Claude Carlet

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
More on the sum-freedom of the multiplicative inverse function
Designs, Codes and Cryptography
2025-12-01Paper
The stability of the algebraic degree of Boolean functions when restricted to affine spaces
Designs, Codes and Cryptography
2025-12-01Paper
On cubic-like bent Boolean functions
Journal of Algebraic Combinatorics
2025-07-25Paper
Use of simple arithmetic operations to construct efficiently implementable Boolean functions possessing high nonlinearity and good resistance to algebraic attacks
Discrete Applied Mathematics
2025-06-30Paper
On the vector subspaces of \(\mathbb{F}_{2^n}\) over which the multiplicative inverse function sums to zero
Designs, Codes and Cryptography
2025-04-22Paper
On the Walsh and Fourier-Hadamard supports of Boolean functions from a quantum viewpoint2025-04-15Paper
Coset leaders of the first-order Reed-Muller codes in four new classes of Boolean functions
Advances in Mathematics of Communications
2025-03-27Paper
Two generalizations of almost perfect nonlinearity
Journal of Cryptology
2025-03-26Paper
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property
Advances in Mathematics of Communications
2025-02-19Paper
On the supports of the Walsh transforms of Boolean functions2024-09-18Paper
On the construction of balanced Boolean functions with a good algebraic immunity2024-09-18Paper
Self dual bent functions2024-09-18Paper
Correction to: ``On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property''
Advances in Mathematics of Communications
2024-09-16Paper
Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and threshold functions2024-08-30Paper
The weight spectrum of the Reed-Muller codes \(RM(m-5,m)\)
IEEE Transactions on Information Theory
2024-07-23Paper
An optimal universal construction for the threshold implementation of bijective S-boxes
IEEE Transactions on Information Theory
2024-07-19Paper
Parameterization of Boolean functions by vectorial functions and associated constructions
Advances in Mathematics of Communications
2024-06-17Paper
On the APN-ness and differential uniformity of some classes of \((n,n)\)-functions over \(\mathbb{F}_2^n\)
Advances in Mathematics of Communications
2024-06-01Paper
On those Boolean functions that are coset leaders of first order Reed-Muller codes
Annals of Mathematics and Artificial Intelligence
2024-02-09Paper
Evolutionary strategies for the design of binary linear codes
Evolutionary Computation in Combinatorial Optimization
2024-01-12Paper
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Advances in Mathematics of Communications
2023-09-12Paper
On APN functions whose graphs are maximal Sidon sets
LATIN 2022: Theoretical Informatics
2023-07-26Paper
The weight spectrum of two families of Reed-Muller codes
Discrete Mathematics
2023-07-19Paper
Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators
Advances in Mathematics of Communications
2023-07-07Paper
Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields
Advances in Mathematics of Communications
2023-07-07Paper
Revisiting some results on APN and algebraic immune functions
Advances in Mathematics of Communications
2023-06-30Paper
Gold functions and switched cube functions are not 0-extendable in dimension \(n > 5\)
Designs, Codes and Cryptography
2023-04-21Paper
Simplicity conditions for binary orthogonal arrays
Designs, Codes and Cryptography
2023-01-18Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO
Diskretnyi analiz i issledovanie operatsii
2022-07-15Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO
Diskretnyi analiz i issledovanie operatsii
2022-07-15Paper
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions
IEEE Transactions on Information Theory
2022-07-13Paper
On Two Fundamental Problems on APN Power Functions
IEEE Transactions on Information Theory
2022-07-13Paper
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience2022-07-01Paper
On balanced sets of binary vectors2022-05-18Paper
A further study of quadratic APN permutations in dimension nine
Finite Fields and their Applications
2022-05-09Paper
Simplicity conditions for binary orthogonal arrays
(available as arXiv preprint)
2022-04-02Paper
On those multiplicative subgroups of \({\mathbb F}_{2^n}^\ast\) which are Sidon sets and/or sum-free sets
Journal of Algebraic Combinatorics
2022-03-15Paper
On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences
IEEE Transactions on Information Theory
2022-02-17Paper
A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function
IEEE Transactions on Information Theory
2022-02-17Paper
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions
IEEE Transactions on Information Theory
2022-02-17Paper
On known constructions of APN and AB functions and their relation to each other
Sv. 25(2021)=knj. 60
2022-02-07Paper
Gold Functions and Switched Cube Functions Are Not 0-Extendable in Dimension $n > 5$
(available as arXiv preprint)
2022-01-25Paper
Relation between o-equivalence and EA-equivalence for Niho bent functions
Finite Fields and their Applications
2021-04-08Paper
A direct proof of APN-ness of the Kasami functions
Designs, Codes and Cryptography
2021-03-17Paper
On group rings and some of their applications to combinatorics and symmetric cryptography2021-03-10Paper
Generalized isotopic shift construction for APN functions
Designs, Codes and Cryptography
2021-01-25Paper
Handling Vectorial Functions by Means of Their Graph Indicators
IEEE Transactions on Information Theory
2020-12-04Paper
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions
IEEE Transactions on Information Theory
2020-12-04Paper
Three parameters of Boolean functions related to their constancy on affine spaces
Advances in Mathematics of Communications
2020-11-07Paper
On the Distance Between APN Functions
IEEE Transactions on Information Theory
2020-09-29Paper
Constructing APN Functions Through Isotopic Shifts
IEEE Transactions on Information Theory
2020-09-29Paper
Boolean functions for homomorphic-friendly stream ciphers
Algebra, Codes and Cryptology
2020-06-29Paper
Improved filter permutators for efficient FHE: better instances and implementations2020-05-12Paper
Boolean functions for cryptography and coding theory2020-02-04Paper
On the Derivative Imbalance and Ambiguity of Functions
IEEE Transactions on Information Theory
2020-01-28Paper
Some (almost) optimally extendable linear codes
Designs, Codes and Cryptography
2019-11-07Paper
Linear codes with small hulls in semi-primitive case
Designs, Codes and Cryptography
2019-11-07Paper
Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)
Designs, Codes and Cryptography
2019-06-06Paper
On $\sigma$ -LCD Codes
IEEE Transactions on Information Theory
2019-03-28Paper
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
Designs, Codes and Cryptography
2019-02-20Paper
Construction of some codes suitable for both side channel and fault injection attacks2019-02-15Paper
New Characterization and Parametrization of LCD Codes
IEEE Transactions on Information Theory
2019-01-18Paper
Euclidean and Hermitian LCD MDS codes
Designs, Codes and Cryptography
2018-10-10Paper
On Linear Complementary Pairs of Codes
IEEE Transactions on Information Theory
2018-09-19Paper
Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform
IEEE Transactions on Information Theory
2018-09-19Paper
On Upper Bounds for Algebraic Degrees of APN Functions
IEEE Transactions on Information Theory
2018-09-14Paper
On the nonlinearity of monotone Boolean functions
Cryptography and Communications
2018-08-28Paper
Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets
Finite Fields and their Applications
2018-08-08Paper
scientific article; zbMATH DE number 6900649 (Why is no real title available?)2018-07-09Paper
scientific article; zbMATH DE number 6900653 (Why is no real title available?)2018-07-09Paper
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
IEEE Transactions on Information Theory
2018-06-27Paper
Statistical properties of side-channel and fault injection attacks using coding theory
Cryptography and Communications
2018-05-28Paper
A new concatenated type construction for LCD codes and isometry codes
Discrete Mathematics
2018-01-19Paper
Three basic questions on Boolean functions
Advances in Mathematics of Communications
2018-01-15Paper
Construction of Highly Nonlinear 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity
IEEE Transactions on Information Theory
2017-11-10Paper
Binary linear codes from vectorial Boolean functions and their weight distribution
Discrete Mathematics
2017-09-18Paper
On Semibent Boolean Functions
IEEE Transactions on Information Theory
2017-07-12Paper
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions
IEEE Transactions on Information Theory
2017-07-12Paper
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks
IEEE Transactions on Information Theory
