| Publication | Date of Publication | Type |
|---|
More on the sum-freedom of the multiplicative inverse function Designs, Codes and Cryptography | 2025-12-01 | Paper |
The stability of the algebraic degree of Boolean functions when restricted to affine spaces Designs, Codes and Cryptography | 2025-12-01 | Paper |
On cubic-like bent Boolean functions Journal of Algebraic Combinatorics | 2025-07-25 | Paper |
Use of simple arithmetic operations to construct efficiently implementable Boolean functions possessing high nonlinearity and good resistance to algebraic attacks Discrete Applied Mathematics | 2025-06-30 | Paper |
On the vector subspaces of \(\mathbb{F}_{2^n}\) over which the multiplicative inverse function sums to zero Designs, Codes and Cryptography | 2025-04-22 | Paper |
| On the Walsh and Fourier-Hadamard supports of Boolean functions from a quantum viewpoint | 2025-04-15 | Paper |
Coset leaders of the first-order Reed-Muller codes in four new classes of Boolean functions Advances in Mathematics of Communications | 2025-03-27 | Paper |
Two generalizations of almost perfect nonlinearity Journal of Cryptology | 2025-03-26 | Paper |
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property Advances in Mathematics of Communications | 2025-02-19 | Paper |
| On the supports of the Walsh transforms of Boolean functions | 2024-09-18 | Paper |
| On the construction of balanced Boolean functions with a good algebraic immunity | 2024-09-18 | Paper |
| Self dual bent functions | 2024-09-18 | Paper |
Correction to: ``On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property'' Advances in Mathematics of Communications | 2024-09-16 | Paper |
| Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and threshold functions | 2024-08-30 | Paper |
The weight spectrum of the Reed-Muller codes \(RM(m-5,m)\) IEEE Transactions on Information Theory | 2024-07-23 | Paper |
An optimal universal construction for the threshold implementation of bijective S-boxes IEEE Transactions on Information Theory | 2024-07-19 | Paper |
Parameterization of Boolean functions by vectorial functions and associated constructions Advances in Mathematics of Communications | 2024-06-17 | Paper |
On the APN-ness and differential uniformity of some classes of \((n,n)\)-functions over \(\mathbb{F}_2^n\) Advances in Mathematics of Communications | 2024-06-01 | Paper |
On those Boolean functions that are coset leaders of first order Reed-Muller codes Annals of Mathematics and Artificial Intelligence | 2024-02-09 | Paper |
Evolutionary strategies for the design of binary linear codes Evolutionary Computation in Combinatorial Optimization | 2024-01-12 | Paper |
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Advances in Mathematics of Communications | 2023-09-12 | Paper |
On APN functions whose graphs are maximal Sidon sets LATIN 2022: Theoretical Informatics | 2023-07-26 | Paper |
The weight spectrum of two families of Reed-Muller codes Discrete Mathematics | 2023-07-19 | Paper |
Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators Advances in Mathematics of Communications | 2023-07-07 | Paper |
Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields Advances in Mathematics of Communications | 2023-07-07 | Paper |
Revisiting some results on APN and algebraic immune functions Advances in Mathematics of Communications | 2023-06-30 | Paper |
Gold functions and switched cube functions are not 0-extendable in dimension \(n > 5\) Designs, Codes and Cryptography | 2023-04-21 | Paper |
Simplicity conditions for binary orthogonal arrays Designs, Codes and Cryptography | 2023-01-18 | Paper |
On the Sixth International Olympiad in Cryptography NSUCRYPTO Diskretnyi analiz i issledovanie operatsii | 2022-07-15 | Paper |
On the Sixth International Olympiad in Cryptography NSUCRYPTO Diskretnyi analiz i issledovanie operatsii | 2022-07-15 | Paper |
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions IEEE Transactions on Information Theory | 2022-07-13 | Paper |
On Two Fundamental Problems on APN Power Functions IEEE Transactions on Information Theory | 2022-07-13 | Paper |
| Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience | 2022-07-01 | Paper |
| On balanced sets of binary vectors | 2022-05-18 | Paper |
A further study of quadratic APN permutations in dimension nine Finite Fields and their Applications | 2022-05-09 | Paper |
Simplicity conditions for binary orthogonal arrays (available as arXiv preprint) | 2022-04-02 | Paper |
On those multiplicative subgroups of \({\mathbb F}_{2^n}^\ast\) which are Sidon sets and/or sum-free sets Journal of Algebraic Combinatorics | 2022-03-15 | Paper |
