Claude Carlet

From MaRDI portal
(Redirected from Person:256564)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
More on the sum-freedom of the multiplicative inverse function
Designs, Codes and Cryptography
2025-12-01Paper
The stability of the algebraic degree of Boolean functions when restricted to affine spaces
Designs, Codes and Cryptography
2025-12-01Paper
On cubic-like bent Boolean functions
Journal of Algebraic Combinatorics
2025-07-25Paper
Use of simple arithmetic operations to construct efficiently implementable Boolean functions possessing high nonlinearity and good resistance to algebraic attacks
Discrete Applied Mathematics
2025-06-30Paper
On the vector subspaces of \(\mathbb{F}_{2^n}\) over which the multiplicative inverse function sums to zero
Designs, Codes and Cryptography
2025-04-22Paper
On the Walsh and Fourier-Hadamard supports of Boolean functions from a quantum viewpoint2025-04-15Paper
Coset leaders of the first-order Reed-Muller codes in four new classes of Boolean functions
Advances in Mathematics of Communications
2025-03-27Paper
Two generalizations of almost perfect nonlinearity
Journal of Cryptology
2025-03-26Paper
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property
Advances in Mathematics of Communications
2025-02-19Paper
On the supports of the Walsh transforms of Boolean functions2024-09-18Paper
On the construction of balanced Boolean functions with a good algebraic immunity2024-09-18Paper
Self dual bent functions2024-09-18Paper
Correction to: ``On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property''
Advances in Mathematics of Communications
2024-09-16Paper
Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and threshold functions2024-08-30Paper
The weight spectrum of the Reed-Muller codes \(RM(m-5,m)\)
IEEE Transactions on Information Theory
2024-07-23Paper
An optimal universal construction for the threshold implementation of bijective S-boxes
IEEE Transactions on Information Theory
2024-07-19Paper
Parameterization of Boolean functions by vectorial functions and associated constructions
Advances in Mathematics of Communications
2024-06-17Paper
On the APN-ness and differential uniformity of some classes of \((n,n)\)-functions over \(\mathbb{F}_2^n\)
Advances in Mathematics of Communications
2024-06-01Paper
On those Boolean functions that are coset leaders of first order Reed-Muller codes
Annals of Mathematics and Artificial Intelligence
2024-02-09Paper
Evolutionary strategies for the design of binary linear codes
Evolutionary Computation in Combinatorial Optimization
2024-01-12Paper
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Advances in Mathematics of Communications
2023-09-12Paper
On APN functions whose graphs are maximal Sidon sets
LATIN 2022: Theoretical Informatics
2023-07-26Paper
The weight spectrum of two families of Reed-Muller codes
Discrete Mathematics
2023-07-19Paper
Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators
Advances in Mathematics of Communications
2023-07-07Paper
Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields
Advances in Mathematics of Communications
2023-07-07Paper
Revisiting some results on APN and algebraic immune functions
Advances in Mathematics of Communications
2023-06-30Paper
Gold functions and switched cube functions are not 0-extendable in dimension \(n > 5\)
Designs, Codes and Cryptography
2023-04-21Paper
Simplicity conditions for binary orthogonal arrays
Designs, Codes and Cryptography
2023-01-18Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO
Diskretnyi analiz i issledovanie operatsii
2022-07-15Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO
Diskretnyi analiz i issledovanie operatsii
2022-07-15Paper
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions
IEEE Transactions on Information Theory
2022-07-13Paper
On Two Fundamental Problems on APN Power Functions
IEEE Transactions on Information Theory
2022-07-13Paper
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience2022-07-01Paper
On balanced sets of binary vectors2022-05-18Paper
A further study of quadratic APN permutations in dimension nine
Finite Fields and their Applications
2022-05-09Paper
Simplicity conditions for binary orthogonal arrays
(available as arXiv preprint)
2022-04-02Paper
On those multiplicative subgroups of \({\mathbb F}_{2^n}^\ast\) which are Sidon sets and/or sum-free sets
Journal of Algebraic Combinatorics
2022-03-15Paper
On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences
IEEE Transactions on Information Theory
2022-02-17Paper
A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function
IEEE Transactions on Information Theory
2022-02-17Paper
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions
IEEE Transactions on Information Theory
2022-02-17Paper
On known constructions of APN and AB functions and their relation to each other
Sv. 25(2021)=knj. 60
2022-02-07Paper
Gold Functions and Switched Cube Functions Are Not 0-Extendable in Dimension $n > 5$
(available as arXiv preprint)
2022-01-25Paper
Relation between o-equivalence and EA-equivalence for Niho bent functions
Finite Fields and their Applications
2021-04-08Paper
A direct proof of APN-ness of the Kasami functions
Designs, Codes and Cryptography
2021-03-17Paper
On group rings and some of their applications to combinatorics and symmetric cryptography2021-03-10Paper
Generalized isotopic shift construction for APN functions
Designs, Codes and Cryptography
2021-01-25Paper
Handling Vectorial Functions by Means of Their Graph Indicators
IEEE Transactions on Information Theory
2020-12-04Paper
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions
IEEE Transactions on Information Theory
2020-12-04Paper
Three parameters of Boolean functions related to their constancy on affine spaces
Advances in Mathematics of Communications
2020-11-07Paper
On the Distance Between APN Functions
IEEE Transactions on Information Theory
2020-09-29Paper
Constructing APN Functions Through Isotopic Shifts
IEEE Transactions on Information Theory
2020-09-29Paper
Boolean functions for homomorphic-friendly stream ciphers
Algebra, Codes and Cryptology
2020-06-29Paper
Improved filter permutators for efficient FHE: better instances and implementations2020-05-12Paper
Boolean functions for cryptography and coding theory2020-02-04Paper
On the Derivative Imbalance and Ambiguity of Functions
IEEE Transactions on Information Theory
2020-01-28Paper
Some (almost) optimally extendable linear codes
Designs, Codes and Cryptography
2019-11-07Paper
Linear codes with small hulls in semi-primitive case
Designs, Codes and Cryptography
2019-11-07Paper
Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)
Designs, Codes and Cryptography
2019-06-06Paper
On $\sigma$ -LCD Codes
IEEE Transactions on Information Theory
2019-03-28Paper
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
Designs, Codes and Cryptography
2019-02-20Paper
Construction of some codes suitable for both side channel and fault injection attacks2019-02-15Paper
New Characterization and Parametrization of LCD Codes
IEEE Transactions on Information Theory
2019-01-18Paper
Euclidean and Hermitian LCD MDS codes
Designs, Codes and Cryptography
2018-10-10Paper
On Linear Complementary Pairs of Codes
IEEE Transactions on Information Theory
2018-09-19Paper
Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform
IEEE Transactions on Information Theory
2018-09-19Paper
On Upper Bounds for Algebraic Degrees of APN Functions
IEEE Transactions on Information Theory
2018-09-14Paper
On the nonlinearity of monotone Boolean functions
Cryptography and Communications
2018-08-28Paper
Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets
Finite Fields and their Applications
2018-08-08Paper
scientific article; zbMATH DE number 6900649 (Why is no real title available?)2018-07-09Paper
scientific article; zbMATH DE number 6900653 (Why is no real title available?)2018-07-09Paper
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
IEEE Transactions on Information Theory
2018-06-27Paper
Statistical properties of side-channel and fault injection attacks using coding theory
Cryptography and Communications
2018-05-28Paper
A new concatenated type construction for LCD codes and isometry codes
Discrete Mathematics
2018-01-19Paper
Three basic questions on Boolean functions
Advances in Mathematics of Communications
2018-01-15Paper
Construction of Highly Nonlinear 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity
IEEE Transactions on Information Theory
2017-11-10Paper
Binary linear codes from vectorial Boolean functions and their weight distribution
Discrete Mathematics
2017-09-18Paper
On Semibent Boolean Functions
IEEE Transactions on Information Theory
2017-07-12Paper
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions
IEEE Transactions on Information Theory
2017-07-12Paper
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks
IEEE Transactions on Information Theory