2017-07-12Paper
Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials
IEEE Transactions on Information Theory
2017-07-12Paper
A New Class of Codes for Boolean Masking of Cryptographic Computations
IEEE Transactions on Information Theory
2017-06-08Paper
Further Results on Niho Bent Functions
IEEE Transactions on Information Theory
2017-06-08Paper
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
IEEE Transactions on Information Theory
2017-06-08Paper
Explicit characterizations for plateaued-Ness of \(p\)-ary (vectorial) functions
Codes, Cryptology and Information Security
2017-06-01Paper
Higher-Order CIS Codes
IEEE Transactions on Information Theory
2017-05-16Paper
Univariate Niho Bent Functions From o-Polynomials
IEEE Transactions on Information Theory
2017-04-28Paper
Boolean and vectorial plateaued functions and APN functions
IEEE Transactions on Information Theory
2017-04-28Paper
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions
Information Sciences
2017-02-07Paper
New secondary constructions of bent functions
Applicable Algebra in Engineering, Communication and Computing
2017-01-13Paper
Towards stream ciphers for efficient FHE with low-noise ciphertexts
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Polynomial evaluation and side channel analysis
The New Codebreakers
2016-05-02Paper
Cryptographic properties of monotone Boolean functions
Journal of Mathematical Cryptology
2016-04-18Paper
Complementary dual codes for counter-measures to side-channel attacks
Advances in Mathematics of Communications
2016-03-11Paper
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs
Designs, Codes and Cryptography
2016-03-09Paper
Four decades of research on bent functions
Designs, Codes and Cryptography
2016-02-02Paper
Complementary dual codes for counter-measures to side-channel attacks
Coding Theory and Applications
2016-01-07Paper
Algebraic decomposition for probing security
Lecture Notes in Computer Science
2015-12-10Paper
New construction of differentially 4-uniform bijections
Information Security and Cryptology
2015-12-02Paper
A new construction of differentially 4-uniform \((n,n-1)\)-functions
Advances in Mathematics of Communications
2015-11-25Paper
Open questions on nonlinearity and on APN functions
Arithmetic of Finite Fields
2015-10-01Paper
On o-equivalence of Niho bent functions
Arithmetic of Finite Fields
2015-10-01Paper
Differentially 4-uniform bijections by permuting the inverse function
Designs, Codes and Cryptography
2015-09-30Paper
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
Designs, Codes and Cryptography
2015-09-29Paper
On the properties of vectorial functions with plateaued components and their consequences on APN functions
Lecture Notes in Computer Science
2015-09-21Paper
Results on constructions of rotation symmetric bent and semi-bent functions
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Enhanced Boolean functions suitable for the filter model of pseudo-random generator
Designs, Codes and Cryptography
2015-09-01Paper
Open problems on binary bent functions
Open Problems in Mathematics and Computational Science
2015-06-22Paper
A class of 1-resilient Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks
International Journal of Foundations of Computer Science
2015-01-21Paper
Leakage squeezing: optimal implementation and security evaluation
Journal of Mathematical Cryptology
2014-09-17Paper
Correlation-immune Boolean functions for leakage squeezing and rotating S-box masking against side channel attacks
Security, Privacy, and Applied Cryptography Engineering
2014-09-15Paper
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions
Journal of Combinatorial Theory. Series A
2014-09-08Paper
Cryptographic properties of the hidden weighted bit function
Discrete Applied Mathematics
2014-08-22Paper
Leakage squeezing of order two
Lecture Notes in Computer Science
2014-08-20Paper
On the arithmetic Walsh coefficients of Boolean functions
Designs, Codes and Cryptography
2014-08-18Paper
A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers
Vietnam Journal of Mathematics
2014-08-01Paper
On the second-order nonlinearities of some bent functions
Information Sciences
2014-08-01Paper
More constructions of APN and differentially 4-uniform functions by concatenation
Science China. Mathematics
2014-03-05Paper
Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions
Advances in Mathematics of Communications