On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences IEEE Transactions on Information Theory | 2022-02-17 | Paper |
A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions IEEE Transactions on Information Theory | 2022-02-17 | Paper |
On known constructions of APN and AB functions and their relation to each other Sv. 25(2021)=knj. 60 | 2022-02-07 | Paper |
Gold Functions and Switched Cube Functions Are Not 0-Extendable in Dimension $n > 5$ (available as arXiv preprint) | 2022-01-25 | Paper |
Relation between o-equivalence and EA-equivalence for Niho bent functions Finite Fields and their Applications | 2021-04-08 | Paper |
A direct proof of APN-ness of the Kasami functions Designs, Codes and Cryptography | 2021-03-17 | Paper |
| On group rings and some of their applications to combinatorics and symmetric cryptography | 2021-03-10 | Paper |
Generalized isotopic shift construction for APN functions Designs, Codes and Cryptography | 2021-01-25 | Paper |
Handling Vectorial Functions by Means of Their Graph Indicators IEEE Transactions on Information Theory | 2020-12-04 | Paper |
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions IEEE Transactions on Information Theory | 2020-12-04 | Paper |
Three parameters of Boolean functions related to their constancy on affine spaces Advances in Mathematics of Communications | 2020-11-07 | Paper |
On the Distance Between APN Functions IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Constructing APN Functions Through Isotopic Shifts IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Boolean functions for homomorphic-friendly stream ciphers Algebra, Codes and Cryptology | 2020-06-29 | Paper |
| Improved filter permutators for efficient FHE: better instances and implementations | 2020-05-12 | Paper |
| Boolean functions for cryptography and coding theory | 2020-02-04 | Paper |
On the Derivative Imbalance and Ambiguity of Functions IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Some (almost) optimally extendable linear codes Designs, Codes and Cryptography | 2019-11-07 | Paper |
Linear codes with small hulls in semi-primitive case Designs, Codes and Cryptography | 2019-11-07 | Paper |
Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) Designs, Codes and Cryptography | 2019-06-06 | Paper |
On $\sigma$ -LCD Codes IEEE Transactions on Information Theory | 2019-03-28 | Paper |
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures Designs, Codes and Cryptography | 2019-02-20 | Paper |
| Construction of some codes suitable for both side channel and fault injection attacks | 2019-02-15 | Paper |
New Characterization and Parametrization of LCD Codes IEEE Transactions on Information Theory | 2019-01-18 | Paper |
Euclidean and Hermitian LCD MDS codes Designs, Codes and Cryptography | 2018-10-10 | Paper |
On Linear Complementary Pairs of Codes IEEE Transactions on Information Theory | 2018-09-19 | Paper |
Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform IEEE Transactions on Information Theory | 2018-09-19 | Paper |
On Upper Bounds for Algebraic Degrees of APN Functions IEEE Transactions on Information Theory | 2018-09-14 | Paper |
On the nonlinearity of monotone Boolean functions Cryptography and Communications | 2018-08-28 | Paper |
Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets Finite Fields and their Applications | 2018-08-08 | Paper |
| scientific article; zbMATH DE number 6900649 (Why is no real title available?) | 2018-07-09 | Paper |
| scientific article; zbMATH DE number 6900653 (Why is no real title available?) | 2018-07-09 | Paper |
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Statistical properties of side-channel and fault injection attacks using coding theory Cryptography and Communications | 2018-05-28 | Paper |
A new concatenated type construction for LCD codes and isometry codes Discrete Mathematics | 2018-01-19 | Paper |
Three basic questions on Boolean functions Advances in Mathematics of Communications | 2018-01-15 | Paper |
Construction of Highly Nonlinear 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity IEEE Transactions on Information Theory | 2017-11-10 | Paper |
Binary linear codes from vectorial Boolean functions and their weight distribution Discrete Mathematics | 2017-09-18 | Paper |
On Semibent Boolean Functions IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions IEEE Transactions on Information Theory | 2017-07-12 | Paper |
