BibTeX records: Claude Carlet

download as .bib file

@article{DBLP:journals/amai/CarletF24,
  author       = {Claude Carlet and
                  Serge Feukoua},
  title        = {On those Boolean functions that are coset leaders of first order Reed-Muller
                  codes},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {92},
  number       = {1},
  pages        = {7--27},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10472-023-09842-5},
  doi          = {10.1007/S10472-023-09842-5},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amai/CarletF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletDGT24,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking against {SCA} and FIA, with cost amortization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {398--432},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.398-432},
  doi          = {10.46586/TCHES.V2024.I1.398-432},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CarletDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurogp/CarletDJMP24,
  author       = {Claude Carlet and
                  Marko Durasevic and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  editor       = {Mario Giacobini and
                  Bing Xue and
                  Luca Manzoni},
  title        = {Look into the Mirror: Evolving Self-dual Bent Boolean Functions},
  booktitle    = {Genetic Programming - 27th European Conference, EuroGP 2024, Held
                  as Part of EvoStar 2024, Aberystwyth, UK, April 3-5, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14631},
  pages        = {161--175},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56957-9\_10},
  doi          = {10.1007/978-3-031-56957-9\_10},
  timestamp    = {Mon, 08 Apr 2024 18:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/eurogp/CarletDJMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evostar/CarletDGJMP24,
  author       = {Claude Carlet and
                  Marko Durasevic and
                  Bruno Gasperov and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  editor       = {Stephen L. Smith and
                  Jo{\~{a}}o Correia and
                  Christian Cintrano},
  title        = {A New Angle: On Evolving Rotation Symmetric Boolean Functions},
  booktitle    = {Applications of Evolutionary Computation - 27th European Conference,
                  EvoApplications 2024, Held as Part of EvoStar 2024, Aberystwyth, UK,
                  April 3-5, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14634},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56852-7\_19},
  doi          = {10.1007/978-3-031-56852-7\_19},
  timestamp    = {Mon, 01 Apr 2024 16:15:43 +0200},
  biburl       = {https://dblp.org/rec/conf/evostar/CarletDGJMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2023,
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-53368-6},
  doi          = {10.1007/978-3-031-53368-6},
  isbn         = {978-3-031-53367-9},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09937,
  author       = {Claude Carlet and
                  Marko {\DH}urasevic and
                  Domagoj Jakobovic and
                  Stjepan Picek and
                  Luca Mariot},
  title        = {A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions
                  in Odd Sizes},
  journal      = {CoRR},
  volume       = {abs/2402.09937},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09937},
  doi          = {10.48550/ARXIV.2402.09937},
  eprinttype    = {arXiv},
  eprint       = {2402.09937},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/Carlet23,
  author       = {Claude Carlet},
  title        = {Revisiting some results on {APN} and algebraic immune functions},
  journal      = {Adv. Math. Commun.},
  volume       = {17},
  number       = {5},
  pages        = {1012--1026},
  year         = {2023},
  url          = {https://doi.org/10.3934/amc.2021035},
  doi          = {10.3934/AMC.2021035},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/Carlet23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletP23,
  author       = {Claude Carlet and
                  Stjepan Picek},
  title        = {On the exponents of {APN} power functions and Sidon sets, sum-free
                  sets, and Dickson polynomials},
  journal      = {Adv. Math. Commun.},
  volume       = {17},
  number       = {6},
  pages        = {1507--1525},
  year         = {2023},
  url          = {https://doi.org/10.3934/amc.2021064},
  doi          = {10.3934/AMC.2021064},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BudaghyanCHM23,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Wilfried Meidl},
  title        = {Editorial: Special issue on Boolean functions and their applications
                  2022},
  journal      = {Cryptogr. Commun.},
  volume       = {15},
  number       = {6},
  pages        = {1049--1051},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12095-023-00678-8},
  doi          = {10.1007/S12095-023-00678-8},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/BudaghyanCHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletKN23,
  author       = {Claude Carlet and
                  Rebeka Kiss and
                  G{\'{a}}bor P{\'{e}}ter Nagy},
  title        = {Simplicity conditions for binary orthogonal arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {151--163},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01105-4},
  doi          = {10.1007/S10623-022-01105-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeierleC23,
  author       = {Christof Beierle and
                  Claude Carlet},
  title        = {Gold functions and switched cube functions are not 0-extendable in
                  dimension n {\textgreater} 5},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {433--449},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01111-6},
  doi          = {10.1007/S10623-022-01111-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeierleC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/CarletS23,
  author       = {Claude Carlet and
                  Patrick Sol{\'{e}}},
  title        = {The weight spectrum of two families of Reed-Muller codes},
  journal      = {Discret. Math.},
  volume       = {346},
  number       = {10},
  pages        = {113568},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.disc.2023.113568},
  doi          = {10.1016/J.DISC.2023.113568},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dm/CarletS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PiccioneABCDNPR23,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-Boxes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {10},
  pages        = {6700--6710},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3287534},
  doi          = {10.1109/TIT.2023.3287534},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/CarletMMP23,
  author       = {Claude Carlet and
                  Luca Mariot and
                  Luca Manzoni and
                  Stjepan Picek},
  editor       = {Leslie P{\'{e}}rez C{\'{a}}ceres and
                  Thomas St{\"{u}}tzle},
  title        = {Evolutionary Strategies for the Design of Binary Linear Codes},
  booktitle    = {Evolutionary Computation in Combinatorial Optimization - 23rd European
                  Conference, EvoCOP 2023, Held as Part of EvoStar 2023, Brno, Czech
                  Republic, April 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13987},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30035-6\_8},
  doi          = {10.1007/978-3-031-30035-6\_8},
  timestamp    = {Thu, 06 Apr 2023 11:08:46 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/CarletMMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CarletFS23,
  author       = {Claude Carlet and
                  Serge Feukoua and
                  Ana Salagean},
  editor       = {Elizabeth A. Quaglia},
  title        = {Coset Leaders of the First Order Reed-Muller Codes in the Classes
                  of Niho Functions and Threshold Functions},
  booktitle    = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC}
                  2023, London, UK, December 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14421},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47818-5\_2},
  doi          = {10.1007/978-3-031-47818-5\_2},
  timestamp    = {Sat, 09 Dec 2023 13:01:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CarletFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-13497,
  author       = {Claude Carlet and
                  Patrick Sol{\'{e}}},
  title        = {The weight spectrum of several families of Reed-Muller codes},
  journal      = {CoRR},
  volume       = {abs/2301.13497},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.13497},
  doi          = {10.48550/ARXIV.2301.13497},
  eprinttype    = {arXiv},
  eprint       = {2301.13497},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-13497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-11881,
  author       = {Claude Carlet and
                  Marko {\DH}urasevic and
                  Bruno Gasperov and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  title        = {A New Angle: On Evolving Rotation Symmetric Boolean Functions},
  journal      = {CoRR},
  volume       = {abs/2311.11881},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.11881},
  doi          = {10.48550/ARXIV.2311.11881},
  eprinttype    = {arXiv},
  eprint       = {2311.11881},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-11881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-11884,
  author       = {Claude Carlet and
                  Marko {\DH}urasevic and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  title        = {Look into the Mirror: Evolving Self-Dual Bent Boolean Functions},
  journal      = {CoRR},
  volume       = {abs/2311.11884},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.11884},
  doi          = {10.48550/ARXIV.2311.11884},
  eprinttype    = {arXiv},
  eprint       = {2311.11884},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-11884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT23,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking to protect against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/406},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet23,
  author       = {Claude Carlet},
  title        = {On {APN} functions whose graphs are maximal Sidon sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/621},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletV23,
  author       = {Claude Carlet and
                  Irene Villa},
  title        = {On cubic-like bent Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/879},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletP23,
  author       = {Claude Carlet and
                  Enrico Piccione},
  title        = {Restricting vectorial functions to affine spaces and deducing infinite
                  families of 4-uniform permutations, in relation to the strong D-property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/928},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT23a,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {A masking method based on orthonormal spaces, protecting several bytes
                  against both {SCA} and {FIA} with a reduced cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1746},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1746},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/Carlet22,
  author       = {Claude Carlet},
  title        = {Expressing the minimum distance, weight distribution and covering
                  radius of codes by means of the algebraic and numerical normal forms
                  of their indicators},
  journal      = {Adv. Math. Commun.},
  volume       = {16},
  number       = {4},
  pages        = {693--707},
  year         = {2022},
  url          = {https://doi.org/10.3934/amc.2022047},
  doi          = {10.3934/AMC.2022047},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/Carlet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletHMT22,
  author       = {Claude Carlet and
                  Peng Han and
                  Sihem Mesnager and
                  Chunming Tang},
  title        = {M{\"{o}}bius transformations and characterizations of hyper-bent
                  functions from Dillon-like exponents with coefficients in extension
                  fields},
  journal      = {Adv. Math. Commun.},
  volume       = {16},
  number       = {4},
  pages        = {709--720},
  year         = {2022},
  url          = {https://doi.org/10.3934/amc.2022095},
  doi          = {10.3934/AMC.2022095},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/CarletHMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BudaghyanCDH22,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Cunsheng Ding and
                  Tor Helleseth},
  title        = {Editorial: Special issue on Boolean functions and their applications
                  2021},
  journal      = {Cryptogr. Commun.},
  volume       = {14},
  number       = {6},
  pages        = {1207--1209},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12095-022-00609-z},
  doi          = {10.1007/S12095-022-00609-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BudaghyanCDH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/BeierleCLP22,
  author       = {Christof Beierle and
                  Claude Carlet and
                  Gregor Leander and
                  L{\'{e}}o Perrin},
  title        = {A further study of quadratic {APN} permutations in dimension nine},
  journal      = {Finite Fields Their Appl.},
  volume       = {81},
  pages        = {102049},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ffa.2022.102049},
  doi          = {10.1016/J.FFA.2022.102049},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/BeierleCLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet22,
  author       = {Claude Carlet},
  title        = {A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit
                  Function},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {2},
  pages        = {1355--1368},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3126684},
  doi          = {10.1109/TIT.2021.3126684},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCCDK22,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Diana Davidova and
                  Nikolay S. Kaleyski},
  title        = {On Two Fundamental Problems on {APN} Power Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {5},
  pages        = {3389--3403},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2022.3147060},
  doi          = {10.1109/TIT.2022.3147060},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCCDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletM22,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux},
  title        = {A Complete Study of Two Classes of Boolean Functions: Direct Sums
                  of Monomials and Threshold Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {5},
  pages        = {3404--3425},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3139804},
  doi          = {10.1109/TIT.2021.3139804},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/CarletM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/CarletJP22,
  author       = {Claude Carlet and
                  Domagoj Jakobovic and
                  Stjepan Picek},
  editor       = {Jonathan E. Fieldsend and
                  Markus Wagner},
  title        = {On generalizing the power function exponent constructions with genetic
                  programming},
  booktitle    = {{GECCO} '22: Genetic and Evolutionary Computation Conference, Companion
                  Volume, Boston, Massachusetts, USA, July 9 - 13, 2022},
  pages        = {691--694},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3520304.3529081},
  doi          = {10.1145/3520304.3529081},
  timestamp    = {Mon, 25 Jul 2022 17:04:27 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/CarletJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/CarletDJMP22,
  author       = {Claude Carlet and
                  Marko Djurasevic and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  editor       = {Jonathan E. Fieldsend and
                  Markus Wagner},
  title        = {Evolving constructions for balanced, highly nonlinear boolean functions},
  booktitle    = {{GECCO} '22: Genetic and Evolutionary Computation Conference, Boston,
                  Massachusetts, USA, July 9 - 13, 2022},
  pages        = {1147--1155},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3512290.3528871},
  doi          = {10.1145/3512290.3528871},
  timestamp    = {Tue, 12 Jul 2022 15:09:18 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/CarletDJMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaim/Carlet22,
  author       = {Claude Carlet},
  title        = {Parameterization of Boolean functions by vectorial functions and associated
                  constructions},
  booktitle    = {Proceedings of the International Symposium on Artificial Intelligence
                  and Mathematics 2022 {(ISAIM} 2022), Fort Lauderdale, Florida, USA,
                  January 3-5, 2022},
  year         = {2022},
  url          = {https://isaim2022.cs.ou.edu/papers/ISAIM2022\_Boolean\_Carlet.pdf},
  timestamp    = {Wed, 20 Mar 2024 17:48:41 +0100},
  biburl       = {https://dblp.org/rec/conf/isaim/Carlet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/Carlet22,
  author       = {Claude Carlet},
  editor       = {Armando Casta{\~{n}}eda and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On {APN} Functions Whose Graphs are Maximal Sidon Sets},
  booktitle    = {{LATIN} 2022: Theoretical Informatics - 15th Latin American Symposium,
                  Guanajuato, Mexico, November 7-11, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13568},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20624-5\_15},
  doi          = {10.1007/978-3-031-20624-5\_15},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latin/Carlet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10510,
  author       = {Christof Beierle and
                  Claude Carlet},
  title        = {Gold Functions Are Not 0-Extendable in Dimension n{\textgreater}5},
  journal      = {CoRR},
  volume       = {abs/2201.10510},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10510},
  eprinttype    = {arXiv},
  eprint       = {2201.10510},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10510.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08743,
  author       = {Claude Carlet and
                  Marko Djurasevic and
