Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Claude Carlet
@article{DBLP:journals/amai/CarletF24, author = {Claude Carlet and Serge Feukoua}, title = {On those Boolean functions that are coset leaders of first order Reed-Muller codes}, journal = {Ann. Math. Artif. Intell.}, volume = {92}, number = {1}, pages = {7--27}, year = {2024}, url = {https://doi.org/10.1007/s10472-023-09842-5}, doi = {10.1007/S10472-023-09842-5}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amai/CarletF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletDGT24, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Quasi-linear masking against {SCA} and FIA, with cost amortization}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {398--432}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.398-432}, doi = {10.46586/TCHES.V2024.I1.398-432}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CarletDGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurogp/CarletDJMP24, author = {Claude Carlet and Marko Durasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, editor = {Mario Giacobini and Bing Xue and Luca Manzoni}, title = {Look into the Mirror: Evolving Self-dual Bent Boolean Functions}, booktitle = {Genetic Programming - 27th European Conference, EuroGP 2024, Held as Part of EvoStar 2024, Aberystwyth, UK, April 3-5, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14631}, pages = {161--175}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56957-9\_10}, doi = {10.1007/978-3-031-56957-9\_10}, timestamp = {Mon, 08 Apr 2024 18:06:13 +0200}, biburl = {https://dblp.org/rec/conf/eurogp/CarletDJMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evostar/CarletDGJMP24, author = {Claude Carlet and Marko Durasevic and Bruno Gasperov and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, editor = {Stephen L. Smith and Jo{\~{a}}o Correia and Christian Cintrano}, title = {A New Angle: On Evolving Rotation Symmetric Boolean Functions}, booktitle = {Applications of Evolutionary Computation - 27th European Conference, EvoApplications 2024, Held as Part of EvoStar 2024, Aberystwyth, UK, April 3-5, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14634}, pages = {287--302}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56852-7\_19}, doi = {10.1007/978-3-031-56852-7\_19}, timestamp = {Mon, 01 Apr 2024 16:15:43 +0200}, biburl = {https://dblp.org/rec/conf/evostar/CarletDGJMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2023, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-53368-6}, doi = {10.1007/978-3-031-53368-6}, isbn = {978-3-031-53367-9}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-09937, author = {Claude Carlet and Marko {\DH}urasevic and Domagoj Jakobovic and Stjepan Picek and Luca Mariot}, title = {A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes}, journal = {CoRR}, volume = {abs/2402.09937}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.09937}, doi = {10.48550/ARXIV.2402.09937}, eprinttype = {arXiv}, eprint = {2402.09937}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-09937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/Carlet23, author = {Claude Carlet}, title = {Revisiting some results on {APN} and algebraic immune functions}, journal = {Adv. Math. Commun.}, volume = {17}, number = {5}, pages = {1012--1026}, year = {2023}, url = {https://doi.org/10.3934/amc.2021035}, doi = {10.3934/AMC.2021035}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/Carlet23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletP23, author = {Claude Carlet and Stjepan Picek}, title = {On the exponents of {APN} power functions and Sidon sets, sum-free sets, and Dickson polynomials}, journal = {Adv. Math. Commun.}, volume = {17}, number = {6}, pages = {1507--1525}, year = {2023}, url = {https://doi.org/10.3934/amc.2021064}, doi = {10.3934/AMC.2021064}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCHM23, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Wilfried Meidl}, title = {Editorial: Special issue on Boolean functions and their applications 2022}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1049--1051}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00678-8}, doi = {10.1007/S12095-023-00678-8}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletKN23, author = {Claude Carlet and Rebeka Kiss and G{\'{a}}bor P{\'{e}}ter Nagy}, title = {Simplicity conditions for binary orthogonal arrays}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {151--163}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01105-4}, doi = {10.1007/S10623-022-01105-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeierleC23, author = {Christof Beierle and Claude Carlet}, title = {Gold functions and switched cube functions are not 0-extendable in dimension n {\textgreater} 5}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {433--449}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01111-6}, doi = {10.1007/S10623-022-01111-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeierleC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/CarletS23, author = {Claude Carlet and Patrick Sol{\'{e}}}, title = {The weight spectrum of two families of Reed-Muller codes}, journal = {Discret. Math.}, volume = {346}, number = {10}, pages = {113568}, year = {2023}, url = {https://doi.org/10.1016/j.disc.2023.113568}, doi = {10.1016/J.DISC.2023.113568}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dm/CarletS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PiccioneABCDNPR23, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {10}, pages = {6700--6710}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3287534}, doi = {10.1109/TIT.2023.3287534}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/CarletMMP23, author = {Claude Carlet and Luca Mariot and Luca Manzoni and Stjepan Picek}, editor = {Leslie P{\'{e}}rez C{\'{a}}ceres and Thomas St{\"{u}}tzle}, title = {Evolutionary Strategies for the Design of Binary Linear Codes}, booktitle = {Evolutionary Computation in Combinatorial Optimization - 23rd European Conference, EvoCOP 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13987}, pages = {114--129}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30035-6\_8}, doi = {10.1007/978-3-031-30035-6\_8}, timestamp = {Thu, 06 Apr 2023 11:08:46 +0200}, biburl = {https://dblp.org/rec/conf/evoW/CarletMMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CarletFS23, author = {Claude Carlet and Serge Feukoua and Ana Salagean}, editor = {Elizabeth A. Quaglia}, title = {Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions}, booktitle = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC} 2023, London, UK, December 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14421}, pages = {17--33}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47818-5\_2}, doi = {10.1007/978-3-031-47818-5\_2}, timestamp = {Sat, 09 Dec 2023 13:01:18 +0100}, biburl = {https://dblp.org/rec/conf/ima/CarletFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-13497, author = {Claude Carlet and Patrick Sol{\'{e}}}, title = {The weight spectrum of several families of Reed-Muller codes}, journal = {CoRR}, volume = {abs/2301.13497}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.13497}, doi = {10.48550/ARXIV.2301.13497}, eprinttype = {arXiv}, eprint = {2301.13497}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-13497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-11881, author = {Claude Carlet and Marko {\DH}urasevic and Bruno Gasperov and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, title = {A New Angle: On Evolving Rotation Symmetric Boolean Functions}, journal = {CoRR}, volume = {abs/2311.11881}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.11881}, doi = {10.48550/ARXIV.2311.11881}, eprinttype = {arXiv}, eprint = {2311.11881}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-11881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-11884, author = {Claude Carlet and Marko {\DH}urasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, title = {Look into the Mirror: Evolving Self-Dual Bent Boolean Functions}, journal = {CoRR}, volume = {abs/2311.11884}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.11884}, doi = {10.48550/ARXIV.2311.11884}, eprinttype = {arXiv}, eprint = {2311.11884}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-11884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT23, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Quasi-linear masking to protect against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2023}, url = {https://eprint.iacr.org/2023/406}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet23, author = {Claude Carlet}, title = {On {APN} functions whose graphs are maximal Sidon sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2023}, url = {https://eprint.iacr.org/2023/621}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletV23, author = {Claude Carlet and Irene Villa}, title = {On cubic-like bent Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2023}, url = {https://eprint.iacr.org/2023/879}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletP23, author = {Claude Carlet and Enrico Piccione}, title = {Restricting vectorial functions to affine spaces and deducing infinite families of 4-uniform permutations, in relation to the strong D-property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2023}, url = {https://eprint.iacr.org/2023/928}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT23a, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {A masking method based on orthonormal spaces, protecting several bytes against both {SCA} and {FIA} with a reduced cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1746}, year = {2023}, url = {https://eprint.iacr.org/2023/1746}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/Carlet22, author = {Claude Carlet}, title = {Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators}, journal = {Adv. Math. Commun.}, volume = {16}, number = {4}, pages = {693--707}, year = {2022}, url = {https://doi.org/10.3934/amc.2022047}, doi = {10.3934/AMC.2022047}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/Carlet22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletHMT22, author = {Claude Carlet and Peng Han and Sihem Mesnager and Chunming Tang}, title = {M{\"{o}}bius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields}, journal = {Adv. Math. Commun.}, volume = {16}, number = {4}, pages = {709--720}, year = {2022}, url = {https://doi.org/10.3934/amc.2022095}, doi = {10.3934/AMC.2022095}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/CarletHMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCDH22, author = {Lilya Budaghyan and Claude Carlet and Cunsheng Ding and Tor Helleseth}, title = {Editorial: Special issue on Boolean functions and their applications 2021}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1207--1209}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00609-z}, doi = {10.1007/S12095-022-00609-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/BeierleCLP22, author = {Christof Beierle and Claude Carlet and Gregor Leander and L{\'{e}}o Perrin}, title = {A further study of quadratic {APN} permutations in dimension nine}, journal = {Finite Fields Their Appl.