2017-07-12Paper
Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials
IEEE Transactions on Information Theory
2017-07-12Paper
A New Class of Codes for Boolean Masking of Cryptographic Computations
IEEE Transactions on Information Theory
2017-06-08Paper
Further Results on Niho Bent Functions
IEEE Transactions on Information Theory
2017-06-08Paper
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
IEEE Transactions on Information Theory
2017-06-08Paper
Explicit characterizations for plateaued-Ness of \(p\)-ary (vectorial) functions
Codes, Cryptology and Information Security
2017-06-01Paper
Higher-Order CIS Codes
IEEE Transactions on Information Theory
2017-05-16Paper
Univariate Niho Bent Functions From o-Polynomials
IEEE Transactions on Information Theory
2017-04-28Paper
Boolean and vectorial plateaued functions and APN functions
IEEE Transactions on Information Theory
2017-04-28Paper
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions
Information Sciences
2017-02-07Paper
New secondary constructions of bent functions
Applicable Algebra in Engineering, Communication and Computing
2017-01-13Paper
Towards stream ciphers for efficient FHE with low-noise ciphertexts
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Polynomial evaluation and side channel analysis
The New Codebreakers
2016-05-02Paper
Cryptographic properties of monotone Boolean functions
Journal of Mathematical Cryptology
2016-04-18Paper
Complementary dual codes for counter-measures to side-channel attacks
Advances in Mathematics of Communications
2016-03-11Paper
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs
Designs, Codes and Cryptography
2016-03-09Paper
Four decades of research on bent functions
Designs, Codes and Cryptography
2016-02-02Paper
Complementary dual codes for counter-measures to side-channel attacks
Coding Theory and Applications
2016-01-07Paper
Algebraic decomposition for probing security
Lecture Notes in Computer Science
2015-12-10Paper
New construction of differentially 4-uniform bijections
Information Security and Cryptology
2015-12-02Paper
A new construction of differentially 4-uniform \((n,n-1)\)-functions
Advances in Mathematics of Communications
2015-11-25Paper
Open questions on nonlinearity and on APN functions
Arithmetic of Finite Fields
2015-10-01Paper
On o-equivalence of Niho bent functions
Arithmetic of Finite Fields
2015-10-01Paper
Differentially 4-uniform bijections by permuting the inverse function
Designs, Codes and Cryptography
2015-09-30Paper
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
Designs, Codes and Cryptography
2015-09-29Paper
On the properties of vectorial functions with plateaued components and their consequences on APN functions
Lecture Notes in Computer Science
2015-09-21Paper
Results on constructions of rotation symmetric bent and semi-bent functions
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Enhanced Boolean functions suitable for the filter model of pseudo-random generator
Designs, Codes and Cryptography
2015-09-01Paper
Open problems on binary bent functions
Open Problems in Mathematics and Computational Science
2015-06-22Paper
A class of 1-resilient Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks
International Journal of Foundations of Computer Science
2015-01-21Paper
Leakage squeezing: optimal implementation and security evaluation
Journal of Mathematical Cryptology
2014-09-17Paper
Correlation-immune Boolean functions for leakage squeezing and rotating S-box masking against side channel attacks
Security, Privacy, and Applied Cryptography Engineering
2014-09-15Paper
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions
Journal of Combinatorial Theory. Series A
2014-09-08Paper
Cryptographic properties of the hidden weighted bit function
Discrete Applied Mathematics
2014-08-22Paper
Leakage squeezing of order two
Lecture Notes in Computer Science
2014-08-20Paper
On the arithmetic Walsh coefficients of Boolean functions
Designs, Codes and Cryptography
2014-08-18Paper
A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers
Vietnam Journal of Mathematics
2014-08-01Paper
On the second-order nonlinearities of some bent functions
Information Sciences
2014-08-01Paper
More constructions of APN and differentially 4-uniform functions by concatenation
Science China. Mathematics
2014-03-05Paper
Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions
Advances in Mathematics of Communications
2013-05-06Paper