                  Domagoj Jakobovic and
                  Luca Mariot and
                  Stjepan Picek},
  title        = {Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions},
  journal      = {CoRR},
  volume       = {abs/2202.08743},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08743},
  eprinttype    = {arXiv},
  eprint       = {2202.08743},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-11502,
  author       = {Anastasiya Gorodilova and
                  Natalia N. Tokareva and
                  Sergey Agievich and
                  Ilya Beterov and
                  Tim Beyne and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Valeria Idrisova and
                  Nikolay Kolomeec and
                  Aleksandr Kutsenko and
                  Ekaterina Malygina and
                  Nicky Mouha and
                  Marina Pudovkina and
                  Francesco Sica and
                  Aleksei Udovenko},
  title        = {An overview of the Eight International Olympiad in Cryptography "Non-Stop
                  University CRYPTO"},
  journal      = {CoRR},
  volume       = {abs/2204.11502},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.11502},
  doi          = {10.48550/ARXIV.2204.11502},
  eprinttype    = {arXiv},
  eprint       = {2204.11502},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-11502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-11551,
  author       = {Claude Carlet and
                  Luca Mariot and
                  Luca Manzoni and
                  Stjepan Picek},
  title        = {Evolutionary Strategies for the Design of Binary Linear Codes},
  journal      = {CoRR},
  volume       = {abs/2211.11551},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.11551},
  doi          = {10.48550/ARXIV.2211.11551},
  eprinttype    = {arXiv},
  eprint       = {2211.11551},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-11551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletF22,
  author       = {Claude Carlet and
                  Serge Feukoua},
  title        = {On those Boolean functions that are coset leaders of first order Reed-Muller
                  codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/669},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiccioneABCDNPR22,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1141},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BudaghyanCHN21,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Kaisa Nyberg},
  title        = {Editorial: Special issue on Boolean functions and their applications
                  2020},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {6},
  pages        = {887--889},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00536-5},
  doi          = {10.1007/S12095-021-00536-5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/BudaghyanCHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BudaghyanCCCV21,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Generalized isotopic shift construction for {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {19--32},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00803-1},
  doi          = {10.1007/S10623-020-00803-1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BudaghyanCCCV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletKM21,
  author       = {Claude Carlet and
                  Kwang Ho Kim and
                  Sihem Mesnager},
  title        = {A direct proof of APN-ness of the Kasami functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {441--446},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00830-y},
  doi          = {10.1007/S10623-020-00830-Y},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/DavidovaBCHIP21,
  author       = {Diana Davidova and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Ferdinand Ihringer and
                  Tim Penttila},
  title        = {Relation between o-equivalence and EA-equivalence for Niho bent functions},
  journal      = {Finite Fields Their Appl.},
  volume       = {72},
  pages        = {101834},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ffa.2021.101834},
  doi          = {10.1016/J.FFA.2021.101834},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/DavidovaBCHIP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChengCGDG21,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Detecting faults in inner product masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {119--133},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00227-6},
  doi          = {10.1007/S13389-020-00227-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {465--495},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.465-495},
  doi          = {10.46586/TCHES.V2021.I3.465-495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletGM21,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box
                  Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {57--87},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.57-87},
  doi          = {10.46586/TCHES.V2021.I4.57-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CarletGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CarletCGKT21,
  author       = {Claude Carlet and
                  {\'{E}}loi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Sel{\c{c}}uk Kavut and
                  Deng Tang},
  title        = {Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best
                  and Worst Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {203--218},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3006399},
  doi          = {10.1109/TIFS.2020.3006399},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CarletCGKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGCMD21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {220--235},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3009609},
  doi          = {10.1109/TIFS.2020.3009609},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet21,
  author       = {Claude Carlet},
  title        = {On the Properties of the Boolean Functions Associated to the Differential
                  Spectrum of General {APN} Functions and Their Consequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {10},
  pages        = {6926--6939},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3081139},
  doi          = {10.1109/TIT.2021.3081139},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet21a,
  author       = {Claude Carlet},
  title        = {Bounds on the Nonlinearity of Differentially Uniform Functions by
                  Means of Their Image Set Size, and on Their Distance to Affine Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {12},
  pages        = {8325--8334},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3114958},
  doi          = {10.1109/TIT.2021.3114958},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/CarletJP21,
  author       = {Claude Carlet and
                  Domagoj Jakobovic and
                  Stjepan Picek},
  editor       = {Francisco Chicano and
                  Krzysztof Krawiec},
  title        = {Evolutionary algorithms-assisted construction of cryptographic boolean
                  functions},
  booktitle    = {{GECCO} '21: Genetic and Evolutionary Computation Conference, Lille,
                  France, July 10-14, 2021},
  pages        = {565--573},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3449639.3459362},
  doi          = {10.1145/3449639.3459362},
  timestamp    = {Thu, 24 Jun 2021 08:56:59 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/CarletJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08008,
  author       = {Christof Beierle and
                  Claude Carlet and
                  Gregor Leander and
                  L{\'{e}}o Perrin},
  title        = {A Further Study of Quadratic {APN} Permutations in Dimension Nine},
  journal      = {CoRR},
  volume       = {abs/2104.08008},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08008},
  eprinttype    = {arXiv},
  eprint       = {2104.08008},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-01053,
  author       = {Anastasiya Gorodilova and
                  Natalia N. Tokareva and
                  Sergey Agievich and
                  Claude Carlet and
                  Valeria Idrisova and
                  Konstantin Kalgin and
                  D. Kolegov and
                  Alexandr Kutsenko and
                  Nicky Mouha and
                  Marina Pudovkina and
                  Aleksei Udovenko},
  title        = {The Seventh International Olympiad in Cryptography {NSUCRYPTO:} problems
                  and solutions},
  journal      = {CoRR},
  volume       = {abs/2106.01053},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.01053},
  eprinttype    = {arXiv},
  eprint       = {2106.01053},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-01053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/363},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet21,
  author       = {Claude Carlet},
  title        = {Revisiting some results on {APN} and algebraic immune functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/405},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet21a,
  author       = {Claude Carlet},
  title        = {Parameterization of Boolean functions by vectorial functions and associated
                  constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/761},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet21b,
  author       = {Claude Carlet},
  title        = {A wide class of Boolean functions generalizing the hidden weight bit
                  function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/762},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletGM21,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1028},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletF20,
  author       = {Claude Carlet and
                  Serge Feukoua},
  title        = {Three parameters of Boolean functions related to their constancy on
                  affine spaces},
  journal      = {Adv. Math. Commun.},
  volume       = {14},
  number       = {4},
  pages        = {651--676},
  year         = {2020},
  url          = {https://doi.org/10.3934/amc.2020036},
  doi          = {10.3934/AMC.2020036},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACHIK20,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Xiang{-}dong Hou and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Luca Mariot and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Razvan Rosie and
                  Natalia N. Tokareva},
  title        = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:}
                  Problems and their solutions},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {223--256},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1670282},
  doi          = {10.1080/01611194.2019.1670282},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCCCV20,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Constructing {APN} Functions Through Isotopic Shifts},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {8},
  pages        = {5299--5309},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2974471},
  doi          = {10.1109/TIT.2020.2974471},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCCCV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCHK20,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nikolay S. Kaleyski},
  title        = {On the Distance Between {APN} Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {9},
  pages        = {5742--5753},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2983684},
  doi          = {10.1109/TIT.2020.2983684},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet20,
  author       = {Claude Carlet},
  title        = {Handling Vectorial Functions by Means of Their Graph Indicators},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {10},
  pages        = {6324--6339},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2981524},
  doi          = {10.1109/TIT.2020.2981524},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet20a,
  author       = {Claude Carlet},
  title        = {Graph Indicators of Vectorial Functions and Bounds on the Algebraic
                  Degree of Composite Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {12},
  pages        = {7702--7716},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.3017494},
  doi          = {10.1109/TIT.2020.3017494},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/CarletDJP20,
  author       = {Claude Carlet and
                  Marko Djurasevic and
                  Domagoj Jakobovic and
                  Stjepan Picek},
  editor       = {Thomas B{\"{a}}ck and
                  Mike Preuss and
                  Andr{\'{e}} H. Deutz and
                  Hao Wang and
                  Carola Doerr and
                  Michael T. M. Emmerich and
                  Heike Trautmann},
  title        = {A Search for Additional Structure: The Case of Cryptographic S-boxes},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} {XVI} - 16th International
                  Conference, {PPSN} 2020, Leiden, The Netherlands, September 5-9, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12270},
  pages        = {343--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58115-2\_24},
  doi          = {10.1007/978-3-030-58115-2\_24},
  timestamp    = {Fri, 04 Sep 2020 10:49:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/CarletDJP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/cu/20/C2020,
  editor       = {Claude Carlet},
  title        = {Boolean Functions for Cryptography and Coding Theory},
  publisher    = {Cambridge University Press},
  year         = {2020},
  url          = {https://doi.org/10.1017/9781108606806},
  doi          = {10.1017/9781108606806},
  isbn         = {9781108606806},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/cu/20/C2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-00050,
  author       = {Claude Carlet and
                  Kwang Ho Kim and
                  Sihem Mesnager},
  title        = {A direct proof of APN-ness of the Kasami functions},
  journal      = {CoRR},
  volume       = {abs/2002.00050},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.00050},
  eprinttype    = {arXiv},
  eprint       = {2002.00050},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-00050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-09563,
  author       = {Anastasiya Gorodilova and
                  Natalia N. Tokareva and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeria Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Roman Lebedev and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Irina Pankratova and
                  Marina Pudovkina and
                  Vincent Rijmen and
                  Aleksei Udovenko},
  title        = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/2005.09563},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.09563},
  eprinttype    = {arXiv},
  eprint       = {2005.09563},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletKM20,
  author       = {Claude Carlet and
                  Kwang Ho Kim and
                  Sihem Mesnager},
  title        = {A direct proof of APN-ness of the Kasami functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCCCV20,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Generalized Isotopic Shift Construction for {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet20,
  author       = {Claude Carlet},
  title        = {Handling vectorial functions by means of their graph indicators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet20a,
  author       = {Claude Carlet},
  title        = {Graph indicators of vectorial functions and bounds on the algebraic
                  degree of composite functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCMD20,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/692},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletGM20,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/876},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCCDK20,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Diana Davidova and
                  Nikolay S. Kaleyski},
  title        = {On two fundamental problems on {APN} power functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1359},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1359},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCCDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CalderiniBC20,
  author       = {Marco Calderini and
                  Lilya Budaghyan and
                  Claude Carlet},
  title        = {On known constructions of {APN} and {AB} functions and their relation
                  to each other},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1444},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1444},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CalderiniBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet20b,
  author       = {Claude Carlet},
  title        = {On the image set size of differentially uniform functions and related
                  bounds on their nonlinearity and their distance to affine functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1529},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1529},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM20,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux},
  title        = {A complete study of two classes of Boolean functions for homomorphic-friendly
                  stream ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1562},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1562},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet20c,
  author       = {Claude Carlet},
  title        = {On the properties of the Boolean functions associated to the differential
                  spectrum of general {APN} functions and their consequences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1587},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1587},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BudaghyanCH19,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {Editorial: Special Issue on Boolean functions and their applications},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {1--2},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-018-0341-2},
  doi          = {10.1007/S12095-018-0341-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BudaghyanCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BudaghyanCH19a,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {Editorial: Special issue on Boolean functions and their applications
