Sihem MESNAGER

Item

Title
Sihem MESNAGER
Given name
Sihem
familyName
MESNAGER
birthday
1970
Status
MCF
Identifier
scanr:idref070418594
Is Part Of
LAGA
Has Part
MT2I
personal mailbox
sihem.mesnager@univ-paris8.fr
Début de recherche
01/01/2009
Nomenclature HCERES
ST1_2
Appartenance à une école doctorale
ED 224
firstName
Sihem
member
Orange
Start
2020-01-01T00:00:00
End
2023-12-31T00:00:00
Institut Polytechnique de Paris
Start
2015-01-01T00:00:00
End
2022-12-31T00:00:00
Télécom ParisTech
Start
2015-01-01T00:00:00
End
2022-12-31T00:00:00
Laboratoire traitement et communication de l'information
Start
2015-01-01T00:00:00
End
2022-12-31T00:00:00
IMT Atlantique - Bretagne - Pays de la Loire
Start
2015-01-01T00:00:00
End
2022-12-31T00:00:00
Communauté d'universités et établissements Université Sorbonne Paris Cité
Start
2014-01-01T00:00:00
End
2023-12-31T00:00:00
Université Sorbonne Paris Nord
Start
2011-01-01T00:00:00
End
2023-12-31T00:00:00
Paris 8 University Université Paris 8 Vincennes – Saint-Denis
Start
2011-01-01T00:00:00
End
2023-12-31T00:00:00
Centre national de la recherche scientifique French National Centre for Scientific Research
Start
2011-01-01T00:00:00
End
2023-12-31T00:00:00
Laboratoire Analyse, Géométrie et Applications
Start
2010-01-01T00:00:00
End
2023-12-31T00:00:00
Sorbonne Université Sorbonne University
Start
2002-01-01T00:00:00
End
2002-12-31T00:00:00
publications
Bent Functions: Primary Constructions (Part I)
Is Referenced By
doi10.1007/978-3-319-32595-8_5
status
author
On the practical security of white-box cryptography
Is Referenced By
nnt2020pa080013
status
directeurthese
Hybrid fully homomorphic framework
Is Referenced By
nnt2017pslee066
status
membrejury
Secondary constructions of (non)weakly regular plateaued functions over finite fields
Is Referenced By
doi10.3906/mat-2104-5
status
author
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications
Is Referenced By
doi10.1007/s12095-021-00486-y
status
author
On the Diffusion Property of Iterated Functions
Is Referenced By
doi10.1007/978-3-319-27239-9_15
status
author
Linear codes from vectorial Boolean functions in the context of algebraic attacks
Is Referenced By
doi10.1142/s1793830921500324
status
author
On Plateaued Functions, Linear Structures and Permutation Polynomials
Is Referenced By
doi10.1007/978-3-030-16458-4_13
status
author
A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes
Is Referenced By
doi10.1109/tit.2021.3102314
status
author
On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes
Is Referenced By
doi10.1109/tit.2021.3076878
status
author
Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
Is Referenced By
doi10.1007/s00009-021-01841-2
status
author
Investigations on <i>c</i>-(Almost) Perfect Nonlinear Functions
Is Referenced By
doi10.1109/tit.2021.3081348
status
author
Results on Characterizations of Plateaued Functions in Arbitrary Characteristic
Is Referenced By
doi10.1007/978-3-319-29172-7_2
status
author
Masquage booléen résistant aux attaques par fautes et white-boxabilité de primitives cryptographiques légères
Is Referenced By
nnt2023urens019
status
membrejury
A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances
Is Referenced By
doi10.1007/978-3-030-90553-8_4
status
author
Optimal quaternary $$(r,\delta )$$-locally recoverable codes: their structures and complete classification
Is Referenced By
doi10.1007/s10623-022-01165-6
status
author
Regular graphs from weakly regular plateaued functions
Is Referenced By
halhal-03023517
status
author
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture
Is Referenced By
doi10.1007/s13389-022-00308-8
status
author
Several classes of new weakly regular bent functions outside $$\mathcal{R}\mathcal{F}$$, their duals and some related (minimal) codes with few weights
Is Referenced By
doi10.1007/s10623-023-01198-5
status
author
