| Publication | Date of Publication | Type |
|---|
New constructions of balanced Boolean functions with the maximum possible Walsh supports Discrete Applied Mathematics | 2024-06-21 | Paper |
Monomial Boolean functions with large high-order nonlinearities Information and Computation | 2024-03-27 | Paper |
The Covering Radius of the Third-Order Reed-Muller Code RM(3,7) is 20 IEEE Transactions on Information Theory | 2024-03-21 | Paper |
The covering radius of the Reed-Muller code \(\text{RM}(2, 7)\) is \(40\) Discrete Mathematics | 2019-10-17 | Paper |
Transparency order for Boolean functions: analysis and construction Designs, Codes and Cryptography | 2019-09-12 | Paper |
Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights Designs, Codes and Cryptography | 2019-09-12 | Paper |
A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions Designs, Codes and Cryptography | 2019-06-27 | Paper |
New bounds on the covering radius of the second order Reed-Muller code of length 128 Cryptography and Communications | 2019-03-22 | Paper |
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\) Designs, Codes and Cryptography | 2018-01-26 | Paper |
New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\) International Journal of Computer Mathematics | 2017-07-28 | Paper |
Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences Discrete Applied Mathematics | 2016-11-02 | Paper |
On the second-order nonlinearity of the hidden weighted bit function Discrete Applied Mathematics | 2016-10-07 | Paper |
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\) Science China. Mathematics | 2016-07-19 | Paper |
A family of cryptographically significant Boolean functions based on the hidden weighted bit function Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
| Constructions of cryptographically significant Boolean permutations | 2015-09-11 | Paper |
Properties of a family of cryptographic Boolean functions Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
A construction of Boolean functions with good cryptographic properties International Journal of Computer Mathematics | 2015-06-24 | Paper |
Concatenations of the hidden weighted bit function and their cryptographic properties Advances in Mathematics of Communications | 2014-11-28 | Paper |
Cryptographic properties of the hidden weighted bit function Discrete Applied Mathematics | 2014-08-22 | Paper |
A new method to construct Boolean functions with good cryptographic properties Information Processing Letters | 2014-04-11 | Paper |
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity Discrete Applied Mathematics | 2014-03-27 | Paper |
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions Information Processing Letters | 2012-10-23 | Paper |
On equivalence classes of Boolean functions Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities Information Security and Cryptology | 2011-07-29 | Paper |
Counting irreducible polynomials over finite fields Czechoslovak Mathematical Journal | 2011-02-11 | Paper |
Counting irreducible polynomials over finite fields Czechoslovak Mathematical Journal | 2011-02-11 | Paper |
| The prime number theorem and Dirichlet's theorem and irreducible polynomials with the least norm for \(\mathbb F_q[x\)] | 2009-03-06 | Paper |