                  2018},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {6},
  pages        = {1145--1146},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-019-00409-y},
  doi          = {10.1007/S12095-019-00409-Y},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BudaghyanCH19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet19,
  author       = {Claude Carlet},
  title        = {On {APN} exponents, characterizations of differentially uniform functions
                  by the Walsh transform, and related cyclic-difference-set-like structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {203--224},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0512-3},
  doi          = {10.1007/S10623-018-0512-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletCQ19,
  author       = {Claude Carlet and
                  Xi Chen and
                  Longjiang Qu},
  title        = {Constructing infinite families of low differential uniformity (n,
                  m)-functions with m {\textgreater} n / 2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1577--1599},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0553-7},
  doi          = {10.1007/S10623-018-0553-7},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletLM19,
  author       = {Claude Carlet and
                  Chengju Li and
                  Sihem Mesnager},
  title        = {Some (almost) optimally extendable linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2813--2834},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00652-7},
  doi          = {10.1007/S10623-019-00652-7},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletLM19a,
  author       = {Claude Carlet and
                  Chengju Li and
                  Sihem Mesnager},
  title        = {Linear codes with small hulls in semi-primitive case},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3063--3075},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00663-4},
  doi          = {10.1007/S10623-019-00663-4},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletLM19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGT19,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {303--312},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0194-9},
  doi          = {10.1007/S13389-018-0194-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletMTQ19,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {New Characterization and Parametrization of {LCD} Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {1},
  pages        = {39--49},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2829873},
  doi          = {10.1109/TIT.2018.2829873},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletMTQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletMTQ19a,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {On {\textdollar}{\textbackslash}sigma{\textdollar} -LCD Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {3},
  pages        = {1694--1704},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2873130},
  doi          = {10.1109/TIT.2018.2873130},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletMTQ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FuFWC19,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Qiang Wang and
                  Claude Carlet},
  title        = {On the Derivative Imbalance and Ambiguity of Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {9},
  pages        = {5833--5845},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2912196},
  doi          = {10.1109/TIT.2019.2912196},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/FuFWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MeauxCJS19,
  author       = {Pierrick M{\'{e}}aux and
                  Claude Carlet and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Feng Hao and
                  Sushmita Ruj and
                  Sourav Sen Gupta},
  title        = {Improved Filter Permutators for Efficient {FHE:} Better Instances
                  and Implementations},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                  on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11898},
  pages        = {68--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35423-7\_4},
  doi          = {10.1007/978-3-030-35423-7\_4},
  timestamp    = {Wed, 20 Mar 2024 15:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MeauxCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BudaghyanCCCV19,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {On Isotopic Shift Construction for Planar Functions},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {2962--2966},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849339},
  doi          = {10.1109/ISIT.2019.8849339},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BudaghyanCCCV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/ChengCGDG19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {17--32},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/fv2n},
  doi          = {10.29007/FV2N},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/aise/CarletGGMO19,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Cem G{\"{u}}neri and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak},
  editor       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {Construction of Efficient Codes for High-Order Direct Sum Masking},
  booktitle    = {Security and Privacy in the Internet of Things: Challenges and Solutions},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {27},
  pages        = {108--128},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/AISE200008},
  doi          = {10.3233/AISE200008},
  timestamp    = {Wed, 13 May 2020 14:43:58 +0200},
  biburl       = {https://dblp.org/rec/series/aise/CarletGGMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/aise/CarletGM19,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  editor       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection
                  Attacks},
  booktitle    = {Security and Privacy in the Internet of Things: Challenges and Solutions},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {27},
  pages        = {148--166},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/AISE200010},
  doi          = {10.3233/AISE200010},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/aise/CarletGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/c2si/2019,
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4},
  doi          = {10.1007/978-3-030-16458-4},
  isbn         = {978-3-030-16457-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-04480,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Xiang{-}dong Hou and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Luca Mariot and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Razvan Rosie and
                  Natalia N. Tokareva},
  title        = {The Fifth International Students' Olympiad in Cryptography - {NSUCRYPTO:}
                  problems and their solutions},
  journal      = {CoRR},
  volume       = {abs/1906.04480},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.04480},
  eprinttype    = {arXiv},
  eprint       = {1906.04480},
  timestamp    = {Fri, 14 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-04480.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeauxCJS19,
  author       = {Pierrick M{\'{e}}aux and
                  Claude Carlet and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Filter Permutators: Combining Symmetric Encryption Design,
                  Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption,
                  for Private Delegation of Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeauxCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidovaBCHIP19,
  author       = {Diana Davidova and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Ferdinand Ihringer and
                  Tim Penttila},
  title        = {Relation between o-equivalence and EA-equivalence for Niho bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/789},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidovaBCHIP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCGGD19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/919},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM19,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux},
  title        = {Boolean functions for homomorphic-friendly stream ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1446},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CarletG18,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Statistical properties of side-channel and fault injection attacks
                  using coding theory},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {5},
  pages        = {909--933},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0271-4},
  doi          = {10.1007/S12095-017-0271-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CarletG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Carlet18,
  author       = {Claude Carlet},
  title        = {On the nonlinearity of monotone Boolean functions},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {6},
  pages        = {1051--1061},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0262-5},
  doi          = {10.1007/S12095-017-0262-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Carlet18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletMTQ18,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {Euclidean and Hermitian {LCD} {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2605--2618},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0463-8},
  doi          = {10.1007/S10623-018-0463-8},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/CarletGOS18,
  author       = {Claude Carlet and
                  Cem G{\"{u}}neri and
                  Ferruh {\"{O}}zbudak and
                  Patrick Sol{\'{e}}},
  title        = {A new concatenated type construction for {LCD} codes and isometry
                  codes},
  journal      = {Discret. Math.},
  volume       = {341},
  number       = {3},
  pages        = {830--835},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.disc.2017.12.004},
  doi          = {10.1016/J.DISC.2017.12.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/CarletGOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/Carlet18,
  author       = {Claude Carlet},
  title        = {Componentwise APNness, Walsh uniformity of {APN} functions, and cyclic-additive
                  difference sets},
  journal      = {Finite Fields Their Appl.},
  volume       = {53},
  pages        = {226--253},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ffa.2018.06.007},
  doi          = {10.1016/J.FFA.2018.06.007},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/Carlet18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/XuCMW18,
  author       = {Yuwei Xu and
                  Claude Carlet and
                  Sihem Mesnager and
                  Chuankun Wu},
  title        = {Classification of Bent Monomials, Constructions of Bent Multinomials
                  and Upper Bounds on the Nonlinearity of Vectorial Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {1},
  pages        = {367--383},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2750663},
  doi          = {10.1109/TIT.2017.2750663},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/XuCMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletC18,
  author       = {Claude Carlet and
                  Xi Chen},
  title        = {Constructing Low-Weight \emph{d}th-Order Correlation-Immune Boolean
                  Functions Through the Fourier-Hadamard Transform},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {4},
  pages        = {2969--2978},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2785775},
  doi          = {10.1109/TIT.2017.2785775},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletMTQP18,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi and
                  Ruud Pellikaan},
  title        = {Linear Codes Over {\(\mathbb{F}\)}\({}_{\mbox{q}}\) Are Equivalent
                  to {LCD} Codes for q{\textgreater}3},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {4},
  pages        = {3010--3017},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2018.2789347},
  doi          = {10.1109/TIT.2018.2789347},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletMTQP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCHLS18,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nian Li and
                  Bo Sun},
  title        = {On Upper Bounds for Algebraic Degrees of {APN} Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {6},
  pages        = {4399--4411},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2757938},
  doi          = {10.1109/TIT.2017.2757938},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCHLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet18,
  author       = {Claude Carlet},
  title        = {Characterizations of the Differential Uniformity of Vectorial Functions
                  by the Walsh Transform},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {9},
  pages        = {6443--6453},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2761392},
  doi          = {10.1109/TIT.2017.2761392},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletGOOS18,
  author       = {Claude Carlet and
                  Cem G{\"{u}}neri and
                  Ferruh {\"{O}}zbudak and
                  Buket {\"{O}}zkaya and
                  Patrick Sol{\'{e}}},
  title        = {On Linear Complementary Pairs of Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {10},
  pages        = {6583--6589},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2018.2796125},
  doi          = {10.1109/TIT.2018.2796125},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletGOOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/PicekKJC18,
  author       = {Stjepan Picek and
                  Karlo Knezevic and
                  Domagoj Jakobovic and
                  Claude Carlet},
  title        = {A Search for Differentially-6 Uniform (n, n-2) Functions},
  booktitle    = {2018 {IEEE} Congress on Evolutionary Computation, {CEC} 2018, Rio
                  de Janeiro, Brazil, July 8-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CEC.2018.8477646},
  doi          = {10.1109/CEC.2018.8477646},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/PicekKJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/CarletGMO18,
  author       = {Claude Carlet and
                  Cem G{\"{u}}neri and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak},
  editor       = {Lilya Budaghyan and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Construction of Some Codes Suitable for Both Side Channel and Fault
                  Injection Attacks},
  booktitle    = {Arithmetic of Finite Fields - 7th International Workshop, {WAIFI}
                  2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11321},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05153-2\_5},
  doi          = {10.1007/978-3-030-05153-2\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/CarletGMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02059,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions of the Fourth International Students' Olympiad
                  in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/1806.02059},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02059},
  eprinttype    = {arXiv},
  eprint       = {1806.02059},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletC18,
  author       = {Claude Carlet and
                  Xi Chen},
  title        = {Constructing low-weight dth-order correlation-immune Boolean functions
                  through the Fourier-Hadamard transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT18,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCCCV18,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Constructing {APN} functions through isotopic shifts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletCQ18,
  author       = {Claude Carlet and
                  Xi Chen and
                  Longjiang Qu},
  title        = {Constructing Infinite Families of Low Differential Uniformity (n,
                  m)-Functions with m{\textgreater}n/2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCHK18,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nikolay S. Kaleyski},
  title        = {Changing Points in {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1217},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletF17,
  author       = {Claude Carlet and
                  Serge Feukoua},
  title        = {Three basic questions on Boolean functions},
  journal      = {Adv. Math. Commun.},
  volume       = {11},
  number       = {4},
  pages        = {837--855},
  year         = {2017},
  url          = {https://doi.org/10.3934/amc.2017061},
  doi          = {10.3934/AMC.2017061},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/TangCZ17,
  author       = {Deng Tang and
                  Claude Carlet and
                  Zhengchun Zhou},
  title        = {Binary linear codes from vectorial boolean functions and their weight
                  distribution},
  journal      = {Discret. Math.},
  volume       = {340},
  number       = {12},
  pages        = {3055--3072},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.disc.2017.07.008},
  doi          = {10.1016/J.DISC.2017.07.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/TangCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BruneauCGHPR17,
  author       = {Nicolas Bruneau and
                  Claude Carlet and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Emmanuel Prouff and
                  Olivier Rioul},
  title        = {Stochastic Collision Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2090--2104},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697401},
  doi          = {10.1109/TIFS.2017.2697401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TangCTZ17,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang and
                  Zhengchun Zhou},
  title        = {Construction of Highly Nonlinear 1-Resilient Boolean Functions With
                  Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {63},
  number       = {9},
  pages        = {6113--6125},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIT.2017.2725918},
  doi          = {10.1109/TIT.2017.2725918},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TangCTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CarletMR17,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux and