Evaluation of weil sums for some polynomials and associated quadratic forms
Is Referenced By
doi10.1007/s12095-023-00628-4
status
author
An efficient characterization of a family of hyperbent functions with multiple trace terms
Is Referenced By
halhal-00642289
status
author
The Value $4$ of Binary Kloosterman Sums
Is Referenced By
halhal-00642290
status
author
Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain
Is Referenced By
doi10.3390/math8122218
status
author
Linear codes with one-dimensional hull associated with Gaussian sums
Is Referenced By
doi10.1007/s12095-020-00462-y
status
author
Several classes of linear codes with few weights over finite fields
Is Referenced By
doi10.1016/j.ffa.2023.102304
status
author
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences
Is Referenced By
doi10.1109/tit.2022.3140180
status
author
Corrigendum to “Solving <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.svg"><mml:msup><mml:mrow><mml:mi>X</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">=</mml:mo><mml:mi>b</mml:mi></mml:math> in <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si2.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>4</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math> and an alternative proof of a conjecture on the differential spectrum of the related monomial functions” [Finite Fields Appl. 83 (2022) 102086]
Is Referenced By
doi10.1016/j.ffa.2022.102148
status
author
A constant round quantum secure protocol for oblivious polynomial evaluation
Is Referenced By
doi10.1016/j.jisa.2023.103560
status
author
Two families of few-weight codes over a finite chain ring
Is Referenced By
doi10.1016/j.disc.2023.113464
status
author
Solving some affine equations over finite fields
Is Referenced By
doi10.1016/j.ffa.2020.101746
status
author
On a class of permutation rational functions involving trace maps
Is Referenced By
doi10.1007/s10623-023-01345-y
status
author
Further projective binary linear codes derived from two-to-one functions and their duals
Is Referenced By
doi10.1007/s10623-022-01122-3
status
author
Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks
Is Referenced By
doi10.1007/s10623-023-01328-z
status
author
On constructions of weightwise perfectly balanced Boolean functions
Is Referenced By
doi10.1007/s12095-021-00481-3
status
author
Secret sharing schemes based on the dual of Golay codes
Is Referenced By
doi10.1007/s12095-021-00531-w
status
author
On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2
Is Referenced By
doi10.1109/tit.2021.3109946
status
author
Completely characterizing a class of permutation quadrinomials
Is Referenced By
doi10.1016/j.ffa.2022.102155
status
author
Contributions à l'étude effective de morphismes de schémas affines
Is Referenced By
nnt2002pa066172
status
author
Constructions of Z-optimal Type-II quadriphase Z-complementary pairs
Is Referenced By
doi10.1016/j.disc.2021.112685
status
author
Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code <i>RM(n-3,n)</i>
Is Referenced By
doi10.1109/tit.2021.3128495
status
author
Solving X+1 + X + a = 0 over finite fields
Is Referenced By
doi10.1016/j.ffa.2020.101797
status
author
Secret Sharing Schemes with General Access Structures
Is Referenced By
doi10.1007/978-3-319-38898-4_20
status
author
Design of New Finite State Dynamical Systems Admitting a Matrix Representation : Application to Cryptography
Is Referenced By
nnt2023lorr0069
status
membrejury
New constructions of constant dimension subspace codes with large sizes
Is Referenced By
doi10.1007/s10623-023-01350-1
status
author
Variations on Minimal Linear Codes
Is Referenced By
doi10.1007/978-3-319-17296-5_12
status
author
Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates
Is Referenced By
doi10.1109/gscit.2014.6970111
status
author
Linear Codes Over $\mathbb F_q$ Are Equivalent to LCD Codes for $q&gt;3$
