Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. on Information Theory, 1984, IT-30(5): 776-780.[2]Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only[J].IEEE Trans. on Computer.1985, C-34(1):81-85[3]丁存生,肖國鎮(zhèn).流密碼學及其應用.北京:國防工業(yè)出版社,1994,160-180[4]楊義先,胡正名.用于序列密碼的布爾函數(shù)計數(shù)問題.通信學報,1992,13(4):18-24[5]Pichier F. On the Walsh-Fourier analysis of correlation-immune switching functions. Proc. of Eurocrypt86, Linkoping: 1986, 237-241.[6]Mitchell C. Enumerating Boolean functions of cryptographic significance. J. of Cryptology, 1990,2(3): 155-170.[7]單煒娟.相關免疫函數(shù)的結構與構造.應用數(shù)學學報,1991,14(3):331-336[8]楊義先.相關免疫布爾函數(shù)的計數(shù).電子科學學刊,1993,15(2):140-146[9]郭寶安.非線性序列的分析和綜合:[博士論文].北京:北京郵電大學,1993[10]王建宇.線性結構函數(shù)與一階相關免疫函數(shù)的計數(shù).通信學報,1996,17(1):87-91.[11]楊義先.高維Hadamard矩陣的幾個猜想之證明.科學通報,1986,31(2):85-89.[12]張建州.非相關布爾函數(shù)個數(shù)的精確值.電子科技大學學報,1994,23(1):89-94.[13]Palmer E M, Read R C, Robinson R W. Balancing the n-cube: A census of colorings[J].J of Algebraic Combinatorics.1992, 1(4):257-273[14]柯召,魏萬迪.組合論.北京:科學出版社,1984,85-88.[15]Bondy J A, Murty U S R. Graph Theory with Applications. London: The MacMillan Press Ltd.1976, 8-10.
|