                  Yann Rotella},
  title        = {Boolean functions with restricted input and their robustness; application
                  to the {FLIP} cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {192--227},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.192-227},
  doi          = {10.13154/TOSC.V2017.I3.192-227},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CarletMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CarletHP17,
  author       = {Claude Carlet and
                  Annelie Heuser and
                  Stjepan Picek},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel
                  Resilience},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {393--414},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_20},
  doi          = {10.1007/978-3-319-61204-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CarletHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/CarletMOS17,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak and
                  Ahmet Sinak},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Explicit Characterizations for Plateaued-ness of p-ary (Vectorial)
                  Functions},
  booktitle    = {Codes, Cryptology and Information Security - Second International
                  Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
                  - In Honor of Claude Carlet},
  series       = {Lecture Notes in Computer Science},
  volume       = {10194},
  pages        = {328--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55589-8\_22},
  doi          = {10.1007/978-3-319-55589-8\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/CarletMOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PoussierGSCG17,
  author       = {Romain Poussier and
                  Qian Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet and
                  Sylvain Guilley},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Connecting and Improving Direct Sum Masking and Inner Product Masking},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {123--141},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_8},
  doi          = {10.1007/978-3-319-75208-2\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletMTQ17,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {Euclidean and Hermitian {LCD} {MDS} codes},
  journal      = {CoRR},
  volume       = {abs/1702.08033},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.08033},
  eprinttype    = {arXiv},
  eprint       = {1702.08033},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CarletMTQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletMTQ17a,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {Linear codes over Fq which are equivalent to {LCD} codes},
  journal      = {CoRR},
  volume       = {abs/1703.04346},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.04346},
  eprinttype    = {arXiv},
  eprint       = {1703.04346},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CarletMTQ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletMTQ17aa,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {On {\(\sigma\)}-LCD codes},
  journal      = {CoRR},
  volume       = {abs/1707.08789},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08789},
  eprinttype    = {arXiv},
  eprint       = {1707.08789},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CarletMTQ17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-03217,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {New characterization and parametrization of {LCD} Codes},
  journal      = {CoRR},
  volume       = {abs/1709.03217},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.03217},
  eprinttype    = {arXiv},
  eprint       = {1709.03217},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-03217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-03765,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {Characterizations of o-polynomials by the Walsh transform},
  journal      = {CoRR},
  volume       = {abs/1709.03765},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.03765},
  eprinttype    = {arXiv},
  eprint       = {1709.03765},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-03765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletMR17,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux and
                  Yann Rotella},
  title        = {Boolean functions with restricted input and their robustness; application
                  to the {FLIP} cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet17,
  author       = {Claude Carlet},
  title        = {Characterizations of the differential uniformity of vectorial functions
                  by the Walsh transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet17a,
  author       = {Claude Carlet},
  title        = {Componentwise APNness, Walsh uniformity of {APN} functions and cyclic-additive
                  difference sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletP17,
  author       = {Claude Carlet and
                  Stjepan Picek},
  title        = {On the exponents of {APN} power functions and Sidon sets, sum-free
                  sets, and Dickson polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZhangCHZ16,
  author       = {Fengrong Zhang and
                  Claude Carlet and
                  Yupu Hu and
                  Wenzheng Zhang},
  title        = {New secondary constructions of Bent functions},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {27},
  number       = {5},
  pages        = {413--434},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00200-016-0287-6},
  doi          = {10.1007/S00200-016-0287-6},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZhangCHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletG16,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Complementary dual codes for counter-measures to side-channel attacks},
  journal      = {Adv. Math. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {131--150},
  year         = {2016},
  url          = {https://doi.org/10.3934/amc.2016.10.131},
  doi          = {10.3934/AMC.2016.10.131},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletM16,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {Four decades of research on bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {5--50},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0145-8},
  doi          = {10.1007/S10623-015-0145-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletGT16,
  author       = {Claude Carlet and
                  Guang Gong and
                  Yin Tan},
  title        = {Quadratic zero-difference balanced functions, {APN} functions and
                  strongly regular graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {629--654},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0022-x},
  doi          = {10.1007/S10623-014-0022-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ec/PicekCGMJ16,
  author       = {Stjepan Picek and
                  Claude Carlet and
                  Sylvain Guilley and
                  Julian F. Miller and
                  Domagoj Jakobovic},
  title        = {Evolutionary Algorithms for Boolean Functions in Diverse Domains of
                  Cryptography},
  journal      = {Evol. Comput.},
  volume       = {24},
  number       = {4},
  pages        = {667--694},
  year         = {2016},
  url          = {https://doi.org/10.1162/EVCO\_a\_00190},
  doi          = {10.1162/EVCO\_A\_00190},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ec/PicekCGMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletJST16,
  author       = {Claude Carlet and
                  David Joyner and
                  Pantelimon Stanica and
                  Deng Tang},
  title        = {Cryptographic properties of monotone Boolean functions},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {1--14},
  year         = {2016},
  url          = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletJST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanKCH16,
  author       = {Lilya Budaghyan and
                  Alexander Kholosha and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {Univariate Niho Bent Functions From o-Polynomials},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {62},
  number       = {4},
  pages        = {2254--2265},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIT.2016.2530083},
  doi          = {10.1109/TIT.2016.2530083},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanKCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CarletP16,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Polynomial Evaluation and Side Channel Analysis},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {315--341},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_20},
  doi          = {10.1007/978-3-662-49301-4\_20},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CarletP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeauxJSC16,
  author       = {Pierrick M{\'{e}}aux and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {311--343},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_13},
  doi          = {10.1007/978-3-662-49890-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MeauxJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BudaghyanCHL16,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nian Li},
  title        = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree
                  n},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {480--484},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541345},
  doi          = {10.1109/ISIT.2016.7541345},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BudaghyanCHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2016,
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6},
  doi          = {10.1007/978-3-319-49445-6},
  isbn         = {978-3-319-49444-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TangCZ16,
  author       = {Deng Tang and
                  Claude Carlet and
                  Zhengchun Zhou},
  title        = {Binary Linear Codes From Vectorial Boolean Functions and Their Weight
                  Distribution},
  journal      = {CoRR},
  volume       = {abs/1612.04456},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.04456},
  eprinttype    = {arXiv},
  eprint       = {1612.04456},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TangCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet16,
  author       = {Claude Carlet},
  title        = {On the nonlinearity of monotone Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCHL16,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nian Li},
  title        = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree
                  n},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeauxJSC16,
  author       = {Pierrick M{\'{e}}aux and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet},
  title        = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletPRR16,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {Algebraic Decomposition for Probing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletA15,
  author       = {Claude Carlet and
                  Yousuf Alsalami},
  title        = {A new construction of differentially 4-uniform (n, n-1)-functions},
  journal      = {Adv. Math. Commun.},
  volume       = {9},
  number       = {4},
  pages        = {541--565},
  year         = {2015},
  url          = {https://doi.org/10.3934/amc.2015.9.541},
  doi          = {10.3934/AMC.2015.9.541},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CarletF15,
  author       = {Claude Carlet and
                  Pierre{-}Alain Fouque},
  title        = {Guest Editorial},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0115-4},
  doi          = {10.1007/S12095-014-0115-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CarletF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiCZLHS15,
  author       = {Jiao Li and
                  Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu and
                  Jinyong Shan},
  title        = {Two constructions of balanced Boolean functions with optimal algebraic
                  immunity, high nonlinearity and good behavior against fast algebraic
                  attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {2},
  pages        = {279--305},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9949-1},
  doi          = {10.1007/S10623-014-9949-1},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiCZLHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletT15,
  author       = {Claude Carlet and
                  Deng Tang},
  title        = {Enhanced Boolean functions suitable for the filter model of pseudo-random
                  generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {3},
  pages        = {571--587},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9978-9},
  doi          = {10.1007/S10623-014-9978-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TangCT15,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {Differentially 4-uniform bijections by permuting the inverse function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {1},
  pages        = {117--141},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9992-y},
  doi          = {10.1007/S10623-014-9992-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TangCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet15,
  author       = {Claude Carlet},
  title        = {Boolean and Vectorial Plateaued Functions and {APN} Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {11},
  pages        = {6272--6289},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2481384},
  doi          = {10.1109/TIT.2015.2481384},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/Carlet15,
  author       = {Claude Carlet},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {On the Properties of Vectorial Functions with Plateaued Components
                  and Their Consequences on {APN} Functions},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {63--73},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_5},
  doi          = {10.1007/978-3-319-18681-8\_5},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/Carlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarletPRR15,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Algebraic Decomposition for Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {742--763},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_36},
  doi          = {10.1007/978-3-662-47989-6\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Xuan Thuy Ngo and
                  Thibault Porteboeuf and
                  C{\'{e}}dric Tavernier},
  title        = {Optimized linear complementary codes implementation for hardware trojan
                  prevention},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300075},
  doi          = {10.1109/ECCTD.2015.7300075},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/PicekCJMB15,
  author       = {Stjepan Picek and
                  Claude Carlet and
                  Domagoj Jakobovic and
                  Julian F. Miller and
                  Lejla Batina},
  editor       = {Sara Silva and
                  Anna Isabel Esparcia{-}Alc{\'{a}}zar},
  title        = {Correlation Immunity of Boolean Functions: An Evolutionary Algorithms
                  Perspective},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference,
                  {GECCO} 2015, Madrid, Spain, July 11-15, 2015},
  pages        = {1095--1102},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2739480.2754764},
  doi          = {10.1145/2739480.2754764},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/PicekCJMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/Carlet15,
  author       = {Claude Carlet},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers
                  to Cryptographic Attacks, with or without Side Channels},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_10},
  doi          = {10.1007/978-3-319-24126-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/Carlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpnc/PicekGCJM15,
  author       = {Stjepan Picek and
                  Sylvain Guilley and
                  Claude Carlet and
                  Domagoj Jakobovic and
                  Julian F. Miller},
  editor       = {Adrian{-}Horia Dediu and
                  Luis Magdalena and
                  Carlos Mart{\'{\i}}n{-}Vide},
  title        = {Evolutionary Approach for Finding Correlation Immune Boolean Functions
                  of Order t with Minimal Hamming Weight},
  booktitle    = {Theory and Practice of Natural Computing - Fourth International Conference,
                  {TPNC} 2015, Mieres, Spain, December 15-16, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9477},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26841-5\_6},
  doi          = {10.1007/978-3-319-26841-5\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpnc/PicekGCJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/c2si/2015,
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8},
  doi          = {10.1007/978-3-319-18681-8},
  isbn         = {978-3-319-18680-1},
  timestamp    = {Tue, 27 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet15,
  author       = {Claude Carlet},
  title        = {More {PS} and H-like bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletG15,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/WangCST14,
  author       = {Qichun Wang and
                  Claude Carlet and
                  Pantelimon Stanica and
                  Chik How Tan},
  title        = {Cryptographic properties of the hidden weighted bit function},
  journal      = {Discret. Appl. Math.},
  volume       = {174},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dam.2014.01.010},
  doi          = {10.1016/J.DAM.2014.01.010},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/WangCST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletK14,
  author       = {Claude Carlet and
                  Andrew Klapper},
  title        = {On the arithmetic Walsh coefficients of Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {299--318},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9915-3},
  doi          = {10.1007/S10623-013-9915-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/TangCT14,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity
                  and Good Behavior against Fast Algebraic Attacks},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {25},
  number       = {6},