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials IEEE Transactions on Information Theory | 2017-07-12 | Paper |
A New Class of Codes for Boolean Masking of Cryptographic Computations IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Further Results on Niho Bent Functions IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Explicit characterizations for plateaued-Ness of \(p\)-ary (vectorial) functions Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Higher-Order CIS Codes IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Univariate Niho Bent Functions From o-Polynomials IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Boolean and vectorial plateaued functions and APN functions IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions Information Sciences | 2017-02-07 | Paper |
New secondary constructions of bent functions Applicable Algebra in Engineering, Communication and Computing | 2017-01-13 | Paper |
Towards stream ciphers for efficient FHE with low-noise ciphertexts Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Polynomial evaluation and side channel analysis The New Codebreakers | 2016-05-02 | Paper |
Cryptographic properties of monotone Boolean functions Journal of Mathematical Cryptology | 2016-04-18 | Paper |
Complementary dual codes for counter-measures to side-channel attacks Advances in Mathematics of Communications | 2016-03-11 | Paper |
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography | 2016-03-09 | Paper |
Four decades of research on bent functions Designs, Codes and Cryptography | 2016-02-02 | Paper |
Complementary dual codes for counter-measures to side-channel attacks Coding Theory and Applications | 2016-01-07 | Paper |
Algebraic decomposition for probing security Lecture Notes in Computer Science | 2015-12-10 | Paper |
New construction of differentially 4-uniform bijections Information Security and Cryptology | 2015-12-02 | Paper |
A new construction of differentially 4-uniform \((n,n-1)\)-functions Advances in Mathematics of Communications | 2015-11-25 | Paper |
Open questions on nonlinearity and on APN functions Arithmetic of Finite Fields | 2015-10-01 | Paper |
On o-equivalence of Niho bent functions Arithmetic of Finite Fields | 2015-10-01 | Paper |
Differentially 4-uniform bijections by permuting the inverse function Designs, Codes and Cryptography | 2015-09-30 | Paper |
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks Designs, Codes and Cryptography | 2015-09-29 | Paper |
On the properties of vectorial functions with plateaued components and their consequences on APN functions Lecture Notes in Computer Science | 2015-09-21 | Paper |
Results on constructions of rotation symmetric bent and semi-bent functions Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
Enhanced Boolean functions suitable for the filter model of pseudo-random generator Designs, Codes and Cryptography | 2015-09-01 | Paper |
Open problems on binary bent functions Open Problems in Mathematics and Computational Science | 2015-06-22 | Paper |
A class of 1-resilient Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks International Journal of Foundations of Computer Science | 2015-01-21 | Paper |
Leakage squeezing: optimal implementation and security evaluation Journal of Mathematical Cryptology | 2014-09-17 | Paper |
Correlation-immune Boolean functions for leakage squeezing and rotating S-box masking against side channel attacks Security, Privacy, and Applied Cryptography Engineering | 2014-09-15 | Paper |
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions Journal of Combinatorial Theory. Series A | 2014-09-08 | Paper |
Cryptographic properties of the hidden weighted bit function Discrete Applied Mathematics | 2014-08-22 | Paper |
Leakage squeezing of order two Lecture Notes in Computer Science | 2014-08-20 | Paper |
On the arithmetic Walsh coefficients of Boolean functions Designs, Codes and Cryptography | 2014-08-18 | Paper |
A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers Vietnam Journal of Mathematics | 2014-08-01 | Paper |
On the second-order nonlinearities of some bent functions Information Sciences | 2014-08-01 | Paper |
More constructions of APN and differentially 4-uniform functions by concatenation Science China. Mathematics | 2014-03-05 | Paper |
Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions Advances in Mathematics of Communications | 2013-05-06 | Paper |
Higher-order masking schemes for S-boxes Fast Software Encryption | 2013-01-08 | Paper |
Secondary constructions of bent functions and their enforcement Advances in Mathematics of Communications | 2012-11-12 | Paper |
