, pp.300-305, 1976. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information Theory, IT-30, issue.5, pp.776-779, 1984. ,
Highly nonlinear balanced boolean functions with important cryptographic properties, Advances in Cryptology -EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pp.485-506, 2000. ,
Cryptography: Theory and practice, 1995. ,
How to share a secret with cheaters, Journal of Cryptology, vol.22, issue.11, pp.133-138, 1988. ,
DOI : 10.1007/BF02252871
On the design of S-boxes. In Advances in Cryptology - CRYPTO'85, Lecture Notes in Computer Science, vol.219, pp.523-534, 1986. ,
A spectral characterization of correlation-immune combining functions, IEEE Transactions on Information Theory, vol.34, issue.3, pp.569-571, 1988. ,
DOI : 10.1109/18.6037
Cryptographically resilient functions, IEEE Transactions on Information Theory, vol.43, issue.5, pp.1740-1747, 1997. ,
DOI : 10.1109/18.623184