  pages        = {763--780},
  year         = {2014},
  url          = {https://doi.org/10.1142/S0129054114500324},
  doi          = {10.1142/S0129054114500324},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/TangCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangCHC14,
  author       = {Fengrong Zhang and
                  Claude Carlet and
                  Yupu Hu and
                  Tian{-}Jie Cao},
  title        = {Secondary constructions of highly nonlinear Boolean functions and
                  disjoint spectra plateaued functions},
  journal      = {Inf. Sci.},
  volume       = {283},
  pages        = {94--106},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.06.024},
  doi          = {10.1016/J.INS.2014.06.024},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangCHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGMP14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Achieving side-channel high-order correlation immunity with leakage
                  squeezing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {107--121},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0067-1},
  doi          = {10.1007/S13389-013-0067-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletGL14,
  author       = {Claude Carlet and
                  Guangpu Gao and
                  Wenfen Liu},
  title        = {A secondary construction and a transformation on rotation symmetric
                  functions, and their action on bent and semi-bent functions},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {127},
  pages        = {161--175},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jcta.2014.05.008},
  doi          = {10.1016/J.JCTA.2014.05.008},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/CarletGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletDGM14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage squeezing: Optimal implementation and security evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {249--295},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0018},
  doi          = {10.1515/JMC-2012-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletFGKKS14,
  author       = {Claude Carlet and
                  Finley Freibert and
                  Sylvain Guilley and
                  Michael Kiermaier and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Higher-Order {CIS} Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {9},
  pages        = {5283--5295},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2332468},
  doi          = {10.1109/TIT.2014.2332468},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletFGKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcta/CarletG14,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Raquel Pinto and
                  Paula Rocha Malonek and
                  Paolo Vettori},
  title        = {Complementary Dual Codes for Counter-Measures to Side-Channel Attacks},
  booktitle    = {Coding Theory and Applications, 4th International Castle Meeting,
                  {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014},
  series       = {{CIM} Series in Mathematical Sciences},
  volume       = {3},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17296-5\_9},
  doi          = {10.1007/978-3-319-17296-5\_9},
  timestamp    = {Wed, 23 Aug 2017 10:30:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcta/CarletG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BudaghyanKCH14,
  author       = {Lilya Budaghyan and
                  Alexander Kholosha and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {Niho bent functions from quadratic o-monomials},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1827--1831},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875149},
  doi          = {10.1109/ISIT.2014.6875149},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BudaghyanKCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/CarletGL14,
  author       = {Claude Carlet and
                  Guangpu Gao and
                  Wenfen Liu},
  editor       = {Kai{-}Uwe Schmidt and
                  Arne Winterhof},
  title        = {Results on Constructions of Rotation Symmetric Bent and Semi-bent
                  Functions},
  booktitle    = {Sequences and Their Applications - {SETA} 2014 - 8th International
                  Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8865},
  pages        = {21--33},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12325-7\_2},
  doi          = {10.1007/978-3-319-12325-7\_2},
  timestamp    = {Sat, 05 Sep 2020 18:00:18 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/CarletGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/Carlet14,
  author       = {Claude Carlet},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Open Questions on Nonlinearity and on {APN} Functions},
  booktitle    = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  pages        = {83--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16277-5\_5},
  doi          = {10.1007/978-3-319-16277-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/Carlet14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/BudaghyanCHK14,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Alexander Kholosha},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {On o-Equivalence of Niho Bent Functions},
  booktitle    = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16277-5\_9},
  doi          = {10.1007/978-3-319-16277-5\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/BudaghyanCHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_4},
  doi          = {10.1007/978-3-662-43826-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/Carlet14,
  author       = {Claude Carlet},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Open Problems on Binary Bent Functions},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {203--241},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_10},
  doi          = {10.1007/978-3-319-10683-0\_10},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/Carlet14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletFGKKS14,
  author       = {Claude Carlet and
                  Finley Freibert and
                  Sylvain Guilley and
                  Michael Kiermaier and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Higher-order {CIS} codes},
  journal      = {CoRR},
  volume       = {abs/1406.4547},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.4547},
  eprinttype    = {arXiv},
  eprint       = {1406.4547},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarletFGKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletGT14,
  author       = {Claude Carlet and
                  Guang Gong and
                  Yin Tan},
  title        = {Quadratic Zero-Difference Balanced Functions, {APN} Functions and
                  Strongly Regular Graphs},
  journal      = {CoRR},
  volume       = {abs/1410.2903},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.2903},
  eprinttype    = {arXiv},
  eprint       = {1410.2903},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarletGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BudaghyanKCH14,
  author       = {Lilya Budaghyan and
                  Alexander Kholosha and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {Univariate Niho Bent Functions from o-Polynomials},
  journal      = {CoRR},
  volume       = {abs/1411.2394},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.2394},
  eprinttype    = {arXiv},
  eprint       = {1411.2394},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BudaghyanKCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCCGM14a,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletM13,
  author       = {Claude Carlet and
                  Brahim Merabet},
  title        = {Asymptotic lower bound on the algebraic immunity of random balanced
                  multi-output Boolean functions},
  journal      = {Adv. Math. Commun.},
  volume       = {7},
  number       = {2},
  pages        = {197--217},
  year         = {2013},
  url          = {https://doi.org/10.3934/amc.2013.7.197},
  doi          = {10.3934/AMC.2013.7.197},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TangCT13,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {On the second-order nonlinearities of some bent functions},
  journal      = {Inf. Sci.},
  volume       = {223},
  pages        = {322--330},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.08.024},
  doi          = {10.1016/J.INS.2012.08.024},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TangCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TangCT13,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity
                  and Good Behavior Against Fast Algebraic Attacks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {1},
  pages        = {653--664},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2012.2217476},
  doi          = {10.1109/TIT.2012.2217476},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TangCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CarletTTL13,
  author       = {Claude Carlet and
                  Deng Tang and
                  Xiaohu Tang and
                  Qunying Liao},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {New Construction of Differentially 4-Uniform Bijections},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {22--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_2},
  doi          = {10.1007/978-3-319-12087-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CarletTTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CarletG13,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel indistinguishability},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487735},
  doi          = {10.1145/2487726.2487735},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/CarletG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/Carlet13,
  author       = {Claude Carlet},
  editor       = {Benedikt Gierlichs and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  title        = {Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating
                  S-Box Masking against Side Channel Attacks},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - Third International
                  Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8204},
  pages        = {70--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41224-0\_6},
  doi          = {10.1007/978-3-642-41224-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/Carlet13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/13/Carlet13,
  author       = {Claude Carlet},
  editor       = {Gary L. Mullen and
                  Daniel Panario},
  title        = {Boolean functions},
  booktitle    = {Handbook of Finite Fields},
  series       = {Discrete mathematics and its applications},
  pages        = {241--252},
  publisher    = {{CRC} Press},
  year         = {2013},
  timestamp    = {Mon, 08 Jun 2020 15:38:06 +0200},
  biburl       = {https://dblp.org/rec/books/crc/13/Carlet13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinCG13,
  author       = {Shivam Bhasin and
                  Claude Carlet and
                  Sylvain Guilley},
  title        = {Theory of masking with codewords in hardware: low-weight \emph{d}th-order
                  correlation-immune Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangCT13,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {Differentially 4-Uniform Bijections by Permuting the Inverse Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/639},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletKT12,
  author       = {Claude Carlet and
                  Juan Carlos Ku{-}Cauich and
                  Horacio Tapia{-}Recillas},
  title        = {Bent functions on a Galois ring and systematic authentication codes},
  journal      = {Adv. Math. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {249--258},
  year         = {2012},
  url          = {https://doi.org/10.3934/amc.2012.6.249},
  doi          = {10.3934/AMC.2012.6.249},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletZH12,
  author       = {Claude Carlet and
                  Fengrong Zhang and
                  Yupu Hu},
  title        = {Secondary constructions of bent functions and their enforcement},
  journal      = {Adv. Math. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {305--314},
  year         = {2012},
  url          = {https://doi.org/10.3934/amc.2012.6.305},
  doi          = {10.3934/AMC.2012.6.305},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletFGR12,
  author       = {Claude Carlet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Christopher Goyet and
                  Gu{\'{e}}na{\"{e}}l Renault},
  title        = {Analysis of the algebraic side channel attack},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {45--62},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0028-0},
  doi          = {10.1007/S13389-012-0028-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletFGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletM12,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {On Semibent Boolean Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {5},
  pages        = {3287--3292},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2011.2181330},
  doi          = {10.1109/TIT.2011.2181330},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaoZLC12,
  author       = {Guangpu Gao and
                  Xiyong Zhang and
                  Wenfen Liu and
                  Claude Carlet},
  title        = {Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4908--4913},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2193377},
  doi          = {10.1109/TIT.2012.2193377},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GaoZLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletGKS12,
  author       = {Claude Carlet and
                  Philippe Gaborit and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {A New Class of Codes for Boolean Masking of Cryptographic Computations},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {9},
  pages        = {6000--6011},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2200651},
  doi          = {10.1109/TIT.2012.2200651},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletGKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCHKM12,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Alexander Kholosha and
                  Sihem Mesnager},
  title        = {Further Results on Niho Bent Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {11},
  pages        = {6979--6985},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2206557},
  doi          = {10.1109/TIT.2012.2206557},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCHKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PiretRC12,
  author       = {Gilles Piret and
                  Thomas Roche and
                  Claude Carlet},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel
                  Resistance},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_19},
  doi          = {10.1007/978-3-642-31284-7\_19},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PiretRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Optimal First-Order Masking with Linear and Non-linear Bijections},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {360--377},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_22},
  doi          = {10.1007/978-3-642-31410-0\_22},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletGPQR12,
  author       = {Claude Carlet and
                  Louis Goubin and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater and
                  Matthieu Rivain},
  editor       = {Anne Canteaut},
  title        = {Higher-Order Masking Schemes for S-Boxes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {366--384},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_21},
  doi          = {10.1007/978-3-642-34047-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Leakage Squeezing of Order Two},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_8},
  doi          = {10.1007/978-3-642-34931-7\_8},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaim/CarletM12,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {On Dillon's class {H} of Niho bent functions and o-polynomials},
  booktitle    = {International Symposium on Artificial Intelligence and Mathematics,
                  {ISAIM} 2012, Fort Lauderdale, Florida, USA, January 9-11, 2012},
  year         = {2012},
  url          = {http://www.cs.uic.edu/pub/Isaim2012/WebPreferences/ISAIM2012\_Boolean\_Carlet\_Mesnager.pdf},
  timestamp    = {Wed, 20 Mar 2024 17:48:48 +0100},
  biburl       = {https://dblp.org/rec/conf/isaim/CarletM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BudaghyanCHK12,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Alexander Kholosha},
  title        = {Generalized bent functions and their relation to Maiorana-McFarland
                  class},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {1212--1215},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6283049},
  doi          = {10.1109/ISIT.2012.6283049},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BudaghyanCHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-4191,
  author       = {Fengrong Zhang and
                  Claude Carlet and
                  Yupu Hu and
                  Wenzheng Zhang},
  title        = {Secondary Constructions of Bent Functions and Highly Nonlinear Resilient
                  Functions},
  journal      = {CoRR},
  volume       = {abs/1211.4191},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.4191},
  eprinttype    = {arXiv},
  eprint       = {1211.4191},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-4191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Optimal First-Order Masking with Linear and Non-Linear Bijections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiretRC12,
  author       = {Gilles Piret and
                  Thomas Roche and
                  Claude Carlet},
  title        = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel
                  Resistance - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiretRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage Squeezing of Order Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/AubryCLV11,
  author       = {Yves Aubry and
                  Claude Carlet and
                  Philippe Langevin and
                  Pascal V{\'{e}}ron},
  title        = {Guest editorial for the special issue for Jacques Wolfmann},
  journal      = {Cryptogr. Commun.},