Bent functions on a Galois ring and systematic authentication codes Advances in Mathematics of Communications | 2012-08-14 | Paper |
Optimal First-Order Masking with Linear and Non-linear Bijections Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On Dillon's class \(H\) of bent functions, Niho bent functions and o-polynomials Journal of Combinatorial Theory. Series A | 2011-10-21 | Paper |
More vectorial Boolean functions with unbounded nonlinearity profile International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
| Recent results on binary bent functions | 2011-08-19 | Paper |
On known and new differentially uniform functions Information Security and Privacy | 2011-07-07 | Paper |
Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions Designs, Codes and Cryptography | 2011-04-08 | Paper |
CCZ-equivalence of bent vectorial functions and related constructions Designs, Codes and Cryptography | 2011-04-08 | Paper |
| scientific article; zbMATH DE number 5862915 (Why is no real title available?) | 2011-03-09 | Paper |
| Vectorial Boolean functions for cryptography | 2011-03-09 | Paper |
Self-dual bent functions International Journal of Information and Coding Theory | 2011-02-04 | Paper |
On the construction of bent vectorial functions International Journal of Information and Coding Theory | 2011-02-04 | Paper |
| CCZ-equivalence of single and multi output Boolean functions | 2011-01-03 | Paper |
On plateaued functions and their constructions. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Further properties of several classes of Boolean functions with optimum algebraic immunity Designs, Codes and Cryptography | 2009-10-14 | Paper |
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity Lecture Notes in Computer Science | 2009-07-23 | Paper |
Constructing new APN functions from known ones Finite Fields and their Applications | 2009-04-08 | Paper |
A Method of Construction of Balanced Functions with Optimum Algebraic Immunity Coding and Cryptology | 2009-03-09 | Paper |
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications IEEE Transactions on Information Theory | 2009-02-24 | Paper |
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations Sequences and Their Applications - SETA 2008 | 2009-02-10 | Paper |
Linear Codes From Perfect Nonlinear Mappings and Their Secret Sharing Schemes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The weight distribution of a class of linear codes from perfect nonlinear functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Improving the Upper Bounds on the Covering Radii of Binary Reed–Muller Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
New classes of almost bent and almost perfect nonlinear polynomials IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Normal Extensions of Bent Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Cubic Boolean Functions With Highest Resiliency IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Partial covering sequences: a method for designing classes of cryptographic functions Algebraic Geometry and Its Applications | 2008-12-10 | Paper |
On Immunity Profile of Boolean Functions Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Generalized Correlation Analysis of Vectorial Boolean Functions Fast Software Encryption | 2008-09-16 | Paper |
On a improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity Advances in Mathematics of Communications | 2008-08-12 | Paper |
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
On the Higher Order Nonlinearities of Algebraic Immune Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |
Nonlinearities of S-boxes Finite Fields and their Applications | 2007-02-14 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Authentication schemes from highly nonlinear functions Designs, Codes and Cryptography | 2006-11-22 | Paper |
Construction of bent functions via Niho power functions Journal of Combinatorial Theory. Series A | 2006-08-04 | Paper |
Piecewise constructions of bent and almost optimal Boolean functions Designs, Codes and Cryptography | 2006-05-29 | Paper |
Hyper-bent functions and cyclic codes Journal of Combinatorial Theory. Series A | 2006-04-28 | Paper |
| Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions | 2006-03-01 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Concatenating indicators of flats for designing cryptographic functions Designs, Codes and Cryptography | 2005-08-18 | Paper |
| scientific article; zbMATH DE number 2127861 (Why is no real title available?) | 2005-01-14 | Paper |
