Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Sfinks : A synchronous stream cipher for restricted hardware environments. submission to eSTREAM, 2008. ,
Nonlinear Equivalence of Stream Ciphers, Fast Software Encryption, pp.40-54, 2010. ,
DOI : 10.1007/978-3-642-13858-4_3
Hyper-bent functions, Advances in Cryptology -EU- ROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, pp.406-419, 2001. ,
Linear Recurring Sequences, Journal of the Society for Industrial and Applied Mathematics, vol.7, issue.1, pp.31-48, 1959. ,
DOI : 10.1137/0107003
finite Fields for Computer Scientists and Engineers, SECS, vol.23, 1987. ,
DOI : 10.1007/978-1-4613-1983-2
Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969. ,
DOI : 10.1109/TIT.1969.1054260
Factoring Polynomials Over Finite Fields, Bell System Technical Journal, vol.46, issue.8, pp.1853-1859, 1967. ,
DOI : 10.1002/j.1538-7305.1967.tb03174.x
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, pp.176-194, 2003. ,
DOI : 10.1007/978-3-540-45146-4_11
Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology -EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.345-359, 2003. ,
Upper Bounds on Algebraic Immunity of Boolean Power Functions, Fast Software Encryption, 13th International Workshop, pp.375-389, 2006. ,
DOI : 10.1007/11799313_24
Decrypting a Class of Stream Ciphers Using Ciphertext Only, IEEE Transactions on Computers, vol.34, issue.1, pp.81-85, 1985. ,
DOI : 10.1109/TC.1985.1676518
Fast Correlation Attacks on Stream Ciphers, Advances in Cryptology -EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques Proceedings, pp.301-314, 1988. ,
DOI : 10.1007/3-540-45961-8_28
Fast correlation attacks against stream ciphers and related open problems, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005., pp.49-54, 2005. ,
DOI : 10.1109/ITWTPI.2005.4638690
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.9958
Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology -EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.209-221, 2002. ,
DOI : 10.1007/3-540-46035-7_14
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5, Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp.573-588, 2000. ,
DOI : 10.1007/3-540-45539-6_40
Bent and Hyper-Bent Functions in Polynomial Form and Their Link With Some Exponential Sums and Dickson Polynomials, IEEE Transactions on Information Theory, vol.57, issue.9, pp.5996-6009, 2011. ,
DOI : 10.1109/TIT.2011.2124439
On inversion in 2 n -1 . Finite Fields and Their Applications, pp.234-254, 2014. ,
Encyclopedia of Cryptography and Security, 2011. ,
An analysis of the structure and complexity of nonlinear binary sequence generators, IEEE Transactions on Information Theory, vol.22, issue.6, pp.732-736, 1976. ,
Fast Discrete Fourier Spectra Attacks on Stream Ciphers, IEEE Transactions on Information Theory, vol.57, issue.8, pp.5555-5565, 2011. ,
DOI : 10.1109/TIT.2011.2158480
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials, IEEE Transactions on Information Theory, vol.54, issue.9, pp.4230-4238, 2008. ,
DOI : 10.1109/TIT.2008.928273
Hyper-bent Boolean Functions with Multiple Trace Terms, Arithmetic of Finite Fields, Third International Workshop, WAIFI 2010 Proceedings, pp.97-113, 2010. ,
DOI : 10.1007/978-3-642-13797-6_8
Approximation of boolean functions by monomial ones, Discrete Math. Appl, vol.16, issue.1, pp.7-28, 2006. ,