  volume       = {3},
  number       = {4},
  pages        = {187--188},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12095-011-0056-0},
  doi          = {10.1007/S12095-011-0056-0},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/AubryCLV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BudaghyanC11,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {CCZ-equivalence of bent vectorial functions and related constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {59},
  number       = {1-3},
  pages        = {69--87},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9466-9},
  doi          = {10.1007/S10623-010-9466-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BudaghyanC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet11,
  author       = {Claude Carlet},
  title        = {Relating three nonlinearity parameters of vectorial functions and
                  building {APN} functions from bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {59},
  number       = {1-3},
  pages        = {89--109},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9468-7},
  doi          = {10.1007/S10623-010-9468-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/Carlet11,
  author       = {Claude Carlet},
  title        = {More Vectorial Boolean Functions with Unbounded nonlinearity Profile},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {22},
  number       = {6},
  pages        = {1259--1269},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0129054111008696},
  doi          = {10.1142/S0129054111008696},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletM11,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {On Dillon's class {H} of bent functions, Niho bent functions and o-polynomials},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {118},
  number       = {8},
  pages        = {2392--2410},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jcta.2011.06.005},
  doi          = {10.1016/J.JCTA.2011.06.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/CarletM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet11,
  author       = {Claude Carlet},
  title        = {Comments on "Constructions of Cryptographically Significant Boolean
                  Functions Using Primitive Polynomials"},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {7},
  pages        = {4852--4853},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2146170},
  doi          = {10.1109/TIT.2011.2146170},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZengCSH11,
  author       = {Xiangyong Zeng and
                  Claude Carlet and
                  Jinyong Shan and
                  Lei Hu},
  title        = {More Balanced Boolean Functions With Optimal Algebraic Immunity and
                  Good Nonlinearity and Resistance to Fast Algebraic Attacks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {9},
  pages        = {6310--6320},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2109935},
  doi          = {10.1109/TIT.2011.2109935},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZengCSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Carlet11,
  author       = {Claude Carlet},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {On Known and New Differentially Uniform Functions},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_1},
  doi          = {10.1007/978-3-642-22497-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletHKM11,
  author       = {Claude Carlet and
                  Tor Helleseth and
                  Alexander Kholosha and
                  Sihem Mesnager},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {On the dual of bent functions with 2\({}^{\mbox{r}}\) Niho exponents},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {703--707},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6034224},
  doi          = {10.1109/ISIT.2011.6034224},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CarletHKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/BudaghyanCH11,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth},
  title        = {On bent functions associated to {AB} functions},
  booktitle    = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
                  October 16-20, 2011},
  pages        = {150--154},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITW.2011.6089365},
  doi          = {10.1109/ITW.2011.6089365},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/BudaghyanCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet11,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Algebraic Immunity of Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {31--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_333},
  doi          = {10.1007/978-1-4419-5906-5\_333},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet11a,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {162--165},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_336},
  doi          = {10.1007/978-1-4419-5906-5\_336},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet11b,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Correlation Immune and Resilient Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {262--264},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_340},
  doi          = {10.1007/978-1-4419-5906-5\_340},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet11c,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Nonlinearity of Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {848--849},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_362},
  doi          = {10.1007/978-1-4419-5906-5\_362},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet11d,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Propagation Characteristics of Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {986--987},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_363},
  doi          = {10.1007/978-1-4419-5906-5\_363},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1193,
  author       = {Claude Carlet and
                  Philippe Gaborit and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {A new class of codes for Boolean masking of cryptographic computations},
  journal      = {CoRR},
  volume       = {abs/1110.1193},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.1193},
  eprinttype    = {arXiv},
  eprint       = {1110.1193},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-1193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangCT11,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity
                  and Good Behavior Against Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghebiGCD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger},
  title        = {Classification of High-Order Boolean Masking Schemes and Improvements
                  of their Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijicot/CarletM10,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {On the construction of bent vectorial functions},
  journal      = {Int. J. Inf. Coding Theory},
  volume       = {1},
  number       = {2},
  pages        = {133--148},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICOT.2010.032131},
  doi          = {10.1504/IJICOT.2010.032131},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijicot/CarletM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijicot/CarletDPS10,
  author       = {Claude Carlet and
                  Lars Eirik Danielsen and
                  Matthew Geoffrey Parker and
                  Patrick Sol{\'{e}}},
  title        = {Self-dual bent functions},
  journal      = {Int. J. Inf. Coding Theory},
  volume       = {1},
  number       = {4},
  pages        = {384--399},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICOT.2010.032864},
  doi          = {10.1504/IJICOT.2010.032864},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijicot/CarletDPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/cu/10/CarletCH10,
  author       = {Claude Carlet and
                  Yves Crama and
                  Peter L. Hammer},
  editor       = {Yves Crama and
                  Peter L. Hammer},
  title        = {Boolean Functions for Cryptography and Error-Correcting Codes},
  booktitle    = {Boolean Models and Methods in Mathematics, Computer Science, and Engineering},
  pages        = {257--397},
  publisher    = {Cambridge University Press},
  year         = {2010},
  url          = {https://doi.org/10.1017/cbo9780511780448.011},
  doi          = {10.1017/CBO9780511780448.011},
  timestamp    = {Mon, 16 Sep 2019 14:43:07 +0200},
  biburl       = {https://dblp.org/rec/books/cu/10/CarletCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/cu/10/CarletCH10a,
  author       = {Claude Carlet and
                  Yves Crama and
                  Peter L. Hammer},
  editor       = {Yves Crama and
                  Peter L. Hammer},
  title        = {Vectorial Boolean Functions for Cryptography},
  booktitle    = {Boolean Models and Methods in Mathematics, Computer Science, and Engineering},
  pages        = {398--470},
  publisher    = {Cambridge University Press},
  year         = {2010},
  url          = {https://doi.org/10.1017/cbo9780511780448.012},
  doi          = {10.1017/CBO9780511780448.012},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/cu/10/CarletCH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/seta/2010,
  editor       = {Claude Carlet and
                  Alexander Pott},
  title        = {Sequences and Their Applications - {SETA} 2010 - 6th International
                  Conference, Paris, France, September 13-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6338},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15874-2},
  doi          = {10.1007/978-3-642-15874-2},
  isbn         = {978-3-642-15873-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM10,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {A {NOTE} {ON} {SEMI-BENT} {BOOLEAN} {FUNCTIONS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengCSH10,
  author       = {Xiangyong Zeng and
                  Claude Carlet and
                  Jinyong Shan and
                  Lei Hu},
  title        = {Balanced Boolean Functions with Optimum Algebraic Immunity and High
                  Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM10a,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {{ON} DILLON'S {CLASS} {H} {OF} {BENT} FUNCTIONS, {NIHO} {BENT} {FUNCTIONS}
                  {AND} {O-POLYNOMIALS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Carlet09,
  author       = {Claude Carlet},
  title        = {Editorial: Cryptography and Communications, Volume 1, Issue 1},
  journal      = {Cryptogr. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12095-009-0010-6},
  doi          = {10.1007/S12095-009-0010-6},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Carlet09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletZLH09,
  author       = {Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu},
  title        = {Further properties of several classes of Boolean functions with optimum
                  algebraic immunity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {52},
  number       = {3},
  pages        = {303--338},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-009-9284-0},
  doi          = {10.1007/S10623-009-9284-0},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletZLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/BudaghyanCL09,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Constructing new {APN} functions from known ones},
  journal      = {Finite Fields Their Appl.},
  volume       = {15},
  number       = {2},
  pages        = {150--159},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ffa.2008.10.001},
  doi          = {10.1016/J.FFA.2008.10.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/BudaghyanCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Carlet09,
  author       = {Claude Carlet},
  title        = {On the Higher Order Nonlinearities of Boolean Functions and S-boxes},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {768},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.31},
  doi          = {10.1109/ARES.2009.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Carlet09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/CarletF09,
  author       = {Claude Carlet and
                  Keqin Feng},
  editor       = {Yeow Meng Chee and
                  Chao Li and
                  San Ling and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {An Infinite Class of Balanced Vectorial Boolean Functions with Optimum
                  Algebraic Immunity and Good Nonlinearity},
  booktitle    = {Coding and Cryptology, Second International Workshop, {IWCC} 2009,
                  Zhangjiajie, China, June 1-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5557},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01877-0\_1},
  doi          = {10.1007/978-3-642-01877-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/CarletF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/Carlet09,
  author       = {Claude Carlet},
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial
                  Boolean Functions},
  booktitle    = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  pages        = {104--116},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-002-5-104},
  doi          = {10.3233/978-1-60750-002-5-104},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/Carlet09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanC09,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {On CCZ-equivalence and its use in secondary constructions of bent
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanC09a,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {CCZ-equivalence and Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanC09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet09,
  author       = {Claude Carlet},
  title        = {On the nonlinearity profile of the Dillon function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet09a,
  author       = {Claude Carlet},
  title        = {On a weakness of the Tu-Deng function and its repair},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletKLL08,
  author       = {Claude Carlet and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Chuan{-}Wen Loe},
  title        = {On an improved correlation analysis of stream ciphers using multi-output
                  Boolean functions and the related generalized notion of nonlinearity},
  journal      = {Adv. Math. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {201--221},
  year         = {2008},
  url          = {https://doi.org/10.3934/amc.2008.2.201},
  doi          = {10.3934/AMC.2008.2.201},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletKLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Carlet08,
  author       = {Claude Carlet},
  title        = {On Almost Perfect Nonlinear Functions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {12},
  pages        = {3665--3678},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.12.3665},
  doi          = {10.1093/IETFEC/E91-A.12.3665},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Carlet08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet08,
  author       = {Claude Carlet},
  title        = {Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions
                  and Their Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {3},
  pages        = {1262--1272},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2007.915704},
  doi          = {10.1109/TIT.2007.915704},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanC08,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related
                  Structures},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {5},
  pages        = {2354--2357},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.920246},
  doi          = {10.1109/TIT.2008.920246},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCL08,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Two Classes of Quadratic {APN} Binomials Inequivalent to Power Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {9},
  pages        = {4218--4229},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.928275},
  doi          = {10.1109/TIT.2008.928275},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CarletF08,
  author       = {Claude Carlet and
                  Keqin Feng},
  editor       = {Josef Pieprzyk},
  title        = {An Infinite Class of Balanced Functions with Optimal Algebraic Immunity,
                  Good Immunity to Fast Algebraic Attacks and Good Nonlinearity},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {425--440},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_26},
  doi          = {10.1007/978-3-540-89255-7\_26},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CarletF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Carlet08,
  author       = {Claude Carlet},
  title        = {Lower bounds on the higher order nonlinearities of Boolean functions
                  and their applications to the inverse function},
  booktitle    = {2008 {IEEE} Information Theory Workshop, {ITW} 2008, Porto, Portugal,
                  May 5-9, 2008},
  pages        = {333--337},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITW.2008.4578680},
  doi          = {10.1109/ITW.2008.4578680},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Carlet08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/Carlet08,
  author       = {Claude Carlet},
  editor       = {Solomon W. Golomb and
                  Matthew Geoffrey Parker and
                  Alexander Pott and
                  Arne Winterhof},
  title        = {On the Higher Order Nonlinearities of Boolean Functions and S-Boxes,
                  and Their Generalizations},
  booktitle    = {Sequences and Their Applications - {SETA} 2008, 5th International
                  Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5203},
  pages        = {345--367},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85912-3\_31},
  doi          = {10.1007/978-3-540-85912-3\_31},
  timestamp    = {Wed, 01 Sep 2021 10:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/Carlet08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletF08,
  author       = {Claude Carlet and
                  Keqin Feng},
  title        = {New balanced Boolean functions satisfying all the main cryptographic
                  criteria},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/CarletD07,
  author       = {Claude Carlet and
                  Cunsheng Ding},
  title        = {Nonlinearities of S-boxes},