}, volume = {81}, pages = {102049}, year = {2022}, url = {https://doi.org/10.1016/j.ffa.2022.102049}, doi = {10.1016/J.FFA.2022.102049}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/BeierleCLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet22, author = {Claude Carlet}, title = {A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {2}, pages = {1355--1368}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3126684}, doi = {10.1109/TIT.2021.3126684}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCCDK22, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Diana Davidova and Nikolay S. Kaleyski}, title = {On Two Fundamental Problems on {APN} Power Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {5}, pages = {3389--3403}, year = {2022}, url = {https://doi.org/10.1109/TIT.2022.3147060}, doi = {10.1109/TIT.2022.3147060}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCCDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletM22, author = {Claude Carlet and Pierrick M{\'{e}}aux}, title = {A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {5}, pages = {3404--3425}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3139804}, doi = {10.1109/TIT.2021.3139804}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CarletM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/CarletJP22, author = {Claude Carlet and Domagoj Jakobovic and Stjepan Picek}, editor = {Jonathan E. Fieldsend and Markus Wagner}, title = {On generalizing the power function exponent constructions with genetic programming}, booktitle = {{GECCO} '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9 - 13, 2022}, pages = {691--694}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3520304.3529081}, doi = {10.1145/3520304.3529081}, timestamp = {Mon, 25 Jul 2022 17:04:27 +0200}, biburl = {https://dblp.org/rec/conf/gecco/CarletJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/CarletDJMP22, author = {Claude Carlet and Marko Djurasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, editor = {Jonathan E. Fieldsend and Markus Wagner}, title = {Evolving constructions for balanced, highly nonlinear boolean functions}, booktitle = {{GECCO} '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9 - 13, 2022}, pages = {1147--1155}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3512290.3528871}, doi = {10.1145/3512290.3528871}, timestamp = {Tue, 12 Jul 2022 15:09:18 +0200}, biburl = {https://dblp.org/rec/conf/gecco/CarletDJMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaim/Carlet22, author = {Claude Carlet}, title = {Parameterization of Boolean functions by vectorial functions and associated constructions}, booktitle = {Proceedings of the International Symposium on Artificial Intelligence and Mathematics 2022 {(ISAIM} 2022), Fort Lauderdale, Florida, USA, January 3-5, 2022}, year = {2022}, url = {https://isaim2022.cs.ou.edu/papers/ISAIM2022\_Boolean\_Carlet.pdf}, timestamp = {Wed, 20 Mar 2024 17:48:41 +0100}, biburl = {https://dblp.org/rec/conf/isaim/Carlet22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/Carlet22, author = {Claude Carlet}, editor = {Armando Casta{\~{n}}eda and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On {APN} Functions Whose Graphs are Maximal Sidon Sets}, booktitle = {{LATIN} 2022: Theoretical Informatics - 15th Latin American Symposium, Guanajuato, Mexico, November 7-11, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13568}, pages = {243--254}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20624-5\_15}, doi = {10.1007/978-3-031-20624-5\_15}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latin/Carlet22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10510, author = {Christof Beierle and Claude Carlet}, title = {Gold Functions Are Not 0-Extendable in Dimension n{\textgreater}5}, journal = {CoRR}, volume = {abs/2201.10510}, year = {2022}, url = {https://arxiv.org/abs/2201.10510}, eprinttype = {arXiv}, eprint = {2201.10510}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08743, author = {Claude Carlet and Marko Djurasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, title = {Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions}, journal = {CoRR}, volume = {abs/2202.08743}, year = {2022}, url = {https://arxiv.org/abs/2202.08743}, eprinttype = {arXiv}, eprint = {2202.08743}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-11502, author = {Anastasiya Gorodilova and Natalia N. Tokareva and Sergey Agievich and Ilya Beterov and Tim Beyne and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Valeria Idrisova and Nikolay Kolomeec and Aleksandr Kutsenko and Ekaterina Malygina and Nicky Mouha and Marina Pudovkina and Francesco Sica and Aleksei Udovenko}, title = {An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO"}, journal = {CoRR}, volume = {abs/2204.11502}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.11502}, doi = {10.48550/ARXIV.2204.11502}, eprinttype = {arXiv}, eprint = {2204.11502}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-11502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-11551, author = {Claude Carlet and Luca Mariot and Luca Manzoni and Stjepan Picek}, title = {Evolutionary Strategies for the Design of Binary Linear Codes}, journal = {CoRR}, volume = {abs/2211.11551}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.11551}, doi = {10.48550/ARXIV.2211.11551}, eprinttype = {arXiv}, eprint = {2211.11551}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-11551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletF22, author = {Claude Carlet and Serge Feukoua}, title = {On those Boolean functions that are coset leaders of first order Reed-Muller codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2022}, url = {https://eprint.iacr.org/2022/669}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiccioneABCDNPR22, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2022}, url = {https://eprint.iacr.org/2022/1141}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCHN21, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Kaisa Nyberg}, title = {Editorial: Special issue on Boolean functions and their applications 2020}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {887--889}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00536-5}, doi = {10.1007/S12095-021-00536-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BudaghyanCCCV21, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Generalized isotopic shift construction for {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {19--32}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00803-1}, doi = {10.1007/S10623-020-00803-1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BudaghyanCCCV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletKM21, author = {Claude Carlet and Kwang Ho Kim and Sihem Mesnager}, title = {A direct proof of APN-ness of the Kasami functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {441--446}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00830-y}, doi = {10.1007/S10623-020-00830-Y}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/DavidovaBCHIP21, author = {Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila}, title = {Relation between o-equivalence and EA-equivalence for Niho bent functions}, journal = {Finite Fields Their Appl.}, volume = {72}, pages = {101834}, year = {2021}, url = {https://doi.org/10.1016/j.ffa.2021.101834}, doi = {10.1016/J.FFA.2021.101834}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/DavidovaBCHIP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChengCGDG21, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, title = {Detecting faults in inner product masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {119--133}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00227-6}, doi = {10.1007/S13389-020-00227-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {465--495}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.465-495}, doi = {10.46586/TCHES.V2021.I3.465-495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletGM21, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {57--87}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.57-87}, doi = {10.46586/TCHES.V2021.I4.57-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CarletGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CarletCGKT21, author = {Claude Carlet and {\'{E}}loi de Ch{\'{e}}risey and Sylvain Guilley and Sel{\c{c}}uk Kavut and Deng Tang}, title = {Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {203--218}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3006399}, doi = {10.1109/TIFS.2020.3006399}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CarletCGKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengGCMD21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {220--235}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3009609}, doi = {10.1109/TIFS.2020.3009609}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet21, author = {Claude Carlet}, title = {On the Properties of the Boolean Functions Associated to the Differential Spectrum of General {APN} Functions and Their Consequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {10}, pages = {6926--6939}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3081139}, doi = {10.1109/TIT.2021.3081139}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/Carlet21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet21a, author = {Claude Carlet}, title = {Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {12}, pages = {8325--8334}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3114958}, doi = {10.1109/TIT.2021.3114958}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/CarletJP21, author = {Claude Carlet and Domagoj Jakobovic and Stjepan Picek}, editor = {Francisco Chicano and Krzysztof Krawiec}, title = {Evolutionary algorithms-assisted construction of cryptographic boolean functions}, booktitle = {{GECCO} '21: Genetic and Evolutionary Computation Conference, Lille, France, July 10-14, 2021}, pages = {565--573}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3449639.3459362}, doi = {10.1145/3449639.3459362}, timestamp = {Thu, 24 Jun 2021 08:56:59 +0200}, biburl = {https://dblp.org/rec/conf/gecco/CarletJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08008, author = {Christof Beierle and Claude Carlet and Gregor Leander and L{\'{e}}o Perrin}, title = {A Further Study of Quadratic {APN} Permutations in Dimension