Is Referenced By
doi10.1109/tit.2018.2789347
status
author
Implémentation efficace de primitive cryptographique pour le couplage sur carte FPGA
Is Referenced By
nnt2017pa080112
status
directeurthese
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
Is Referenced By
doi10.1007/s12095-018-0286-5
status
author
Linear codes from functions
Is Referenced By
halhal-03960624
status
author
A direct proof of APN-ness of the Kasami functions
Is Referenced By
doi10.1007/s10623-020-00830-y
status
author
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes
Is Referenced By
doi10.1007/978-3-031-30229-9_16
status
author
Correction to: Good polynomials for optimal LRC of low locality
Is Referenced By
doi10.1007/s10623-021-00909-0
status
author
Bent Vectorial Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_12
status
author
Minimal linear codes derived from weakly regular bent and plateaued functions
Is Referenced By
doi10.1142/s021949882550077x
status
author
The structure of abelian number fields with Dirichlet characters
Is Referenced By
doi10.1142/s0219498824501500
status
author
Notice of Removal: On the Inverses and Their Hamming Weights of Known APN, 4-Differentially Uniform and CPP Exponents Over F₂ⁿ
Is Referenced By
doi10.1109/tit.2022.3231824
status
author
The Complete Differential Spectrum of a Class of Power Permutations Over Odd Characteristic Finite Fields
Is Referenced By
doi10.1109/tit.2023.3293842
status
author
Subfield Codes of Several Few-Weight Linear Codes Parameterized by Functions and Their Consequences
Is Referenced By
doi10.1109/tit.2023.3328932
status
author
On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum
Is Referenced By
doi10.1109/tit.2022.3232362
status
author
New Binary Cross Z-Complementary Pairs With Large CZC Ratio
Is Referenced By
doi10.1109/tit.2022.3214532
status
author
Constructions of Spectrally Null Constrained Complete Complementary Codes via the Graph of Extended Boolean Functions
Is Referenced By
doi10.1109/tit.2023.3280210
status
author
Several Families of Binary Minimal Linear Codes From Two-to-One Functions
Is Referenced By
doi10.1109/tit.2023.3236955
status
author
Parameters of Squares of Primitive Narrow-Sense BCH Codes and Their Complements
Is Referenced By
doi10.1109/tit.2023.3255899
status
author
More About the Corpus of Involutions From Two-to-One Mappings and Related Cryptographic S-Boxes
Is Referenced By
doi10.1109/tit.2022.3211329
status
author
Boomerang uniformity of power permutations and algebraic curves over 𝔽<sub>2</sub> <i> <sup>n</sup> </i>
Is Referenced By
doi10.1515/advgeom-2022-0026
status
author
Solving <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.svg"><mml:msup><mml:mrow><mml:mi>X</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">=</mml:mo><mml:mi>b</mml:mi></mml:math> in <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si2.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>4</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math> and an alternative proof of a conjecture on the differential spectrum of the related monomial functions
Is Referenced By
doi10.1016/j.ffa.2022.102086
status
author
Class $$\mathcal{H}$$ , Niho Bent Functions and o-Polynomials
Is Referenced By
doi10.1007/978-3-319-32595-8_8
status
author
Scalar complexity of Chudnovsky-type algorithms of multiplication in finite fields
Is Referenced By
nnt2020aixm0131
status
rapporteur
Optimisations des attaques par canaux cachés
Is Referenced By
nnt2020pa080019
status
membrejury
Various Cryptographic and Algebraic Generalizations of Bent Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_15
status
author
Polynomial construction of Chudnovsky-type algorithms with a linear bilinear complexity
Is Referenced By
nnt2022aixm0411
status
membrejury
``{Readers} digest of'' 17-year achievements on {Boolean} and vectorial functions and open problems.