2013-05-06Paper
Higher-order masking schemes for S-boxes
Fast Software Encryption
2013-01-08Paper
Secondary constructions of bent functions and their enforcement
Advances in Mathematics of Communications
2012-11-12Paper
Bent functions on a Galois ring and systematic authentication codes
Advances in Mathematics of Communications
2012-08-14Paper
Optimal First-Order Masking with Linear and Non-linear Bijections
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On Dillon's class \(H\) of bent functions, Niho bent functions and o-polynomials
Journal of Combinatorial Theory. Series A
2011-10-21Paper
More vectorial Boolean functions with unbounded nonlinearity profile
International Journal of Foundations of Computer Science
2011-10-10Paper
Recent results on binary bent functions2011-08-19Paper
On known and new differentially uniform functions
Information Security and Privacy
2011-07-07Paper
Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
Designs, Codes and Cryptography
2011-04-08Paper
CCZ-equivalence of bent vectorial functions and related constructions
Designs, Codes and Cryptography
2011-04-08Paper
scientific article; zbMATH DE number 5862915 (Why is no real title available?)2011-03-09Paper
Vectorial Boolean functions for cryptography2011-03-09Paper
Self-dual bent functions
International Journal of Information and Coding Theory
2011-02-04Paper
On the construction of bent vectorial functions
International Journal of Information and Coding Theory
2011-02-04Paper
CCZ-equivalence of single and multi output Boolean functions2011-01-03Paper
On plateaued functions and their constructions.
Lecture Notes in Computer Science
2010-01-05Paper
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
2009-10-14Paper
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity
Lecture Notes in Computer Science
2009-07-23Paper
Constructing new APN functions from known ones
Finite Fields and their Applications
2009-04-08Paper
A Method of Construction of Balanced Functions with Optimum Algebraic Immunity
Coding and Cryptology
2009-03-09Paper
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
IEEE Transactions on Information Theory
2009-02-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions
IEEE Transactions on Information Theory
2009-02-24Paper
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
IEEE Transactions on Information Theory
2009-02-24Paper
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Linear Codes From Perfect Nonlinear Mappings and Their Secret Sharing Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
IEEE Transactions on Information Theory
2008-12-21Paper
The weight distribution of a class of linear codes from perfect nonlinear functions
IEEE Transactions on Information Theory
2008-12-21Paper
Improving the Upper Bounds on the Covering Radii of Binary Reed–Muller Codes
IEEE Transactions on Information Theory
2008-12-21Paper
New classes of almost bent and almost perfect nonlinear polynomials
IEEE Transactions on Information Theory
2008-12-21Paper
Normal Extensions of Bent Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Cubic Boolean Functions With Highest Resiliency
IEEE Transactions on Information Theory
2008-12-21Paper
Partial covering sequences: a method for designing classes of cryptographic functions
Algebraic Geometry and Its Applications
2008-12-10Paper
On Immunity Profile of Boolean Functions
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Generalized Correlation Analysis of Vectorial Boolean Functions
Fast Software Encryption
2008-09-16Paper
On a improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity
Advances in Mathematics of Communications
2008-08-12Paper
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
On the Higher Order Nonlinearities of Algebraic Immune Functions
Lecture Notes in Computer Science
2007-09-04Paper
Nonlinearities of S-boxes
Finite Fields and their Applications
2007-02-14Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Authentication schemes from highly nonlinear functions
Designs, Codes and Cryptography
2006-11-22Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Piecewise constructions of bent and almost optimal Boolean functions
Designs, Codes and Cryptography
2006-05-29Paper
Hyper-bent functions and cyclic codes
Journal of Combinatorial Theory. Series A
2006-04-28Paper
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions2006-03-01Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Concatenating indicators of flats for designing cryptographic functions