Nine}, journal = {CoRR}, volume = {abs/2104.08008}, year = {2021}, url = {https://arxiv.org/abs/2104.08008}, eprinttype = {arXiv}, eprint = {2104.08008}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-01053, author = {Anastasiya Gorodilova and Natalia N. Tokareva and Sergey Agievich and Claude Carlet and Valeria Idrisova and Konstantin Kalgin and D. Kolegov and Alexandr Kutsenko and Nicky Mouha and Marina Pudovkina and Aleksei Udovenko}, title = {The Seventh International Olympiad in Cryptography {NSUCRYPTO:} problems and solutions}, journal = {CoRR}, volume = {abs/2106.01053}, year = {2021}, url = {https://arxiv.org/abs/2106.01053}, eprinttype = {arXiv}, eprint = {2106.01053}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-01053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2021}, url = {https://eprint.iacr.org/2021/363}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet21, author = {Claude Carlet}, title = {Revisiting some results on {APN} and algebraic immune functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2021}, url = {https://eprint.iacr.org/2021/405}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet21a, author = {Claude Carlet}, title = {Parameterization of Boolean functions by vectorial functions and associated constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2021}, url = {https://eprint.iacr.org/2021/761}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet21b, author = {Claude Carlet}, title = {A wide class of Boolean functions generalizing the hidden weight bit function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2021}, url = {https://eprint.iacr.org/2021/762}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletGM21, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2021}, url = {https://eprint.iacr.org/2021/1028}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletF20, author = {Claude Carlet and Serge Feukoua}, title = {Three parameters of Boolean functions related to their constancy on affine spaces}, journal = {Adv. Math. Commun.}, volume = {14}, number = {4}, pages = {651--676}, year = {2020}, url = {https://doi.org/10.3934/amc.2020036}, doi = {10.3934/AMC.2020036}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACHIK20, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang{-}dong Hou and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia N. Tokareva}, title = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:} Problems and their solutions}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {223--256}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1670282}, doi = {10.1080/01611194.2019.1670282}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCCCV20, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Constructing {APN} Functions Through Isotopic Shifts}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {8}, pages = {5299--5309}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2974471}, doi = {10.1109/TIT.2020.2974471}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCCCV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCHK20, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay S. Kaleyski}, title = {On the Distance Between {APN} Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {9}, pages = {5742--5753}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2983684}, doi = {10.1109/TIT.2020.2983684}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet20, author = {Claude Carlet}, title = {Handling Vectorial Functions by Means of Their Graph Indicators}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {10}, pages = {6324--6339}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2981524}, doi = {10.1109/TIT.2020.2981524}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/Carlet20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet20a, author = {Claude Carlet}, title = {Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {12}, pages = {7702--7716}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.3017494}, doi = {10.1109/TIT.2020.3017494}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/CarletDJP20, author = {Claude Carlet and Marko Djurasevic and Domagoj Jakobovic and Stjepan Picek}, editor = {Thomas B{\"{a}}ck and Mike Preuss and Andr{\'{e}} H. Deutz and Hao Wang and Carola Doerr and Michael T. M. Emmerich and Heike Trautmann}, title = {A Search for Additional Structure: The Case of Cryptographic S-boxes}, booktitle = {Parallel Problem Solving from Nature - {PPSN} {XVI} - 16th International Conference, {PPSN} 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12270}, pages = {343--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58115-2\_24}, doi = {10.1007/978-3-030-58115-2\_24}, timestamp = {Fri, 04 Sep 2020 10:49:42 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/CarletDJP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/cu/20/C2020, editor = {Claude Carlet}, title = {Boolean Functions for Cryptography and Coding Theory}, publisher = {Cambridge University Press}, year = {2020}, url = {https://doi.org/10.1017/9781108606806}, doi = {10.1017/9781108606806}, isbn = {9781108606806}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/cu/20/C2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-00050, author = {Claude Carlet and Kwang Ho Kim and Sihem Mesnager}, title = {A direct proof of APN-ness of the Kasami functions}, journal = {CoRR}, volume = {abs/2002.00050}, year = {2020}, url = {https://arxiv.org/abs/2002.00050}, eprinttype = {arXiv}, eprint = {2002.00050}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-00050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-09563, author = {Anastasiya Gorodilova and Natalia N. Tokareva and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeria Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Roman Lebedev and Svetla Nikova and Alexey Oblaukhov and Irina Pankratova and Marina Pudovkina and Vincent Rijmen and Aleksei Udovenko}, title = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/2005.09563}, year = {2020}, url = {https://arxiv.org/abs/2005.09563}, eprinttype = {arXiv}, eprint = {2005.09563}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletKM20, author = {Claude Carlet and Kwang Ho Kim and Sihem Mesnager}, title = {A direct proof of APN-ness of the Kasami functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2020}, url = {https://eprint.iacr.org/2020/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCCCV20, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Generalized Isotopic Shift Construction for {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2020}, url = {https://eprint.iacr.org/2020/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet20, author = {Claude Carlet}, title = {Handling vectorial functions by means of their graph indicators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2020}, url = {https://eprint.iacr.org/2020/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet20a, author = {Claude Carlet}, title = {Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2020}, url = {https://eprint.iacr.org/2020/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCMD20, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2020}, url = {https://eprint.iacr.org/2020/692}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletGM20, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2020}, url = {https://eprint.iacr.org/2020/876}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCCDK20, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Diana Davidova and Nikolay S. Kaleyski}, title = {On two fundamental problems on {APN} power functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1359}, year = {2020}, url = {https://eprint.iacr.org/2020/1359}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCCDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CalderiniBC20, author = {Marco Calderini and Lilya Budaghyan and Claude Carlet}, title = {On known constructions of {APN} and {AB} functions and their relation to each other}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1444}, year = {2020}, url = {https://eprint.iacr.org/2020/1444}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CalderiniBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet20b, author = {Claude Carlet}, title = {On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1529}, year = {2020}, url = {https://eprint.iacr.org/2020/1529}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Carlet20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM20, author = {Claude Carlet and Pierrick M{\'{e}}aux}, title = {A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1562}, year = {2020}, url = {https://eprint.iacr.org/2020/1562}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CarletM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet20c, author = {Claude Carlet}, title = {On the properties of the Boolean functions associated to the differential spectrum of general {APN} functions and their consequences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1587}, year = {2020}, url = {https://eprint.iacr.org/2020/1587}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Carlet20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCH19, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth}, title = {Editorial: Special Issue on Boolean functions and their applications}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {1--2}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0341-2}, doi = {10.1007/S12095-018-0341-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCH19a, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth}, title = {Editorial: Special issue on Boolean functions and their applications 2018}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1145--1146}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00409-y}, doi = {10.1007/S12095-019-00409-Y}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet19, author = {Claude Carlet}, title = {On {APN} exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {203--224}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0512-3}, doi = {10.1007/S10623-018-0512-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletCQ19, author = {Claude Carlet and Xi Chen and Longjiang Qu}, title = {Constructing infinite families of low differential uniformity (n, m)-functions with m {\textgreater} n / 2}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1577--1599}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0553-7}, doi = {10.1007/S10623-018-0553-7}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletLM19, author = {Claude Carlet and Chengju Li and Sihem Mesnager}, title = {Some (almost) optimally extendable linear codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2813--2834}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00652-7}, doi = {10.1007/S10623-019-00652-7}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletLM19a, author = {Claude Carlet and Chengju Li and Sihem Mesnager}, title = {Linear codes with small hulls in semi-primitive case}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3063--3075}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00663-4}, doi = {10.1007/S10623-019-00663-4}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletLM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGT19, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {303--312}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0194-9}, doi = {10.1007/S13389-018-0194-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletMTQ19, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {New Characterization and Parametrization of {LCD} Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {1}, pages = {39--49}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2829873}, doi = {10.1109/TIT.2018.2829873}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletMTQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletMTQ19a, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {On {\textdollar}{\textbackslash}sigma{\textdollar} -LCD Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {3}, pages = {1694--1704}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2873130}, doi = {10.1109/TIT.2018.2873130}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletMTQ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FuFWC19, author = {Shihui Fu and Xiutao Feng and Qiang Wang and Claude Carlet}, title = {On the Derivative Imbalance and Ambiguity of Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {9}, pages = {5833--5845}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2912196}, doi = {10.1109/TIT.2019.2912196}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FuFWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MeauxCJS19, author = {Pierrick M{\'{e}}aux and Claude Carlet and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Improved Filter Permutators for Efficient {FHE:} Better Instances and Implementations}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {68--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_4}, doi = {10.1007/978-3-030-35423-7\_4}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MeauxCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BudaghyanCCCV19, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {On Isotopic Shift Construction for Planar Functions}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {2962--2966}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849339}, doi = {10.1109/ISIT.2019.8849339}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/BudaghyanCCCV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/ChengCGDG19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {17--32}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/fv2n}, doi = {10.29007/FV2N}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/aise/CarletGGMO19, author = {Claude Carlet and Sylvain Guilley and Cem G{\"{u}}neri and Sihem Mesnager and Ferruh {\"{O}}zbudak}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {Construction of Efficient Codes for High-Order Direct Sum Masking}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {108--128}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200008}, doi = {10.3233/AISE200008}, timestamp = {Wed, 13 May 2020 14:43:58 +0200}, biburl = {https://dblp.org/rec/series/aise/CarletGGMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/aise/CarletGM19, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {148--166}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200010}, doi = {10.3233/AISE200010}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/aise/CarletGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/c2si/2019, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4}, doi = {10.1007/978-3-030-16458-4}, isbn = {978-3-030-16457-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-04480, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang{-}dong Hou and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia N. Tokareva}, title = {The Fifth International Students' Olympiad in Cryptography - {NSUCRYPTO:} problems and their solutions}, journal = {CoRR}, volume = {abs/1906.04480}, year = {2019}, url = {http://arxiv.org/abs/1906.04480}, eprinttype = {arXiv}, eprint = {1906.04480}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-04480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeauxCJS19, author = {Pierrick M{\'{e}}aux and Claude Carlet and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2019}, url = {https://eprint.iacr.org/2019/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeauxCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidovaBCHIP19, author = {Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila}, title = {Relation between o-equivalence and EA-equivalence for Niho bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2019}, url = {https://eprint.iacr.org/2019/789}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidovaBCHIP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCGGD19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean{-}Luc Danger}, title = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2019}, url = {https://eprint.iacr.org/2019/919}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM19, author = {Claude Carlet and Pierrick M{\'{e}}aux}, title = {Boolean functions for homomorphic-friendly stream ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1446}, year = {2019}, url = {https://eprint.iacr.org/2019/1446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletG18, author = {Claude Carlet and Sylvain Guilley}, title = {Statistical properties of side-channel and fault injection attacks using coding theory}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {909--933}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0271-4}, doi = {10.1007/S12095-017-0271-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Carlet18, author = {Claude Carlet}, title = {On the nonlinearity of monotone Boolean functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1051--1061}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0262-5}, doi = {10.1007/S12095-017-0262-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Carlet18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletMTQ18, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {Euclidean and Hermitian {LCD} {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2605--2618}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0463-8}, doi = {10.1007/S10623-018-0463-8}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/CarletGOS18, author = {Claude Carlet and Cem G{\"{u}}neri and Ferruh {\"{O}}zbudak and Patrick Sol{\'{e}}}, title = {A new concatenated type construction for {LCD} codes and isometry codes}, journal = {Discret. Math.}, volume = {341}, number = {3}, pages = {830--835}, year = {2018}, url = {https://doi.org/10.1016/j.disc.2017.12.004}, doi = {10.1016/J.DISC.2017.12.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/CarletGOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/Carlet18, author = {Claude Carlet}, title = {Componentwise APNness, Walsh uniformity of {APN} functions, and cyclic-additive difference sets}, journal = {Finite Fields Their Appl.}, volume = {53}, pages = {226--253}, year = {2018}, url = {https://doi.org/10.1016/j.ffa.2018.06.007}, doi = {10.1016/J.FFA.2018.06.007}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/Carlet18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/XuCMW18, author = {Yuwei Xu and Claude Carlet and Sihem Mesnager and Chuankun Wu}, title = {Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {1}, pages = {367--383}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2750663}, doi = {10.1109/TIT.2017.2750663}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/XuCMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletC18, author = {Claude Carlet and Xi Chen}, title = {Constructing Low-Weight \emph{d}th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {4}, pages = {2969--2978}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2785775}, doi = {10.1109/TIT.2017.2785775}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletMTQP18, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi and Ruud Pellikaan}, title = {Linear Codes Over {\(\mathbb{F}\)}\({}_{\mbox{q}}\) Are Equivalent to {LCD} Codes for q{\textgreater}3}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {4}, pages = {3010--3017}, year = {2018}, url = {https://doi.org/10.1109/TIT.2018.2789347}, doi = {10.1109/TIT.2018.2789347}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletMTQP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCHLS18, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li and Bo Sun}, title = {On Upper Bounds for Algebraic Degrees of {APN} Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {6}, pages = {4399--4411}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2757938}, doi = {10.1109/TIT.2017.2757938}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCHLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet18, author = {Claude Carlet}, title = {Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {9}, pages = {6443--6453}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2761392}, doi = {10.1109/TIT.2017.2761392}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletGOOS18, author = {Claude Carlet and Cem G{\"{u}}neri and Ferruh {\"{O}}zbudak and Buket {\"{O}}zkaya and Patrick Sol{\'{e}}}, title = {On Linear Complementary Pairs of Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {10}, pages = {6583--6589}, year = {2018}, url = {https://doi.org/10.1109/TIT.2018.2796125}, doi = {10.1109/TIT.2018.2796125}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletGOOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/PicekKJC18, author = {Stjepan Picek and Karlo Knezevic and Domagoj Jakobovic and Claude Carlet}, title = {A Search for Differentially-6 Uniform (n, n-2) Functions}, booktitle = {2018 {IEEE} Congress on Evolutionary Computation, {CEC} 2018, Rio de Janeiro, Brazil, July 8-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CEC.2018.8477646}, doi = {10.1109/CEC.2018.8477646}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/PicekKJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/CarletGMO18, author = {Claude Carlet and Cem G{\"{u}}neri and Sihem Mesnager and Ferruh {\"{O}}zbudak}, editor = {Lilya Budaghyan and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks}, booktitle = {Arithmetic of Finite Fields - 7th International Workshop, {WAIFI} 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11321}, pages = {95--107}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05153-2\_5}, doi = {10.1007/978-3-030-05153-2\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/CarletGMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02059, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions of the Fourth International Students' Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/1806.02059}, year = {2018}, url = {http://arxiv.org/abs/1806.02059}, eprinttype = {arXiv}, eprint = {1806.02059}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletC18, author = {Claude Carlet and Xi Chen}, title = {Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2018}, url = {http://eprint.iacr.org/2018/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT18, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2018}, url = {https://eprint.iacr.org/2018/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCCCV18, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Constructing {APN} functions through isotopic shifts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2018}, url = {https://eprint.iacr.org/2018/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletCQ18, author = {Claude Carlet and Xi Chen and Longjiang Qu}, title = {Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m{\textgreater}n/2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2018}, url = {https://eprint.iacr.org/2018/1046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCHK18, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay S. Kaleyski}, title = {Changing Points in {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1217}, year = {2018}, url = {https://eprint.iacr.org/2018/1217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletF17, author = {Claude Carlet and Serge Feukoua}, title = {Three basic questions on Boolean functions}, journal = {Adv. Math. Commun.}, volume = {11}, number = {4}, pages = {837--855}, year = {2017}, url = {https://doi.org/10.3934/amc.2017061}, doi = {10.3934/AMC.2017061}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/TangCZ17, author = {Deng Tang and Claude Carlet and Zhengchun Zhou}, title = {Binary linear codes from vectorial boolean functions and their weight distribution}, journal = {Discret. Math.}, volume = {340}, number = {12}, pages = {3055--3072}, year = {2017}, url = {https://doi.org/10.1016/j.disc.2017.07.008}, doi = {10.1016/J.DISC.2017.07.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/TangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BruneauCGHPR17, author = {Nicolas Bruneau and Claude Carlet and Sylvain Guilley and Annelie Heuser and Emmanuel Prouff and Olivier Rioul}, title = {Stochastic Collision Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2090--2104}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697401}, doi = {10.1109/TIFS.2017.2697401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TangCTZ17, author = {Deng Tang and Claude Carlet and Xiaohu Tang and Zhengchun Zhou}, title = {Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {63}, number = {9}, pages = {6113--6125}, year = {2017}, url = {https://doi.org/10.1109/TIT.2017.2725918}, doi = {10.1109/TIT.2017.2725918}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TangCTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CarletMR17, author = {Claude Carlet and Pierrick M{\'{e}}aux and Yann Rotella}, title = {Boolean functions with restricted input and their robustness; application to the {FLIP} cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {192--227}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.192-227}, doi = {10.13154/TOSC.V2017.I3.192-227}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CarletMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CarletHP17, author = {Claude Carlet and Annelie Heuser and Stjepan Picek}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {393--414}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_20}, doi = {10.1007/978-3-319-61204-1\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/CarletHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/CarletMOS17, author = {Claude Carlet and Sihem Mesnager and Ferruh {\"{O}}zbudak and Ahmet Sinak}, editor = {Said El Hajji and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions}, booktitle = {Codes, Cryptology and Information Security - Second International Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet}, series = {Lecture Notes in Computer Science}, volume = {10194}, pages = {328--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55589-8\_22}, doi = {10.1007/978-3-319-55589-8\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/CarletMOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PoussierGSCG17, author = {Romain Poussier and Qian Guo and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet and Sylvain Guilley}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Connecting and Improving Direct Sum Masking and Inner Product Masking}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {123--141}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_8}, doi = {10.1007/978-3-319-75208-2\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletMTQ17, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {Euclidean and Hermitian {LCD} {MDS} codes}, journal = {CoRR}, volume = {abs/1702.08033}, year = {2017}, url = {http://arxiv.org/abs/1702.08033}, eprinttype = {arXiv}, eprint = {1702.08033}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CarletMTQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletMTQ17a, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {Linear codes over Fq which are equivalent to {LCD} codes}, journal = {CoRR}, volume = {abs/1703.04346}, year = {2017}, url = {http://arxiv.org/abs/1703.04346}, eprinttype = {arXiv}, eprint = {1703.04346}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CarletMTQ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletMTQ17aa, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {On {\(\sigma\)}-LCD codes}, journal = {CoRR}, volume = {abs/1707.08789}, year = {2017}, url = {http://arxiv.org/abs/1707.08789}, eprinttype = {arXiv}, eprint = {1707.08789}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CarletMTQ17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-03217, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {New characterization and parametrization of {LCD} Codes}, journal = {CoRR}, volume = {abs/1709.03217}, year = {2017}, url = {http://arxiv.org/abs/1709.03217}, eprinttype = {arXiv}, eprint = {1709.03217}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-03217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-03765, author = {Claude Carlet and Sihem Mesnager}, title = {Characterizations of o-polynomials by the Walsh transform}, journal = {CoRR}, volume = {abs/1709.03765}, year = {2017}, url = {http://arxiv.org/abs/1709.03765}, eprinttype = {arXiv}, eprint = {1709.03765}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-03765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletMR17, author = {Claude Carlet and Pierrick M{\'{e}}aux and Yann Rotella}, title = {Boolean functions with restricted input and their robustness; application to the {FLIP} cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2017}, url = {http://eprint.iacr.org/2017/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet17, author = {Claude Carlet}, title = {Characterizations of the differential uniformity of vectorial functions by the Walsh transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2017}, url = {http://eprint.iacr.org/2017/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet17a, author = {Claude Carlet}, title = {Componentwise APNness, Walsh uniformity of {APN} functions and cyclic-additive difference sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2017}, url = {http://eprint.iacr.org/2017/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletP17, author = {Claude Carlet and Stjepan Picek}, title = {On the exponents of {APN} power functions and Sidon sets, sum-free sets, and Dickson polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2017}, url = {http://eprint.iacr.org/2017/1179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZhangCHZ16, author = {Fengrong Zhang and Claude Carlet and Yupu Hu and Wenzheng Zhang}, title = {New secondary constructions of Bent functions}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {27}, number = {5}, pages = {413--434}, year = {2016}, url = {https://doi.org/10.1007/s00200-016-0287-6}, doi = {10.1007/S00200-016-0287-6}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/ZhangCHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletG16, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary dual codes for counter-measures to side-channel attacks}, journal = {Adv. Math. Commun.}, volume = {10}, number = {1}, pages = {131--150}, year = {2016}, url = {https://doi.org/10.3934/amc.2016.10.131}, doi = {10.3934/AMC.2016.10.131}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletM16, author = {Claude Carlet and Sihem Mesnager}, title = {Four decades of research on bent functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {5--50}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0145-8}, doi = {10.1007/S10623-015-0145-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletGT16, author = {Claude Carlet and Guang Gong and Yin Tan}, title = {Quadratic zero-difference balanced functions, {APN} functions and strongly regular graphs}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {629--654}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0022-x}, doi = {10.1007/S10623-014-0022-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ec/PicekCGMJ16, author = {Stjepan Picek and Claude Carlet and Sylvain Guilley and Julian F. Miller and Domagoj Jakobovic}, title = {Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography}, journal = {Evol. Comput.}, volume = {24}, number = {4}, pages = {667--694}, year = {2016}, url = {https://doi.org/10.1162/EVCO\_a\_00190}, doi = {10.1162/EVCO\_A\_00190}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ec/PicekCGMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletJST16, author = {Claude Carlet and David Joyner and Pantelimon Stanica and Deng Tang}, title = {Cryptographic properties of monotone Boolean functions}, journal = {J. Math. Cryptol.}, volume = {10}, number = {1}, pages = {1--14}, year = {2016}, url = {http://www.degruyter.com/view/j/jmc.2016.10.issue-1/jmc-2014-0030/jmc-2014-0030.