  journal      = {Finite Fields Their Appl.},
  volume       = {13},
  number       = {1},
  pages        = {121--135},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ffa.2005.07.003},
  doi          = {10.1016/J.FFA.2005.07.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/CarletD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletM07,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller
                  Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {1},
  pages        = {162--173},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2006.887494},
  doi          = {10.1109/TIT.2006.887494},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletKLL07,
  author       = {Claude Carlet and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Chuan{-}Wen Loe},
  editor       = {Alex Biryukov},
  title        = {Generalized Correlation Analysis of Vectorial Boolean Functions},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {382--398},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_24},
  doi          = {10.1007/978-3-540-74619-5\_24},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/CarletKLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Carlet07,
  author       = {Claude Carlet},
  title        = {Constructing balanced functions with optimum algebraic immunity},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {451--455},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557094},
  doi          = {10.1109/ISIT.2007.4557094},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Carlet07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2007,
  editor       = {Claude Carlet and
                  Berk Sunar},
  title        = {Arithmetic of Finite Fields, First International Workshop, {WAIFI}
                  2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4547},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73074-3},
  doi          = {10.1007/978-3-540-73074-3},
  isbn         = {978-3-540-73073-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL07,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Constructing new {APN} functions from known ones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanC07,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletKLL07,
  author       = {Claude Carlet and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Chuan{-}Wen Loe},
  title        = {On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output
                  Boolean Functions and the Related Generalized Notion of Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletKLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletZLH07,
  author       = {Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu},
  title        = {Further Properties of Several Classes of Boolean Functions with Optimum
                  Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletDN06,
  author       = {Claude Carlet and
                  Cunsheng Ding and
                  Harald Niederreiter},
  title        = {Authentication Schemes from Highly Nonlinear Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {40},
  number       = {1},
  pages        = {71--79},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6407-0},
  doi          = {10.1007/S10623-005-6407-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletG06,
  author       = {Claude Carlet and
                  Philippe Gaborit},
  title        = {Hyper-bent functions and cyclic codes},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {113},
  number       = {3},
  pages        = {466--482},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jcta.2005.04.008},
  doi          = {10.1016/J.JCTA.2005.04.008},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/CarletG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/DobbertinLCCFG06,
  author       = {Hans Dobbertin and
                  Gregor Leander and
                  Anne Canteaut and
                  Claude Carlet and
                  Patrick Felke and
                  Philippe Gaborit},
  title        = {Construction of bent functions via Niho power functions},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {113},
  number       = {5},
  pages        = {779--798},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jcta.2005.07.009},
  doi          = {10.1016/J.JCTA.2005.07.009},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/DobbertinLCCFG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YuanCD06,
  author       = {Jin Yuan and
                  Claude Carlet and
                  Cunsheng Ding},
  title        = {The weight distribution of a class of linear codes from perfect nonlinear
                  functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {2},
  pages        = {712--717},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2005.862125},
  doi          = {10.1109/TIT.2005.862125},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YuanCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BudaghyanCP06,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Alexander Pott},
  title        = {New classes of almost bent and almost perfect nonlinear polynomials},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {3},
  pages        = {1141--1152},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2005.864481},
  doi          = {10.1109/TIT.2005.864481},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BudaghyanCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletDGM06,
  author       = {Claude Carlet and
                  Deepak Kumar Dalai and
                  Kishan Chand Gupta and
                  Subhamoy Maitra},
  title        = {Algebraic Immunity for Cryptographically Significant Boolean Functions:
                  Analysis and Construction},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {7},
  pages        = {3105--3121},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.876253},
  doi          = {10.1109/TIT.2006.876253},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletDGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/Carlet06,
  author       = {Claude Carlet},
  editor       = {Marc P. C. Fossorier and
                  Hideki Imai and
                  Shu Lin and
                  Alain Poli},
  title        = {On Bent and Highly Nonlinear Balanced/Resilient Functions and Their
                  Algebraic Immunities},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  16th International Symposium, AAECC-16, Las Vegas, NV, USA, February
                  20-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3857},
  pages        = {1--28},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11617983\_1},
  doi          = {10.1007/11617983\_1},
  timestamp    = {Thu, 10 Sep 2020 17:39:08 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/Carlet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Carlet06,
  author       = {Claude Carlet},
  editor       = {Cynthia Dwork},
  title        = {On the Higher Order Nonlinearities of Algebraic Immune Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {584--601},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_35},
  doi          = {10.1007/11818175\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Carlet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06,
  author       = {Frederik Armknecht and
                  Claude Carlet and
                  Philippe Gaborit and
                  Simon K{\"{u}}nzli and
                  Willi Meier and
                  Olivier Ruatta},
  editor       = {Serge Vaudenay},
  title        = {Efficient Computation of Algebraic Immunity for Algebraic and Fast
                  Algebraic Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_10},
  doi          = {10.1007/11761679\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ArmknechtCGKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletDM06,
  author       = {Claude Carlet and
                  Deepak Kumar Dalai and
                  Subhamoy Maitra},
  title        = {Cryptographic Properties and Structure of Boolean Functions with Full
                  Algebraic Immunity},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {734--738},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261629},
  doi          = {10.1109/ISIT.2006.261629},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/CarletDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletDN06,
  author       = {Claude Carlet and
                  Cunsheng Ding and
                  Harald Niederreiter},
  title        = {Authentication Schemes from Highly Nonlinear Functions},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {739--743},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261630},
  doi          = {10.1109/ISIT.2006.261630},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/CarletDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BudaghyanCFL06,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Patrick Felke and
                  Gregor Leander},
  title        = {An infinite class of quadratic {APN} functions which are not equivalent
                  to power mappings},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {2637--2641},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.262131},
  doi          = {10.1109/ISIT.2006.262131},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BudaghyanCFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/CarletGM06,
  author       = {Claude Carlet and
                  Philippe Guillot and
                  Sihem Mesnager},
  editor       = {Guang Gong and
                  Tor Helleseth and
                  Hong{-}Yeop Song and
                  Kyeongcheol Yang},
  title        = {On Immunity Profile of Boolean Functions},
  booktitle    = {Sequences and Their Applications - {SETA} 2006, 4th International
                  Conference, Beijing, China, September 24-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4086},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863854\_32},
  doi          = {10.1007/11863854\_32},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/CarletGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Carlet06,
  author       = {Claude Carlet},
  editor       = {Matthias Krause and
                  Pavel Pudl{\'{a}}k and
                  R{\"{u}}diger Reischuk and
                  Dieter van Melkebeek},
  title        = {The complexity of Boolean functions from cryptographic viewpoint},
  booktitle    = {Complexity of Boolean Functions, 12.03. - 17.03.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06111},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/604},
  timestamp    = {Thu, 10 Jun 2021 13:02:07 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Carlet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet06,
  author       = {Claude Carlet},
  title        = {A method of construction of balanced functions with optimum algebraic
                  immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL06,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Another class of quadratic {APN} binomials over F\({}_{\mbox{2\({}^{\mbox{n}}\)}}\):
                  the case n divisible by 4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL06a,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {A class of quadratic {APN} binomials inequivalent to power functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet06a,
  author       = {Claude Carlet},
  title        = {Recursive lower bounds on the nonlinearity profile of Boolean functions
                  and their applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet05,
  author       = {Claude Carlet},
  title        = {Concatenating Indicators of Flats for Designing Cryptographic Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {189--202},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1704-6},
  doi          = {10.1007/S10623-004-1704-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletY05,
  author       = {Claude Carlet and
                  Joseph L. Yucas},
  title        = {Piecewise Constructions of Bent and Almost Optimal Boolean Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {37},
  number       = {3},
  pages        = {449--464},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-005-4036-2},
  doi          = {10.1007/S10623-005-4036-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletC05,
  author       = {Claude Carlet and
                  Pascale Charpin},
  title        = {Cubic Boolean functions with highest resiliency},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {2},
  pages        = {562--571},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.840902},
  doi          = {10.1109/TIT.2004.840902},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletDY05,
  author       = {Claude Carlet and
                  Cunsheng Ding and
                  Jin Yuan},
  title        = {Linear codes from perfect nonlinear mappings and their secret sharing
                  schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {6},
  pages        = {2089--2102},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.847722},
  doi          = {10.1109/TIT.2005.847722},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletDY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Carlet05,
  author       = {Claude Carlet},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {On Highly Nonlinear S-Boxes and Their Inability to Thwart {DPA} Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {49--62},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_5},
  doi          = {10.1007/11596219\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletM05,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {Improving the upper bounds on the covering radii of Reed-Muller codes},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {795--799},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523446},
  doi          = {10.1109/ISIT.2005.1523446},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CarletM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Carlet05,
  author       = {Claude Carlet},
  title        = {Designing bent functions and resilient functions from known ones,
                  without extending their number of variables},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1096--1100},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523509},
  doi          = {10.1109/ISIT.2005.1523509},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletG05,
  author       = {Claude Carlet and
                  Philippe Gaborit},
  title        = {On the construction of balanced boolean functions with a good algebraic
                  immunity},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1101--1105},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523510},
  doi          = {10.1109/ISIT.2005.1523510},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/CarletG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet05,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg},
  title        = {Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_40},
  doi          = {10.1007/0-387-23483-7\_40},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet05a,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg},
  title        = {Correlation Immune and Resilient Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_81},
  doi          = {10.1007/0-387-23483-7\_81},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet05b,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg},
  title        = {Nonlinearity of Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_275},
  doi          = {10.1007/0-387-23483-7\_275},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Carlet05c,
  author       = {Claude Carlet},
  editor       = {Henk C. A. van Tilborg},
  title        = {Propagation Characteristics of Boolean Functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_322},
  doi          = {10.1007/0-387-23483-7\_322},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Carlet05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCFL05,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Patrick Felke and
                  Gregor Leander},
  title        = {An infinite class of quadratic {APN} functions which are not equivalent
                  to power mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCFL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet05,
  author       = {Claude Carlet},
  title        = {On highly nonlinear S-boxes and their inability to thwart {DPA} attacks
                  (completed version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet05a,
  author       = {Claude Carlet},
  title        = {A lower bound on the higher order nonlinearity of algebraic immune
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/Carlet04,
  author       = {Claude Carlet},
  title        = {On the confusion and diffusion properties of Maiorana-McFarland's
                  and extended Maiorana-McFarland's functions},
  journal      = {J. Complex.},
  volume       = {20},
  number       = {2-3},
  pages        = {182--204},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jco.2003.08.013},
  doi          = {10.1016/J.JCO.2003.08.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/Carlet04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/CarletD04,
  author       = {Claude Carlet and
                  Cunsheng Ding},
  title        = {Highly nonlinear mappings},
  journal      = {J. Complex.},
  volume       = {20},
  number       = {2-3},
  pages        = {205--244},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jco.2003.08.008},
  doi          = {10.1016/J.JCO.2003.08.008},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/CarletD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KlapperC04,
  author       = {Andrew Klapper and
                  Claude Carlet},
  title        = {Spectral methods for cross correlations of geometric sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {1},
  pages        = {229--232},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2003.821982},
  doi          = {10.1109/TIT.2003.821982},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KlapperC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet04,
  author       = {Claude Carlet},
  title        = {On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality
                  of Boolean Functions, With Developments on Symmetric Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {9},
  pages        = {2178--2185},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.833361},