Is Referenced By
halhal-03960654
status
author
Strongly Regular Graphs from Weakly Regular Plateaued Functions
Is Referenced By
doi10.1109/iwsda46143.2019.8966118
status
author
On a Conjecture about Binary Strings Distribution
Is Referenced By
doi10.1007/978-3-642-15874-2_30
status
author
On a conjecture about binary strings distribution
Is Referenced By
halhal-00642292
status
author
A function field approach toward good polynomials for further results on optimal LRC codes
Is Referenced By
doi10.1016/j.ffa.2022.102028
status
author
Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity
Is Referenced By
doi10.1007/s12095-022-00603-5
status
author
More permutations and involutions for constructing bent functions
Is Referenced By
doi10.1007/s12095-021-00482-2
status
author
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Is Referenced By
doi10.46586/tches.v2021.i4.57-87
status
author
Fonctions booléennes, courbes algébriques et multiplication complexe
Is Referenced By
nnt2012enst0003
status
membrejury
On construction of semi-bent funvtions from bent functions
Is Referenced By
halhal-02286937
status
author
On minimal and almost-minimal linear codes
Is Referenced By
halhal-02286938
status
author
Information Leakages in Code-based Masking: A Unified Quantification Approach
Is Referenced By
doi10.46586/tches.v2021.i3.465-495
status
author
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
Is Referenced By
doi10.1007/978-3-030-81645-2_27
status
author
Fast Algebraic Immunity of Boolean Functions and LCD Codes
Is Referenced By
doi10.1109/tit.2021.3056716
status
author
Good polynomials for optimal LRC of low locality
Is Referenced By
doi10.1007/s10623-021-00886-4
status
author
Propriétés différentielles des permutations et application en cryptographie symétrique
Is Referenced By
nnt2014pa066654
status
membrejury
Linear codes from support designs of ternary cyclic codes
Is Referenced By
doi10.1007/s10623-021-01001-3
status
author
On Infinite Families of Narrow-Sense Antiprimitive BCH Codes Admitting 3-Transitive Automorphism Groups and Their Consequences
Is Referenced By
doi10.1109/tit.2021.3139687
status
author
Contributions to the theory of algebraic coding on finite fields and rings and their applications
Is Referenced By
nnt2022pa080064
status
directeurthese
On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ which are Sidon sets and/or sum-free sets
Is Referenced By
doi10.1007/s10801-020-00988-7
status
author
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions
Is Referenced By
doi10.1007/978-3-319-55589-8_22
status
author
Solving <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.svg"><mml:msup><mml:mrow><mml:mi>x</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:mi>x</mml:mi><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:mi>a</mml:mi><mml:mo linebreak="goodbreak" linebreakstyle="after">=</mml:mo><mml:mn>0</mml:mn></mml:math> in <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si17.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math> with <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si123.svg"><mml:mi mathvariant="normal">gcd</mml:mi><mml:mo>⁡</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo linebreak="goodbreak" linebreakstyle="after">=</mml:mo><mml:mn>1</mml:mn></mml:math>
Is Referenced By
doi10.1016/j.ffa.2019.101630
status
author
Cryptanalysis of the AEAD and hash algorithm DryGASCON
Is Referenced By
doi10.1007/s12095-021-00542-7
status
author
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings
Is Referenced By
doi10.1109/tit.2021.3133959
status
author
Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes
Is Referenced By
doi10.1007/s12095-022-00581-8
status
author
Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio
Is Referenced By
doi10.1007/s10623-022-01035-1
status
author
An STP-based model toward designing S-boxes with good cryptographic properties
Is Referenced By
doi10.1007/s10623-022-01034-2
status
author
What can information guess ? : Towards information leakage quantification in side-channel analysis
Is Referenced By
nnt2021ippat044
status
membrejury
Minimal Linear Codes From Characteristic Functions
Is Referenced By
doi10.1109/tit.2020.2978387
status
author
Minimal Linear codes with few weights and their secret sharing.
Is Referenced By
halhal-03022847
status
author
On σ-LCD codes
Is Referenced By
halhal-03023164
status
author
Construction of Efficient Codes for High-Order Direct Sum Masking
Is Referenced By
halhal-03025841
status
author
Three-Weight Minimal Linear Codes and Their Applications
Is Referenced By
halhal-03035622
status
author
New characterization and parametrization of LCD codes.
Is Referenced By
halhal-03022850
status
author
Several new classes of self-dual bent functions derived from involutions
Is Referenced By
halhal-03023241
status
author
On Two-to-One Mappings Over Finite Fields
Is Referenced By
doi10.1109/tit.2019.2933832
status
author
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Is Referenced By
halhal-03025857
status
author
Constructions of optimal locally recoverable codes via Dickson polynomials
Is Referenced By
halhal-03035635
status
author
Further study of 2-to-1 mappings over $F_2^n$
Is Referenced By
halhal-03035653
status
author
Survey on recent trends towards generalized differential and boomerang uniformities
Is Referenced By
doi10.1007/s12095-021-00551-6
status
author
On the links of some semi-bent functions with Kloosterman sums
Is Referenced By
halhal-02278602
status
author
Complete solution over <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi>p</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math> of the equation <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si2.svg"><mml:msup><mml:mrow><mml:mi>X</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi>p</mml:mi></mml:mrow><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msup><mml:mo linebreak="badbreak" linebreakstyle="after">+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:mi>X</mml:mi><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml:mo><mml:mi>a</mml:mi><mml:mo linebreak="goodbreak" linebreakstyle="after">=</mml:mo><mml:mn>0</mml:mn></mml:math>
Is Referenced By
doi10.1016/j.ffa.2021.101902
status
author
Implémentation efficace de l'arithmétique AMNS
Is Referenced By
nnt2021toul0025
status
rapporteur
A Proof of the Beierle-Kranz-Leander Conjecture related to Lightweight Multiplication in $F_2^n$
Is Referenced By
halhal-03048614
status
author
Several classes of minimal linear codes with few weights from weakly regular plateaued function
Is Referenced By
halhal-03048656
status
author
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Is Referenced By
halhal-03048680
status
author
On the Menezes-Teske-Weng conjecture
Is Referenced By
halhal-03048644
status
author
On generalized hyper-bent functions
Is Referenced By
halhal-03053939
status
author
Solving $x+x^{2^l}+\cdots+x^{2^{ml}}=a$ over $\mathbb{F}_{2^n}$.
Is Referenced By
halhal-03053979
status
author
Constructions of Self-Orthogonal Codes From Hulls of BCH Codes and Their Parameters
Is Referenced By
doi10.1109/tit.2020.2991635
status
author
Cyclic Bent Functions and Their Applications in Sequences
Is Referenced By
doi10.1109/tit.2021.3057896
status
author
Guest Editorial Special Issue: “From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein”
Is Referenced By
doi10.1109/tit.2021.3072555
status
author
Further Study of 2-to-1 Mappings Over F<sub>2<sup>n</sup> </sub>
Is Referenced By
doi10.1109/tit.2021.3057094
status
author
Involutions Over the Galois Field
Is Referenced By
doi10.1109/tit.2016.2526022
status
author
Security Assessment Against Side-Channel Attacks : Insights from an Information-Theoretic Perspective
Is Referenced By
nnt2023ippat033
status
membrejury
On constructions of bent functions from involutions
Is Referenced By
doi10.1109/isit.2016.7541271
status
author
Distribution de la non-linéarité des fonctions booléennes
Is Referenced By
nnt2013aixm4090
status
rapporteur
Les codes correcteurs au service de la cryptographie symétrique et asymétrique
Is Referenced By
nnt2019pa080101
status
membrejury
2-Correcting Lee Codes: (Quasi)-Perfect Spectral Conditions and Some Constructions
Is Referenced By
doi10.1109/tit.2018.2789921
status
author
Generalities on Boolean Functions and p-Ary Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_1
status
author
Some (almost) optimally extendable linear codes
Is Referenced By
doi10.1007/s10623-019-00652-7
status
author
On the boomerang uniformity of quadratic permutations
Is Referenced By
doi10.1007/s10623-020-00775-2
status
author
Linear codes with few weights from weakly regular bent functions based on a generic construction
Is Referenced By
doi10.1007/s12095-016-0186-5
status
author
Mathématiques discrètes appliquées à la cryptographie symétrique
Is Referenced By
nnt2018sorus092
status
membrejury
Further study of 2-to-1 mappings over F<sub>2</sub> <sup>n</sup>
Is Referenced By
doi10.1109/iwsda46143.2019.8966103
status
author
New characterizations for the multi-output correlation-immune Boolean functions
Is Referenced By
doi10.1016/j.disc.2020.112082
status
author
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity
Is Referenced By
doi10.1007/s10623-022-01047-x
status
author
Contributions à la préservation de la vie privée et de la sécurité des données partagées
Is Referenced By
nnt2022pa080060
status
directeurthese
On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions
Is Referenced By
doi10.1007/978-3-319-27239-9_1
status
author
Solving $x+x^{2^{l}}+\cdots +x^{2^{ml}}=a$ over $\mathbb {F}_{2^{n}}$
Is Referenced By
doi10.1007/s12095-020-00425-3
status
author
A new family of polyphase sequences with low correlation
Is Referenced By
doi10.1007/s12095-021-00522-x
status
author
Constructions of Optimal Uniform Wide-Gap Frequency-Hopping Sequences
Is Referenced By
doi10.1109/tit.2021.3123395
status
author
Preimages of p −Linearized Polynomials over ${\mathbb {F}}_{p}$
Is Referenced By
doi10.1007/s12095-021-00514-x
status
author
Decomposing Generalized Bent and Hyperbent Functions
Is Referenced By
doi10.1109/tit.2017.2754498
status
author
A proof of the Beierle–Kranz–Leander conjecture related to lightweight multiplication in $$\mathbb {F}_{2^n}$$
Is Referenced By
doi10.1007/s10623-019-00665-2
status
author
Semi-bent Functions from Oval Polynomials
Is Referenced By
doi10.1007/978-3-642-45239-0_1
status
author
Bent Functions-Generalities
Is Referenced By
doi10.1007/978-3-319-32595-8_4
status
author
On Semi-bent Functions and Related Plateaued Functions Over the Galois Field 𝔽 2 n $$\mathbb{F}_{2^{n}}$$
Is Referenced By
doi10.1007/978-3-319-10683-0_11
status
author
Hyper-Bent Functions: Primary Constructions with Multiple Trace Terms
Is Referenced By
doi10.1007/978-3-319-32595-8_10
status
author
Contribution aux fonctions booléennes pour la cryptographie symétique et aux codes correcteurs d'erreurs
Is Referenced By
sudoc189976373
status
author
Protocol for preserving privacy in distributed system (PPDS)
Is Referenced By
doi10.1109/iwcmc.2017.7986571
status
author
Optimal Codebooks From Binary Codes Meeting the Levenshtein Bound
Is Referenced By
doi10.1109/tit.2015.2487451
status
author
Explicit constructions of bent functions from pseudo-planar functions
Is Referenced By
doi10.3934/amc.2017021
status
author
Multiple characters transforms and generalized Boolean functions
Is Referenced By
doi10.1007/s12095-019-00383-5
status
author
Subclasses of Bent Functions: Hyper-Bent Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_9
status
author
On <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="mml1" display="inline" overflow="scroll" altimg="si1.gif"><mml:mi>q</mml:mi></mml:math>-ary plateaued functions over <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="mml2" display="inline" overflow="scroll" altimg="si2.gif"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi>q</mml:mi></mml:mrow></mml:msub></mml:math> and their explicit characterizations
Is Referenced By
doi10.1016/j.ejc.2018.02.025
status
author
Four decades of research on bent functions
Is Referenced By
doi10.1007/s10623-015-0145-8
status
author
Weightwise perfectly balanced functions with high weightwise nonlinearity profile
Is Referenced By
doi10.1007/s10623-018-0579-x
status
author
Bent Functions
Is Referenced By
doi10.1007/978-3-319-32595-8
status
author
Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks
Is Referenced By
doi10.1007/978-3-030-05153-2_5
status
author
Bent vectorial functions and linear codes from o-polynomials
Is Referenced By
doi10.1007/s10623-014-9989-6
status
author
Bent Functions: Secondary Constructions
Is Referenced By
doi10.1007/978-3-319-32595-8_6
status
author