Higher-order masking schemes for S-boxes
Fast Software Encryption
2013-01-08Paper
Secondary constructions of bent functions and their enforcement
Advances in Mathematics of Communications
2012-11-12Paper
Bent functions on a Galois ring and systematic authentication codes
Advances in Mathematics of Communications
2012-08-14Paper
Optimal First-Order Masking with Linear and Non-linear Bijections
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On Dillon's class \(H\) of bent functions, Niho bent functions and o-polynomials
Journal of Combinatorial Theory. Series A
2011-10-21Paper
More vectorial Boolean functions with unbounded nonlinearity profile
International Journal of Foundations of Computer Science
2011-10-10Paper
Recent results on binary bent functions2011-08-19Paper
On known and new differentially uniform functions
Information Security and Privacy
2011-07-07Paper
Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
Designs, Codes and Cryptography
2011-04-08Paper
CCZ-equivalence of bent vectorial functions and related constructions
Designs, Codes and Cryptography
2011-04-08Paper
scientific article; zbMATH DE number 5862915 (Why is no real title available?)2011-03-09Paper
Vectorial Boolean functions for cryptography2011-03-09Paper
Self-dual bent functions
International Journal of Information and Coding Theory
2011-02-04Paper
On the construction of bent vectorial functions
International Journal of Information and Coding Theory
2011-02-04Paper
CCZ-equivalence of single and multi output Boolean functions2011-01-03Paper
On plateaued functions and their constructions.
Lecture Notes in Computer Science
2010-01-05Paper
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
2009-10-14Paper
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity
Lecture Notes in Computer Science
2009-07-23Paper
Constructing new APN functions from known ones
Finite Fields and their Applications
2009-04-08Paper
A Method of Construction of Balanced Functions with Optimum Algebraic Immunity
Coding and Cryptology
2009-03-09Paper
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
IEEE Transactions on Information Theory
2009-02-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions
IEEE Transactions on Information Theory
2009-02-24Paper
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
IEEE Transactions on Information Theory
2009-02-24Paper
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Linear Codes From Perfect Nonlinear Mappings and Their Secret Sharing Schemes
IEEE Transactions on Information Theory
2008-12-21Paper
On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
IEEE Transactions on Information Theory
2008-12-21Paper
The weight distribution of a class of linear codes from perfect nonlinear functions
IEEE Transactions on Information Theory
2008-12-21Paper
Improving the Upper Bounds on the Covering Radii of Binary Reed–Muller Codes
IEEE Transactions on Information Theory
2008-12-21Paper
New classes of almost bent and almost perfect nonlinear polynomials
IEEE Transactions on Information Theory
2008-12-21Paper
Normal Extensions of Bent Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Cubic Boolean Functions With Highest Resiliency
IEEE Transactions on Information Theory
2008-12-21Paper
Partial covering sequences: a method for designing classes of cryptographic functions
Algebraic Geometry and Its Applications
2008-12-10Paper
On Immunity Profile of Boolean Functions
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Generalized Correlation Analysis of Vectorial Boolean Functions
Fast Software Encryption
2008-09-16Paper
On a improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity
Advances in Mathematics of Communications
2008-08-12Paper
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
On the Higher Order Nonlinearities of Algebraic Immune Functions
Lecture Notes in Computer Science
2007-09-04Paper
Nonlinearities of S-boxes
Finite Fields and their Applications
2007-02-14Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Authentication schemes from highly nonlinear functions
Designs, Codes and Cryptography
2006-11-22Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Piecewise constructions of bent and almost optimal Boolean functions
Designs, Codes and Cryptography
2006-05-29Paper
Hyper-bent functions and cyclic codes
Journal of Combinatorial Theory. Series A
2006-04-28Paper