| scientific article; zbMATH DE number 2124963 (Why is no real title available?) | 2005-01-04 | Paper |
Highly nonlinear mappings Journal of Complexity | 2004-08-06 | Paper |
On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions Journal of Complexity | 2004-08-06 | Paper |
| scientific article; zbMATH DE number 1972836 (Why is no real title available?) | 2004-02-08 | Paper |
| scientific article; zbMATH DE number 1866861 (Why is no real title available?) | 2003-10-12 | Paper |
An Upper Bound on the Number of m-Resilient Boolean Functions Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1942443 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1594286 (Why is no real title available?) | 2003-05-11 | Paper |
On cryptographic propagation criteria for Boolean functions Information and Computation | 2003-01-14 | Paper |
On cryptographic properties of the cosets of R(1, m) IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Spectral domain analysis of correlation immune and resilient Boolean functions Finite Fields and their Applications | 2002-07-04 | Paper |
On the divisibility properties and nonlinearity of resilient functions Comptes Rendus de l'Académie des Sciences - Series I - Mathematics | 2002-06-13 | Paper |
| scientific article; zbMATH DE number 1504655 (Why is no real title available?) | 2002-02-21 | Paper |
| Bent, resilient functions and the numerical normal form | 2001-06-17 | Paper |
An alternate characterization of the bentness of binary functions, with uniqueness Designs, Codes and Cryptography | 2001-03-18 | Paper |
Codes, bent functions and permutations suitable for DES-like cryptosystems Designs, Codes and Cryptography | 2000-06-22 | Paper |
| scientific article; zbMATH DE number 1461530 (Why is no real title available?) | 2000-06-20 | Paper |
| scientific article; zbMATH DE number 1426186 (Why is no real title available?) | 2000-03-30 | Paper |
Two New Classes of Bent Functions Advances in Cryptology — EUROCRYPT ’93 | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1188992 (Why is no real title available?) | 1999-11-21 | Paper |
Z/sub 2/k-linear codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
| scientific article; zbMATH DE number 1222358 (Why is no real title available?) | 1999-09-21 | Paper |
| scientific article; zbMATH DE number 1303142 (Why is no real title available?) | 1999-06-17 | Paper |
Sur le critère de propagation de degré ℓ et d'ordre k Comptes Rendus de l'Académie des Sciences - Series I - Mathematics | 1998-01-01 | Paper |
Codes Z2k-linéaires Comptes Rendus de l'Académie des Sciences - Series I - Mathematics | 1997-11-17 | Paper |
A characterization of binary bent functions Journal of Combinatorial Theory. Series A | 1996-12-16 | Paper |
| scientific article; zbMATH DE number 953210 (Why is no real title available?) | 1996-12-01 | Paper |
| scientific article; zbMATH DE number 841853 (Why is no real title available?) | 1996-07-02 | Paper |
Generalized partial spreads IEEE Transactions on Information Theory | 1996-02-20 | Paper |
On Z/sub 4/-duality IEEE Transactions on Information Theory | 1996-01-07 | Paper |
Comments on "Generating and counting binary Bent sequences" IEEE Transactions on Information Theory | 1995-12-17 | Paper |
| scientific article; zbMATH DE number 708811 (Why is no real title available?) | 1995-08-13 | Paper |
| scientific article; zbMATH DE number 622514 (Why is no real title available?) | 1994-08-21 | Paper |
The Divisors of $x^{2m} + x$ of Constant Derivatives and Degree $2^{m - 2}$ SIAM Journal on Discrete Mathematics | 1994-07-13 | Paper |
| scientific article; zbMATH DE number 493087 (Why is no real title available?) | 1994-01-27 | Paper |
A general case of formal duality between binary nonlinear codes Discrete Mathematics | 1993-12-20 | Paper |
Partially-bent functions Designs, Codes and Cryptography | 1993-10-14 | Paper |
The automorphism groups of the Delsarte-Goethals codes Designs, Codes and Cryptography | 1993-08-29 | Paper |
| scientific article; zbMATH DE number 176542 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 97780 (Why is no real title available?) | 1993-01-17 | Paper |
The Automorphism Groups of the Kerdock Codes Journal of Information and Optimization Sciences | 1992-09-27 | Paper |
| scientific article; zbMATH DE number 4114556 (Why is no real title available?) | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 4121937 (Why is no real title available?) | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 3977628 (Why is no real title available?) | 1985-01-01 | Paper |