On generalized hyper-bent functions
Is Referenced By
doi10.1007/s12095-019-00390-6
status
author
Mathematical Foundations
Is Referenced By
doi10.1007/978-3-319-32595-8_2
status
author
Bent Functions: Primary Constructions (Part II)
Is Referenced By
doi10.1007/978-3-319-32595-8_7
status
author
Hyperbent Functions via Dillon-Like Exponents
Is Referenced By
doi10.1109/tit.2013.2238580
status
author
Yet another variation on minimal linear codes
Is Referenced By
doi10.3934/amc.2016.10.53
status
author
Bent Functions in Arbitrary Characteristic
Is Referenced By
doi10.1007/978-3-319-32595-8_13
status
author
On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions
Is Referenced By
doi10.1007/s12095-019-00410-5
status
author
Constructions of optimal locally recoverable codes via Dickson polynomials
Is Referenced By
doi10.1007/s10623-020-00731-0
status
author
Several New Infinite Families of Bent Functions and Their Duals
Is Referenced By
doi10.1109/tit.2014.2320974
status
author
New characterizations and construction methods of bent and hyper-bent Boolean functions
Is Referenced By
doi10.1016/j.disc.2020.112081
status
author
Characterizations of Plateaued and Bent Functions in Characteristic $$p$$
Is Referenced By
doi10.1007/978-3-319-12325-7_6
status
author
On the nonlinearity of S-boxes and linear codes
Is Referenced By
doi10.1007/s12095-015-0176-z
status
author
Euclidean and Hermitian LCD MDS codes
Is Referenced By
doi10.1007/s10623-018-0463-8
status
author
An efficient and scalable modular inversion/division for public key cryptosystems
Is Referenced By
doi10.1109/icemis.2017.8272995
status
author
Bent Functions From Involutions Over ${\mathbb F}_{2^{n}}$
Is Referenced By
doi10.1109/tit.2017.2777961
status
author
Privacy as a Service: Anonymisation of NetFlow Traces
Is Referenced By
doi10.1007/978-3-030-34986-8_39
status
author
Further Results on Generalized Bent Functions and Their Complete Characterization
Is Referenced By
doi10.1109/tit.2018.2835518
status
author
(Hyper)-Bent Functions, Exponential Sums and (Hyper-)elliptic Curves
Is Referenced By
doi10.1007/978-3-319-32595-8_11
status
author
Further study on the maximum number of bent components of vectorial functions
Is Referenced By
doi10.1007/s10623-019-00639-4
status
author
Fast algebraic immunity of Boolean functions
Is Referenced By
doi10.3934/amc.2017031
status
author
On the nonlinearity of Boolean functions with restricted input
Is Referenced By
doi10.1007/s12095-018-0293-6
status
author
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
Is Referenced By
doi10.1109/tit.2017.2750663
status
author
Complementary Dual Algebraic Geometry Codes
Is Referenced By
doi10.1109/tit.2017.2766075
status
author
Optimizing Inner Product Masking Scheme by a Coding Theory Approach
Is Referenced By
doi10.1109/tifs.2020.3009609
status
author
An efficient characterization of a family of hyper-bent functions with multiple trace terms
Is Referenced By
doi10.1515/jmc-2012-0013
status
author
Characterizations of Partially Bent and Plateaued Functions over Finite Fields
Is Referenced By
doi10.1007/978-3-030-05153-2_12
status
author
Bent and Semi-bent Functions via Linear Translators
Is Referenced By
doi10.1007/978-3-319-27239-9_13
status
author
Bent functions linear on elements of some classical spreads and presemifields spreads
Is Referenced By
doi10.1007/s12095-016-0195-4
status
author
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
Is Referenced By
doi10.1007/978-3-319-54876-0_15
status
author
A class of narrow-sense BCH codes over $$\mathbb {F}_q$$ of length $$\frac{q^m-1}{2}$$
Is Referenced By
doi10.1007/s10623-019-00691-0
status
author
New Bent Functions from Permutations and Linear Translators
Is Referenced By
doi10.1007/978-3-319-55589-8_19
status
author
Dickson polynomials that are involutions
Is Referenced By
doi10.1142/9789814719261_0003
status
author
Several new classes of self-dual bent functions derived from involutions
Is Referenced By
doi10.1007/s12095-019-00371-9
status
author