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions2006-03-01Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Concatenating indicators of flats for designing cryptographic functions
Designs, Codes and Cryptography
2005-08-18Paper
scientific article; zbMATH DE number 2127861 (Why is no real title available?)2005-01-14Paper
scientific article; zbMATH DE number 2124963 (Why is no real title available?)2005-01-04Paper
Highly nonlinear mappings
Journal of Complexity
2004-08-06Paper
On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
Journal of Complexity
2004-08-06Paper
scientific article; zbMATH DE number 1972836 (Why is no real title available?)2004-02-08Paper
scientific article; zbMATH DE number 1866861 (Why is no real title available?)2003-10-12Paper
An Upper Bound on the Number of m-Resilient Boolean Functions
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942443 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1594286 (Why is no real title available?)2003-05-11Paper
On cryptographic propagation criteria for Boolean functions
Information and Computation
2003-01-14Paper
On cryptographic properties of the cosets of R(1, m)
IEEE Transactions on Information Theory
2002-08-04Paper
Spectral domain analysis of correlation immune and resilient Boolean functions
Finite Fields and their Applications
2002-07-04Paper
On the divisibility properties and nonlinearity of resilient functions
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
2002-06-13Paper
scientific article; zbMATH DE number 1504655 (Why is no real title available?)2002-02-21Paper
Bent, resilient functions and the numerical normal form2001-06-17Paper
An alternate characterization of the bentness of binary functions, with uniqueness
Designs, Codes and Cryptography
2001-03-18Paper
Codes, bent functions and permutations suitable for DES-like cryptosystems
Designs, Codes and Cryptography
2000-06-22Paper
scientific article; zbMATH DE number 1461530 (Why is no real title available?)2000-06-20Paper
scientific article; zbMATH DE number 1426186 (Why is no real title available?)2000-03-30Paper
Two New Classes of Bent Functions
Advances in Cryptology — EUROCRYPT ’93
2000-02-01Paper
scientific article; zbMATH DE number 1188992 (Why is no real title available?)1999-11-21Paper
Z/sub 2/k-linear codes
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1222358 (Why is no real title available?)1999-09-21Paper
scientific article; zbMATH DE number 1303142 (Why is no real title available?)1999-06-17Paper
Sur le critère de propagation de degré ℓ et d'ordre k
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
1998-01-01Paper
Codes Z2k-linéaires
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
1997-11-17Paper
A characterization of binary bent functions
Journal of Combinatorial Theory. Series A
1996-12-16Paper
scientific article; zbMATH DE number 953210 (Why is no real title available?)1996-12-01Paper
scientific article; zbMATH DE number 841853 (Why is no real title available?)1996-07-02Paper
Generalized partial spreads
IEEE Transactions on Information Theory
1996-02-20Paper
On Z/sub 4/-duality
IEEE Transactions on Information Theory
1996-01-07Paper
Comments on "Generating and counting binary Bent sequences"
IEEE Transactions on Information Theory
1995-12-17Paper
scientific article; zbMATH DE number 708811 (Why is no real title available?)1995-08-13Paper
scientific article; zbMATH DE number 622514 (Why is no real title available?)1994-08-21Paper
The Divisors of $x^{2m} + x$ of Constant Derivatives and Degree $2^{m - 2}$
SIAM Journal on Discrete Mathematics
1994-07-13Paper
scientific article; zbMATH DE number 493087 (Why is no real title available?)1994-01-27Paper
A general case of formal duality between binary nonlinear codes
Discrete Mathematics
1993-12-20Paper
Partially-bent functions
Designs, Codes and Cryptography
1993-10-14Paper
The automorphism groups of the Delsarte-Goethals codes
Designs, Codes and Cryptography
1993-08-29Paper
scientific article; zbMATH DE number 176542 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 97780 (Why is no real title available?)1993-01-17Paper
The Automorphism Groups of the Kerdock Codes
Journal of Information and Optimization Sciences
1992-09-27Paper
scientific article; zbMATH DE number 4114556 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 4121937 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 3977628 (Why is no real title available?)1985-01-01Paper


Research outcomes over time


This page was built for person: Claude Carlet