Designs, Codes and Cryptography
2005-08-18Paper
scientific article; zbMATH DE number 2127861 (Why is no real title available?)2005-01-14Paper
scientific article; zbMATH DE number 2124963 (Why is no real title available?)2005-01-04Paper
Highly nonlinear mappings
Journal of Complexity
2004-08-06Paper
On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
Journal of Complexity
2004-08-06Paper
scientific article; zbMATH DE number 1972836 (Why is no real title available?)2004-02-08Paper
scientific article; zbMATH DE number 1866861 (Why is no real title available?)2003-10-12Paper
An Upper Bound on the Number of m-Resilient Boolean Functions
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942443 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1594286 (Why is no real title available?)2003-05-11Paper
On cryptographic propagation criteria for Boolean functions
Information and Computation
2003-01-14Paper
On cryptographic properties of the cosets of R(1, m)
IEEE Transactions on Information Theory
2002-08-04Paper
Spectral domain analysis of correlation immune and resilient Boolean functions
Finite Fields and their Applications
2002-07-04Paper
On the divisibility properties and nonlinearity of resilient functions
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
2002-06-13Paper
scientific article; zbMATH DE number 1504655 (Why is no real title available?)2002-02-21Paper
Bent, resilient functions and the numerical normal form2001-06-17Paper
An alternate characterization of the bentness of binary functions, with uniqueness
Designs, Codes and Cryptography
2001-03-18Paper
Codes, bent functions and permutations suitable for DES-like cryptosystems
Designs, Codes and Cryptography
2000-06-22Paper
scientific article; zbMATH DE number 1461530 (Why is no real title available?)2000-06-20Paper
scientific article; zbMATH DE number 1426186 (Why is no real title available?)2000-03-30Paper
Two New Classes of Bent Functions
Advances in Cryptology — EUROCRYPT ’93
2000-02-01Paper
scientific article; zbMATH DE number 1188992 (Why is no real title available?)1999-11-21Paper
Z/sub 2/k-linear codes
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1222358 (Why is no real title available?)1999-09-21Paper
scientific article; zbMATH DE number 1303142 (Why is no real title available?)1999-06-17Paper
Sur le critère de propagation de degré ℓ et d'ordre k
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
1998-01-01Paper
Codes Z2k-linéaires
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
1997-11-17Paper
A characterization of binary bent functions
Journal of Combinatorial Theory. Series A
1996-12-16Paper
scientific article; zbMATH DE number 953210 (Why is no real title available?)1996-12-01Paper
scientific article; zbMATH DE number 841853 (Why is no real title available?)1996-07-02Paper
Generalized partial spreads
IEEE Transactions on Information Theory
1996-02-20Paper
On Z/sub 4/-duality
IEEE Transactions on Information Theory
1996-01-07Paper
Comments on "Generating and counting binary Bent sequences"
IEEE Transactions on Information Theory
1995-12-17Paper
scientific article; zbMATH DE number 708811 (Why is no real title available?)1995-08-13Paper
scientific article; zbMATH DE number 622514 (Why is no real title available?)1994-08-21Paper
The Divisors of $x^{2m} + x$ of Constant Derivatives and Degree $2^{m - 2}$
SIAM Journal on Discrete Mathematics
1994-07-13Paper
scientific article; zbMATH DE number 493087 (Why is no real title available?)1994-01-27Paper
A general case of formal duality between binary nonlinear codes
Discrete Mathematics
1993-12-20Paper
Partially-bent functions
Designs, Codes and Cryptography
1993-10-14Paper
The automorphism groups of the Delsarte-Goethals codes
Designs, Codes and Cryptography
1993-08-29Paper
scientific article; zbMATH DE number 176542 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 97780 (Why is no real title available?)1993-01-17Paper
The Automorphism Groups of the Kerdock Codes
Journal of Information and Optimization Sciences
1992-09-27Paper
scientific article; zbMATH DE number 4114556 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 4121937 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 3977628 (Why is no real title available?)1985-01-01Paper


Research outcomes over time


This page was built for person: Claude Carlet