Further constructions of infinite families of bent functions from new permutations and their duals
Is Referenced By
doi10.1007/s12095-015-0144-7
status
author
Linear codes from weakly regular plateaued functions and their secret sharing schemes
Is Referenced By
doi10.1007/s10623-018-0556-4
status
author
On constructions of bent, semi-bent and five valued spectrum functions from old bent functions
Is Referenced By
doi10.3934/amc.2017026
status
author
New Constructions of Optimal Locally Recoverable Codes via Good Polynomials
Is Referenced By
doi10.1109/tit.2017.2713245
status
author
On involutions of finite fields
Is Referenced By
doi10.1109/isit.2015.7282442
status
author
On Minimal and Quasi-minimal Linear Codes
Is Referenced By
doi10.1007/978-3-642-45239-0_6
status
author
Preserving privacy in distributed system (PPDS) protocol: Security analysis
Is Referenced By
doi10.1109/pccc.2017.8280505
status
author
Plateaued Boolean Functions: Constructions of Semi-bent Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_17
status
author
Codebooks from generalized bent <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e146" altimg="si4.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">Z</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math>-valued quadratic forms
Is Referenced By
doi10.1016/j.disc.2019.111736
status
author
Infinite Classes of Six-Weight Linear Codes Derived from Weakly Regular Plateaued Functions
Is Referenced By
doi10.1109/iscturkey51113.2020.9308019
status
author
A comparison of Carlet's second-order nonlinearity bounds
Is Referenced By
doi10.1080/00207160.2015.1112002
status
author
On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes
Is Referenced By
doi10.1007/978-3-030-16458-4_15
status
author
Cyclic codes and algebraic immunity of Boolean functions
Is Referenced By
doi10.1109/itw.2015.7133110
status
author
On $\sigma$ -LCD Codes
Is Referenced By
doi10.1109/tit.2018.2873130
status
author
Linear codes with small hulls in semi-primitive case
Is Referenced By
doi10.1007/s10623-019-00663-4
status
author
On construction of bent functions involving symmetric functions and their duals
Is Referenced By
doi10.3934/amc.2017027
status
author
New Characterization and Parametrization of LCD Codes
Is Referenced By
doi10.1109/tit.2018.2829873
status
author
Bent Functions and (Partial-)spreads
Is Referenced By
doi10.1007/978-3-319-32595-8_14
status
author
On the Menezes-Teske-Weng conjecture
Is Referenced By
doi10.1007/s12095-019-00359-5
status
author
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity
Is Referenced By
doi10.1007/s10623-020-00806-y
status
author
Recent results and problems on constructions of linear codes from cryptographic functions
Is Referenced By
doi10.1007/s12095-020-00435-1
status
author
Generalized Plateaued Functions and Admissible (Plateaued) Functions
Is Referenced By
doi10.1109/tit.2017.2715804
status
author
Plateaued Functions: Generalities and Characterizations
Is Referenced By
doi10.1007/978-3-319-32595-8_16
status
author
Partially Homomorphic Encryption Schemes over Finite Fields
Is Referenced By
doi10.1007/978-3-319-49445-6_6
status
author
Yet another variation on minimal linear codes
Is Referenced By
doi10.1109/ita.2015.7309009
status
author
DNA cyclic codes over rings
Is Referenced By
doi10.3934/amc.2017004
status
author
Boolean Functions and Cryptography
Is Referenced By
doi10.1007/978-3-319-32595-8_3
status
author
On the p-ary (cubic) bent and plateaued (vectorial) functions
Is Referenced By
doi10.1007/s10623-017-0427-4
status
author
Linear Codes from Bent, Semi-bent and Almost Bent Functions
Is Referenced By
doi10.1007/978-3-319-32595-8_18
status
author
Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions
Is Referenced By
doi10.1109/tit.2019.2956130
status
author
Variation on correlation immune Boolean and vectorial functions
Is Referenced By
doi10.3934/amc.2016048
status
author
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs
Is Referenced By
doi10.1007/978-3-319-49445-6_8
status
author

Annotations

There are no annotations for this resource.