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CarletJST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanKCH16, author = {Lilya Budaghyan and Alexander Kholosha and Claude Carlet and Tor Helleseth}, title = {Univariate Niho Bent Functions From o-Polynomials}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {4}, pages = {2254--2265}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2530083}, doi = {10.1109/TIT.2016.2530083}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanKCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CarletP16, author = {Claude Carlet and Emmanuel Prouff}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Polynomial Evaluation and Side Channel Analysis}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {315--341}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_20}, doi = {10.1007/978-3-662-49301-4\_20}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CarletP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {311--343}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_13}, doi = {10.1007/978-3-662-49890-3\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BudaghyanCHL16, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li}, title = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree n}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {480--484}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541345}, doi = {10.1109/ISIT.2016.7541345}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/BudaghyanCHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2016, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6}, doi = {10.1007/978-3-319-49445-6}, isbn = {978-3-319-49444-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TangCZ16, author = {Deng Tang and Claude Carlet and Zhengchun Zhou}, title = {Binary Linear Codes From Vectorial Boolean Functions and Their Weight Distribution}, journal = {CoRR}, volume = {abs/1612.04456}, year = {2016}, url = {http://arxiv.org/abs/1612.04456}, eprinttype = {arXiv}, eprint = {1612.04456}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TangCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet16, author = {Claude Carlet}, title = {On the nonlinearity of monotone Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2016}, url = {http://eprint.iacr.org/2016/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCHL16, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li}, title = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree n}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2016}, url = {http://eprint.iacr.org/2016/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2016}, url = {http://eprint.iacr.org/2016/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletPRR16, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Algebraic Decomposition for Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2016}, url = {http://eprint.iacr.org/2016/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletA15, author = {Claude Carlet and Yousuf Alsalami}, title = {A new construction of differentially 4-uniform (n, n-1)-functions}, journal = {Adv. Math. Commun.}, volume = {9}, number = {4}, pages = {541--565}, year = {2015}, url = {https://doi.org/10.3934/amc.2015.9.541}, doi = {10.3934/AMC.2015.9.541}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletF15, author = {Claude Carlet and Pierre{-}Alain Fouque}, title = {Guest Editorial}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0115-4}, doi = {10.1007/S12095-014-0115-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiCZLHS15, author = {Jiao Li and Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu and Jinyong Shan}, title = {Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {2}, pages = {279--305}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9949-1}, doi = {10.1007/S10623-014-9949-1}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiCZLHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletT15, author = {Claude Carlet and Deng Tang}, title = {Enhanced Boolean functions suitable for the filter model of pseudo-random generator}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {3}, pages = {571--587}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9978-9}, doi = {10.1007/S10623-014-9978-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TangCT15, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Differentially 4-uniform bijections by permuting the inverse function}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {1}, pages = {117--141}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9992-y}, doi = {10.1007/S10623-014-9992-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TangCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet15, author = {Claude Carlet}, title = {Boolean and Vectorial Plateaued Functions and {APN} Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {11}, pages = {6272--6289}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2481384}, doi = {10.1109/TIT.2015.2481384}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/Carlet15, author = {Claude Carlet}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on {APN} Functions}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {63--73}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_5}, doi = {10.1007/978-3-319-18681-8\_5}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/Carlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarletPRR15, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Algebraic Decomposition for Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {742--763}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_36}, doi = {10.1007/978-3-662-47989-6\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15, author = {Claude Carlet and Abderrahman Daif and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Xuan Thuy Ngo and Thibault Porteboeuf and C{\'{e}}dric Tavernier}, title = {Optimized linear complementary codes implementation for hardware trojan prevention}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300075}, doi = {10.1109/ECCTD.2015.7300075}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/PicekCJMB15, author = {Stjepan Picek and Claude Carlet and Domagoj Jakobovic and Julian F. Miller and Lejla Batina}, editor = {Sara Silva and Anna Isabel Esparcia{-}Alc{\'{a}}zar}, title = {Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference, {GECCO} 2015, Madrid, Spain, July 11-15, 2015}, pages = {1095--1102}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2739480.2754764}, doi = {10.1145/2739480.2754764}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/PicekCJMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/Carlet15, author = {Claude Carlet}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {151--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_10}, doi = {10.1007/978-3-319-24126-5\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/Carlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpnc/PicekGCJM15, author = {Stjepan Picek and Sylvain Guilley and Claude Carlet and Domagoj Jakobovic and Julian F. Miller}, editor = {Adrian{-}Horia Dediu and Luis Magdalena and Carlos Mart{\'{\i}}n{-}Vide}, title = {Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight}, booktitle = {Theory and Practice of Natural Computing - Fourth International Conference, {TPNC} 2015, Mieres, Spain, December 15-16, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9477}, pages = {71--82}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26841-5\_6}, doi = {10.1007/978-3-319-26841-5\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpnc/PicekGCJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/c2si/2015, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8}, doi = {10.1007/978-3-319-18681-8}, isbn = {978-3-319-18680-1}, timestamp = {Tue, 27 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet15, author = {Claude Carlet}, title = {More {PS} and H-like bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2015}, url = {http://eprint.iacr.org/2015/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletG15, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2015}, url = {http://eprint.iacr.org/2015/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/WangCST14, author = {Qichun Wang and Claude Carlet and Pantelimon Stanica and Chik How Tan}, title = {Cryptographic properties of the hidden weighted bit function}, journal = {Discret. Appl. Math.}, volume = {174}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1016/j.dam.2014.01.010}, doi = {10.1016/J.DAM.2014.01.010}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/WangCST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletK14, author = {Claude Carlet and Andrew Klapper}, title = {On the arithmetic Walsh coefficients of Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {299--318}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9915-3}, doi = {10.1007/S10623-013-9915-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/TangCT14, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks}, journal = {Int. J. Found. Comput. Sci.}, volume = {25}, number = {6}, pages = {763--780}, year = {2014}, url = {https://doi.org/10.1142/S0129054114500324}, doi = {10.1142/S0129054114500324}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/TangCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangCHC14, author = {Fengrong Zhang and Claude Carlet and Yupu Hu and Tian{-}Jie Cao}, title = {Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions}, journal = {Inf. Sci.}, volume = {283}, pages = {94--106}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.06.024}, doi = {10.1016/J.INS.2014.06.024}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangCHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGMP14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi and Emmanuel Prouff}, title = {Achieving side-channel high-order correlation immunity with leakage squeezing}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {107--121}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0067-1}, doi = {10.1007/S13389-013-0067-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/CarletGL14, author = {Claude Carlet and Guangpu Gao and Wenfen Liu}, title = {A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions}, journal = {J. Comb. Theory, Ser. {A}}, volume = {127}, pages = {161--175}, year = {2014}, url = {https://doi.org/10.1016/j.jcta.2014.05.008}, doi = {10.1016/J.JCTA.2014.05.