  doi          = {10.1109/TIT.2004.833361},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletDL04,
  author       = {Claude Carlet and
                  Hans Dobbertin and
                  Gregor Leander},
  title        = {Normal Extensions of Bent Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {11},
  pages        = {2880--2885},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.836681},
  doi          = {10.1109/TIT.2004.836681},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierPC04,
  author       = {Willi Meier and
                  Enes Pasalic and
                  Claude Carlet},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Algebraic Attacks and Decomposition of Boolean Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {474--491},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_28},
  doi          = {10.1007/978-3-540-24676-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MeierPC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletG04,
  author       = {Claude Carlet and
                  Pascale Gaborit},
  title        = {Hyper-bent functions and cyclic codes},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {497},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365534},
  doi          = {10.1109/ISIT.2004.1365534},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CarletG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CarletC04,
  author       = {Claude Carlet and
                  Philippe Charpin},
  title        = {Cubic Boolean functions with highest resiliency},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {499},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365535},
  doi          = {10.1109/ISIT.2004.1365535},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/CarletC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Carlet04,
  author       = {Claude Carlet},
  title        = {On the secondary constructions of resilient functions},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {545},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365584},
  doi          = {10.1109/ISIT.2004.1365584},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Carlet04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM04,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {On the supports of the Walsh transforms of Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet04,
  author       = {Claude Carlet},
  title        = {Improving the algebraic immunity of resilient and nonlinear functions
                  and constructing bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/Carlet03,
  author       = {Claude Carlet},
  title        = {Preface},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {1},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00431-6},
  doi          = {10.1016/S0166-218X(02)00431-6},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/Carlet03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fq/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Gary L. Mullen and
                  Alain Poli and
                  Henning Stichtenoth},
  title        = {Vectorial Functions and Covering Sequences},
  booktitle    = {Finite Fields and Applications, 7th International Conference, Fq7,
                  Toulouse, France, May 5-9, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2948},
  pages        = {215--248},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24633-6\_17},
  doi          = {10.1007/978-3-540-24633-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fq/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Thomas Johansson},
  title        = {On Plateaued Functions and Their Constructions},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_6},
  doi          = {10.1007/978-3-540-39887-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Carlet03,
  author       = {Claude Carlet},
  title        = {On the algebraic thickness and non-normality of Boolean functions},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {147--150},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216716},
  doi          = {10.1109/ITW.2003.1216716},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Carlet03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random
                  Generators},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {291--305},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_21},
  doi          = {10.1007/978-3-540-24654-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletT02,
  author       = {Claude Carlet and
                  Yuriy V. Tarannikov},
  title        = {Covering Sequences of Boolean Functions and Their Cryptographic Significance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {25},
  number       = {3},
  pages        = {263--279},
  year         = {2002},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CarletG02,
  author       = {Claude Carlet and
                  Aline Gouget},
  editor       = {Yuliang Zheng},
  title        = {An Upper Bound on the Number of m-Resilient Boolean Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {484--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_30},
  doi          = {10.1007/3-540-36178-2\_30},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CarletG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Carlet02,
  author       = {Claude Carlet},
  editor       = {Moti Yung},
  title        = {A Larger Class of Cryptographic Boolean Functions via a Study of the
                  Maiorana-McFarland Construction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {549--564},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_35},
  doi          = {10.1007/3-540-45708-9\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Carlet02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/Carlet01,
  author       = {Claude Carlet},
  title        = {Foreword},
  journal      = {Discret. Appl. Math.},
  volume       = {111},
  number       = {1-2},
  pages        = {1},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0166-218X(00)00340-1},
  doi          = {10.1016/S0166-218X(00)00340-1},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/Carlet01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/AugotC01,
  author       = {Daniel Augot and
                  Claude Carlet},
  title        = {Preface: Volume 6},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {556--557},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(05)80005-8},
  doi          = {10.1016/S1571-0653(05)80005-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/AugotC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CanteautCCF01,
  author       = {Anne Canteaut and
                  Claude Carlet and
                  Pascale Charpin and
                  Caroline Fontaine},
  title        = {On cryptographic properties of the cosets of R(1, m)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {47},
  number       = {4},
  pages        = {1494--1513},
  year         = {2001},
  url          = {https://doi.org/10.1109/18.923730},
  doi          = {10.1109/18.923730},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CanteautCCF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/Carlet01,
  author       = {Claude Carlet},
  editor       = {Tor Helleseth and
                  P. Vijay Kumar and
                  Kyeongcheol Yang},
  title        = {On the Coset Weight Divisibility and Nonlinearity of Resilient and
                  Correlation-Immune Functions},
  booktitle    = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen,
                  Norway, May 13-17, 2001},
  series       = {Discrete Mathematics and Theoretical Computer Science},
  pages        = {131--144},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4471-0673-9\_9},
  doi          = {10.1007/978-1-4471-0673-9\_9},
  timestamp    = {Tue, 25 Jun 2019 15:57:55 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/Carlet01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanteautCCF00,
  author       = {Anne Canteaut and
                  Claude Carlet and
                  Pascale Charpin and
                  Caroline Fontaine},
  editor       = {Bart Preneel},
  title        = {Propagation Characteristics and Correlation-Immunity of Highly Nonlinear
                  Boolean Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {507--522},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_36},
  doi          = {10.1007/3-540-45539-6\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanteautCCF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Carlet99,
  author       = {Claude Carlet},
  title        = {On Cryptographic Propagation Criteria for Boolean Functions},
  journal      = {Inf. Comput.},
  volume       = {151},
  number       = {1-2},
  pages        = {32--56},
  year         = {1999},
  url          = {https://doi.org/10.1006/inco.1998.2763},
  doi          = {10.1006/INCO.1998.2763},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Carlet99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/CarletG99,
  author       = {Claude Carlet and
                  Philippe Guillot},
  editor       = {Marc P. C. Fossorier and
                  Hideki Imai and
                  Shu Lin and
                  Alain Poli},
  title        = {A New Representation of Boolean Functions},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November
                  15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1719},
  pages        = {94--103},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46796-3\_10},
  doi          = {10.1007/3-540-46796-3\_10},
  timestamp    = {Thu, 10 Sep 2020 17:39:08 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/CarletG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/CarletG99,
  author       = {Claude Carlet and
                  Philippe Guillot},
  editor       = {Alexander Barg and
                  Simon Litsyn},
  title        = {Bent, resilient functions and the numerical normal form},
  booktitle    = {Codes and Association Schemes, Proceedings of a {DIMACS} Workshop,
                  Piscataway, New Jersey, USA, November 9-12, 1999},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {56},
  pages        = {87--96},
  publisher    = {{DIMACS/AMS}},
  year         = {1999},
  url          = {https://doi.org/10.1090/dimacs/056/06},
  doi          = {10.1090/DIMACS/056/06},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/CarletG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletG98,
  author       = {Claude Carlet and
                  Philippe Guillot},
  title        = {An Alternate Characterization of the Bentness of Binary Functions,
                  with Uniqueness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {2},
  pages        = {133--140},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008283912025},
  doi          = {10.1023/A:1008283912025},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletCZ98,
  author       = {Claude Carlet and
                  Pascale Charpin and
                  Victor A. Zinoviev},
  title        = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {15},
  number       = {2},
  pages        = {125--156},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008344232130},
  doi          = {10.1023/A:1008344232130},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletCZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet98,
  author       = {Claude Carlet},
  title        = {Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)-Linear Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {4},
  pages        = {1543--1547},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.681328},
  doi          = {10.1109/18.681328},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Carlet98,
  author       = {Claude Carlet},
  editor       = {Kaisa Nyberg},
  title        = {On the Propagation Criterion of Degree l and Order k},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {462--474},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054146},
  doi          = {10.1007/BFB0054146},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Carlet98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Carlet97,
  author       = {Claude Carlet},
  editor       = {Walter Fumy},
  title        = {More Correlation-Immune and Resilient Functions over Galois Fields
                  and Galois Rings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {422--433},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_29},
  doi          = {10.1007/3-540-69053-0\_29},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Carlet97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletG96,
  author       = {Claude Carlet and
                  Philippe Guillot},
  title        = {A Characterization of Binary Bent Functions},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {76},
  number       = {2},
  pages        = {328--335},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0110},
  doi          = {10.1006/JCTA.1996.0110},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/CarletG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet95,
  author       = {Claude Carlet},
  title        = {Generalized partial spreads},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {41},
  number       = {5},
  pages        = {1482--1487},
  year         = {1995},
  url          = {https://doi.org/10.1109/18.412693},
  doi          = {10.1109/18.412693},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Carlet95a,
  author       = {Claude Carlet},
  title        = {On Z\({}_{\mbox{4}}\)-duality},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {41},
  number       = {5},
  pages        = {1487--1494},
  year         = {1995},
  url          = {https://doi.org/10.1109/18.412694},
  doi          = {10.1109/18.412694},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Carlet95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/Carlet94,
  author       = {Claude Carlet},
  title        = {The Divisors of x\({}^{\mbox{2}}\)m+x of Constant Derivatives and
                  Degree 2\({}^{\mbox{m}}\)-2},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {7},
  number       = {2},
  pages        = {238--244},
  year         = {1994},
  url          = {https://doi.org/10.1137/S0895480192229133},
  doi          = {10.1137/S0895480192229133},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/Carlet94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletSZ94,
  author       = {Claude Carlet and
                  Jennifer Seberry and
                  Xian{-}Mo Zhang},
  title        = {Comments on 'Generating and counting binary Bent sequences'},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {40},
  number       = {2},
  pages        = {600},
  year         = {1994},
  url          = {https://doi.org/10.1109/18.312194},
  doi          = {10.1109/18.312194},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletSZ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet93,
  author       = {Claude Carlet},
  title        = {Partially-Bent Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {135--145},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388412},
  doi          = {10.1007/BF01388412},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet93a,
  author       = {Claude Carlet},
  title        = {The Automorphism Groups of the Delsarte-Goethals Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {237--249},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01388485},
  doi          = {10.1007/BF01388485},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/Carlet93,
  author       = {Claude Carlet},
  title        = {A general case of normal duality between binary nonlinear codes},
  journal      = {Discret. Math.},
  volume       = {111},
  number       = {1-3},
  pages        = {77--85},
  year         = {1993},
  url          = {https://doi.org/10.1016/0012-365X(93)90143-H},
  doi          = {10.1016/0012-365X(93)90143-H},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/Carlet93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Carlet93,
  author       = {Claude Carlet},
  editor       = {Tor Helleseth},
  title        = {Two New Classes of Bent Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {77--101},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_8},
  doi          = {10.1007/3-540-48285-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Carlet93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Carlet92,
  author       = {Claude Carlet},
  editor       = {Ernest F. Brickell},
  title        = {Partially-Bent Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {280--291},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_19},
  doi          = {10.1007/3-540-48071-4\_19},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Carlet92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamionCCS91,
  author       = {Paul Camion and
                  Claude Carlet and
                  Pascale Charpin and
                  Nicolas Sendrier},
  editor       = {Joan Feigenbaum},
  title        = {On Correlation-Immune Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_6},
  doi          = {10.1007/3-540-46766-1\_6},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamionCCS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocode/Carlet90,
  author       = {Claude Carlet},
  editor       = {G{\'{e}}rard D. Cohen and
                  Pascale Charpin},
  title        = {A transformation of boolean functions, its consequences on some problems
                  related to Reed-Muller codes},
  booktitle    = {{EUROCODE} '90, International Symposium on Coding Theory and Applications,
                  Udine, Italy, November 5-9, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {514},
  pages        = {42--50},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-54303-1\_116},
  doi          = {10.1007/3-540-54303-1\_116},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocode/Carlet90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coding/Carlet88,
  author       = {Claude Carlet},
  editor       = {G{\'{e}}rard D. Cohen and
                  Jacques Wolfmann},
  title        = {A simple description of Kerdock codes},
  booktitle    = {Coding Theory and Applications, 3rd International Colloquium, Toulon,
                  France, November 2-4, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {388},
  pages        = {202--208},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0019858},
  doi          = {10.1007/BFB0019858},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/coding/Carlet88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics