References
- C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes in Boolean Methods and Models, Cambridge University Press, Cambridge, 2010.
- C. Carlet and E. Prouff, On plateaued functions and their constructions, Proceedings of Fast Software Encryption 2003, Lecture Notes in Computer Science, 2887, Springer, Berlin, 54-73, 2003.
- A. Cesmelioglu and W. Meidl, A construction of bent functions from plateaued functions, Des. Codes Cryptogr. 66 (2013), no. 1-3, 231-242. https://doi.org/10.1007/s10623-012-9686-2
- X.-D. Hou, p-ary and q-ary versions of certain results about bent functions and resilient functions, Finite Fields Appl. 10 (2004), no. 4, 566-582. https://doi.org/10.1016/j.ffa.2003.12.004
- J. Y. Hyun, J. Lee, and Y. Lee, Explicit criteria for construction of plateaued functions, IEEE Trans. Inform. Theory 62 (2016), no. 12, 7555-7565. https://doi.org/10.1109/TIT.2016.2582217
- M. Matsui, Linear cryptananalysis method for DES cipher, in Proceedings of EURO-CRYPT'93, Lecture Notes in Computer Science, 765, (1994), 386-397.
- W. Meier and O. Staffelbach, Fast correlation attacks on stream ciphers, in Advances in Cryptology, EUROCRYPT'88, Lecture Notes in Computer Science, 330, (1988), 301-314.
- S. Mesnager, Characterizations of plateaued and bent functions in characteristic p, in Sequences and their applications -SETA 2014, 72-82, Lecture Notes in Comput. Sci., 8865, Springer, Cham, 2014.
-
S. Mesnager, On semi-bent functions and related plateaued functions over the Galois field
${\mathbb{F}}_{2^n}$ , in Open problems in mathematics and computational science, 243-273, Springer, Cham, 2014. - S. Mesnager, Characterizations of plateaued and bent functions in characteristic p, in Sequences and their applications-SETA 2014, 72-82, Lecture Notes in Comput. Sci., 8865, Springer, Cham, 2014.
- S. Mesnager, F. Ozbudak, and A. Sinak, Characterizations of plateaued functions in arbitrary characteristic, Proceedings of ICCC 2015, Algers, 2015.
- Y. Zheng and X. M. Zhang, Plateaued functions, Advances in Cryptology-ICICS'99, Lecture Notes in Computer Science, Heidelberg, Ed., Springer-Verlag, 1726, (1999), 284-300.