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/CarletGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletDGM14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage squeezing: Optimal implementation and security evaluation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {249--295}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0018}, doi = {10.1515/JMC-2012-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletFGKKS14, author = {Claude Carlet and Finley Freibert and Sylvain Guilley and Michael Kiermaier and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Higher-Order {CIS} Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {9}, pages = {5283--5295}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2332468}, doi = {10.1109/TIT.2014.2332468}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletFGKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcta/CarletG14, author = {Claude Carlet and Sylvain Guilley}, editor = {Raquel Pinto and Paula Rocha Malonek and Paolo Vettori}, title = {Complementary Dual Codes for Counter-Measures to Side-Channel Attacks}, booktitle = {Coding Theory and Applications, 4th International Castle Meeting, {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014}, series = {{CIM} Series in Mathematical Sciences}, volume = {3}, pages = {97--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17296-5\_9}, doi = {10.1007/978-3-319-17296-5\_9}, timestamp = {Wed, 23 Aug 2017 10:30:53 +0200}, biburl = {https://dblp.org/rec/conf/icmcta/CarletG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BudaghyanKCH14, author = {Lilya Budaghyan and Alexander Kholosha and Claude Carlet and Tor Helleseth}, title = {Niho bent functions from quadratic o-monomials}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1827--1831}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875149}, doi = {10.1109/ISIT.2014.6875149}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/BudaghyanKCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/CarletGL14, author = {Claude Carlet and Guangpu Gao and Wenfen Liu}, editor = {Kai{-}Uwe Schmidt and Arne Winterhof}, title = {Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions}, booktitle = {Sequences and Their Applications - {SETA} 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8865}, pages = {21--33}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12325-7\_2}, doi = {10.1007/978-3-319-12325-7\_2}, timestamp = {Sat, 05 Sep 2020 18:00:18 +0200}, biburl = {https://dblp.org/rec/conf/seta/CarletGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/Carlet14, author = {Claude Carlet}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Open Questions on Nonlinearity and on {APN} Functions}, booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, pages = {83--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16277-5\_5}, doi = {10.1007/978-3-319-16277-5\_5}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/Carlet14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/BudaghyanCHK14, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Alexander Kholosha}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {On o-Equivalence of Niho Bent Functions}, booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, pages = {155--168}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16277-5\_9}, doi = {10.1007/978-3-319-16277-5\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/BudaghyanCHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BringerCCGM14, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, editor = {David Naccache and Damien Sauveron}, title = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_4}, doi = {10.1007/978-3-662-43826-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/Carlet14, author = {Claude Carlet}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Open Problems on Binary Bent Functions}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {203--241}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_10}, doi = {10.1007/978-3-319-10683-0\_10}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/14/Carlet14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletFGKKS14, author = {Claude Carlet and Finley Freibert and Sylvain Guilley and Michael Kiermaier and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Higher-order {CIS} codes}, journal = {CoRR}, volume = {abs/1406.4547}, year = {2014}, url = {http://arxiv.org/abs/1406.4547}, eprinttype = {arXiv}, eprint = {1406.4547}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarletFGKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletGT14, author = {Claude Carlet and Guang Gong and Yin Tan}, title = {Quadratic Zero-Difference Balanced Functions, {APN} Functions and Strongly Regular Graphs}, journal = {CoRR}, volume = {abs/1410.2903}, year = {2014}, url = {http://arxiv.org/abs/1410.2903}, eprinttype = {arXiv}, eprint = {1410.2903}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarletGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BudaghyanKCH14, author = {Lilya Budaghyan and Alexander Kholosha and Claude Carlet and Tor Helleseth}, title = {Univariate Niho Bent Functions from o-Polynomials}, journal = {CoRR}, volume = {abs/1411.2394}, year = {2014}, url = {http://arxiv.org/abs/1411.2394}, eprinttype = {arXiv}, eprint = {1411.2394}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BudaghyanKCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCCGM14a, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, title = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2014}, url = {http://eprint.iacr.org/2014/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletM13, author = {Claude Carlet and Brahim Merabet}, title = {Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions}, journal = {Adv. Math. Commun.}, volume = {7}, number = {2}, pages = {197--217}, year = {2013}, url = {https://doi.org/10.3934/amc.2013.7.197}, doi = {10.3934/AMC.2013.7.197}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TangCT13, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {On the second-order nonlinearities of some bent functions}, journal = {Inf. Sci.}, volume = {223}, pages = {322--330}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.08.024}, doi = {10.1016/J.INS.2012.08.024}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TangCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TangCT13, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {1}, pages = {653--664}, year = {2013}, url = {https://doi.org/10.1109/TIT.2012.2217476}, doi = {10.1109/TIT.2012.2217476}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TangCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CarletTTL13, author = {Claude Carlet and Deng Tang and Xiaohu Tang and Qunying Liao}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {New Construction of Differentially 4-Uniform Bijections}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {22--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_2}, doi = {10.1007/978-3-319-12087-4\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CarletTTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CarletG13, author = {Claude Carlet and Sylvain Guilley}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel indistinguishability}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {9}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487735}, doi = {10.1145/2487726.2487735}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/CarletG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/Carlet13, author = {Claude Carlet}, editor = {Benedikt Gierlichs and Sylvain Guilley and Debdeep Mukhopadhyay}, title = {Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - Third International Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8204}, pages = {70--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41224-0\_6}, doi = {10.1007/978-3-642-41224-0\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/Carlet13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/13/Carlet13, author = {Claude Carlet}, editor = {Gary L. Mullen and Daniel Panario}, title = {Boolean functions}, booktitle = {Handbook of Finite Fields}, series = {Discrete mathematics and its applications}, pages = {241--252}, publisher = {{CRC} Press}, year = {2013}, timestamp = {Mon, 08 Jun 2020 15:38:06 +0200}, biburl = {https://dblp.org/rec/books/crc/13/Carlet13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinCG13, author = {Shivam Bhasin and Claude Carlet and Sylvain Guilley}, title = {Theory of masking with codewords in hardware: low-weight \emph{d}th-order correlation-immune Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2013}, url = {http://eprint.iacr.org/2013/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangCT13, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Differentially 4-Uniform Bijections by Permuting the Inverse Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2013}, url = {http://eprint.iacr.org/2013/639}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletKT12, author = {Claude Carlet and Juan Carlos Ku{-}Cauich and Horacio Tapia{-}Recillas}, title = {Bent functions on a Galois ring and systematic authentication codes}, journal = {Adv. Math. Commun.}, volume = {6}, number = {2}, pages = {249--258}, year = {2012}, url = {https://doi.org/10.3934/amc.2012.6.249}, doi = {10.3934/AMC.2012.6.249}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletZH12, author = {Claude Carlet and Fengrong Zhang and Yupu Hu}, title = {Secondary constructions of bent functions and their enforcement}, journal = {Adv. Math. Commun.}, volume = {6}, number = {3}, pages = {305--314}, year = {2012}, url = {https://doi.org/10.3934/amc.2012.6.305}, doi = {10.3934/AMC.2012.6.305}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletFGR12, author = {Claude Carlet and Jean{-}Charles Faug{\`{e}}re and Christopher Goyet and Gu{\'{e}}na{\"{e}}l Renault}, title = {Analysis of the algebraic side channel attack}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {45--62}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0028-0}, doi = {10.1007/S13389-012-0028-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletFGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletM12, author = {Claude Carlet and Sihem Mesnager}, title = {On Semibent Boolean Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {5}, pages = {3287--3292}, year = {2012}, url = {https://doi.org/10.1109/TIT.2011.2181330}, doi = {10.1109/TIT.2011.2181330}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GaoZLC12, author = {Guangpu Gao and Xiyong Zhang and Wenfen Liu and Claude Carlet}, title = {Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4908--4913}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2193377}, doi = {10.1109/TIT.2012.2193377}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GaoZLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletGKS12, author = {Claude Carlet and Philippe Gaborit and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {A New Class of Codes for Boolean Masking of Cryptographic Computations}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6000--6011}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2200651}, doi = {10.1109/TIT.2012.2200651}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletGKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCHKM12, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Alexander Kholosha and Sihem Mesnager}, title = {Further Results on Niho Bent Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {11}, pages = {6979--6985}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2206557}, doi = {10.1109/TIT.2012.2206557}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCHKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PiretRC12, author = {Gilles Piret and Thomas Roche and Claude Carlet}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {311--328}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_19}, doi = {10.1007/978-3-642-31284-7\_19}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/PiretRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Optimal First-Order Masking with Linear and Non-linear Bijections}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {360--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_22}, doi = {10.1007/978-3-642-31410-0\_22}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletGPQR12, author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"{e}}l Quisquater and Matthieu Rivain}, editor = {Anne Canteaut}, title = {Higher-Order Masking Schemes for S-Boxes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {366--384}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_21}, doi = {10.1007/978-3-642-34047-5\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Leakage Squeezing of Order Two}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {120--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_8}, doi = {10.1007/978-3-642-34931-7\_8}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaim/CarletM12, author = {Claude Carlet and Sihem Mesnager}, title = {On Dillon's class {H} of Niho bent functions and o-polynomials}, booktitle = {International Symposium on Artificial Intelligence and Mathematics, {ISAIM} 2012, Fort Lauderdale, Florida, USA, January 9-11, 2012}, year = {2012}, url = {http://www.cs.uic.edu/pub/Isaim2012/WebPreferences/ISAIM2012\_Boolean\_Carlet\_Mesnager.pdf}, timestamp = {Wed, 20 Mar 2024 17:48:48 +0100}, biburl = {https://dblp.org/rec/conf/isaim/CarletM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BudaghyanCHK12, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Alexander Kholosha}, title = {Generalized bent functions and their relation to Maiorana-McFarland class}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {1212--1215}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6283049}, doi = {10.1109/ISIT.2012.6283049}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/BudaghyanCHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-4191, author = {Fengrong Zhang and Claude Carlet and Yupu Hu and Wenzheng Zhang}, title = {Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions}, journal = {CoRR}, volume = {abs/1211.4191}, year = {2012}, url = {http://arxiv.org/abs/1211.4191}, eprinttype = {arXiv}, eprint = {1211.4191}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-4191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Optimal First-Order Masking with Linear and Non-Linear Bijections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2012}, url = {http://eprint.iacr.org/2012/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiretRC12, author = {Gilles Piret and Thomas Roche and Claude Carlet}, title = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2012}, url = {http://eprint.iacr.org/2012/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiretRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage Squeezing of Order Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2012}, url = {http://eprint.iacr.org/2012/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AubryCLV11, author = {Yves Aubry and Claude Carlet and Philippe Langevin and Pascal V{\'{e}}ron}, title = {Guest editorial for the special issue for Jacques Wolfmann}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {187--188}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0056-0}, doi = {10.1007/S12095-011-0056-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AubryCLV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BudaghyanC11, author = {Lilya Budaghyan and Claude Carlet}, title = {CCZ-equivalence of bent vectorial functions and related constructions}, journal = {Des. Codes Cryptogr.}, volume = {59}, number = {1-3}, pages = {69--87}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9466-9}, doi = {10.1007/S10623-010-9466-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BudaghyanC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet11, author = {Claude Carlet}, title = {Relating three nonlinearity parameters of vectorial functions and building {APN} functions from bent functions}, journal = {Des. Codes Cryptogr.}, volume = {59}, number = {1-3}, pages = {89--109}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9468-7}, doi = {10.1007/S10623-010-9468-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/Carlet11, author = {Claude Carlet}, title = {More Vectorial Boolean Functions with Unbounded nonlinearity Profile}, journal = {Int. J. Found. Comput. Sci.}, volume = {22}, number = {6}, pages = {1259--1269}, year = {2011}, url = {https://doi.org/10.1142/S0129054111008696}, doi = {10.1142/S0129054111008696}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/CarletM11, author = {Claude Carlet and Sihem Mesnager}, title = {On Dillon's class {H} of bent functions, Niho bent functions and o-polynomials}, journal = {J. Comb. Theory, Ser. {A}}, volume = {118}, number = {8}, pages = {2392--2410}, year = {2011}, url = {https://doi.org/10.1016/j.jcta.2011.06.005}, doi = {10.1016/J.JCTA.2011.06.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/CarletM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet11, author = {Claude Carlet}, title = {Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials"}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {7}, pages = {4852--4853}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2146170}, doi = {10.1109/TIT.2011.2146170}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZengCSH11, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {9}, pages = {6310--6320}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2109935}, doi = {10.1109/TIT.2011.2109935}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZengCSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Carlet11, author = {Claude Carlet}, editor = {Udaya Parampalli and Philip Hawkes}, title = {On Known and New Differentially Uniform Functions}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_1}, doi = {10.1007/978-3-642-22497-3\_1}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletHKM11, author = {Claude Carlet and Tor Helleseth and Alexander Kholosha and Sihem Mesnager}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {On the dual of bent functions with 2\({}^{\mbox{r}}\) Niho exponents}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {703--707}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6034224}, doi = {10.1109/ISIT.2011.6034224}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CarletHKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/BudaghyanCH11, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth}, title = {On bent functions associated to {AB} functions}, booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil, October 16-20, 2011}, pages = {150--154}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ITW.2011.6089365}, doi = {10.1109/ITW.2011.6089365}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/BudaghyanCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet11, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Algebraic Immunity of Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {31--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_333}, doi = {10.1007/978-1-4419-5906-5\_333}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet11a, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {162--165}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_336}, doi = {10.1007/978-1-4419-5906-5\_336}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet11b, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Correlation Immune and Resilient Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {262--264}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_340}, doi = {10.1007/978-1-4419-5906-5\_340}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet11c, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Nonlinearity of Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {848--849}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_362}, doi = {10.1007/978-1-4419-5906-5\_362}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet11d, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Propagation Characteristics of Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {986--987}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_363}, doi = {10.1007/978-1-4419-5906-5\_363}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-1193, author = {Claude Carlet and Philippe Gaborit and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {A new class of codes for Boolean masking of cryptographic computations}, journal = {CoRR}, volume = {abs/1110.1193}, year = {2011}, url = {http://arxiv.org/abs/1110.1193}, eprinttype = {arXiv}, eprint = {1110.1193}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-1193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangCT11, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2011}, url = {http://eprint.iacr.org/2011/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghebiGCD11, author = {Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger}, title = {Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2011}, url = {http://eprint.iacr.org/2011/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CarletM10, author = {Claude Carlet and Sihem Mesnager}, title = {On the construction of bent vectorial functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {133--148}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032131}, doi = {10.1504/IJICOT.2010.032131}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CarletM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/CarletDPS10, author = {Claude Carlet and Lars Eirik Danielsen and Matthew Geoffrey Parker and Patrick Sol{\'{e}}}, title = {Self-dual bent functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {4}, pages = {384--399}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032864}, doi = {10.1504/IJICOT.2010.032864}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/CarletDPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/cu/10/CarletCH10, author = {Claude Carlet and Yves Crama and Peter L. Hammer}, editor = {Yves Crama and Peter L. Hammer}, title = {Boolean Functions for Cryptography and Error-Correcting Codes}, booktitle = {Boolean Models and Methods in Mathematics, Computer Science, and Engineering}, pages = {257--397}, publisher = {Cambridge University Press}, year = {2010}, url = {https://doi.org/10.1017/cbo9780511780448.011}, doi = {10.1017/CBO9780511780448.011}, timestamp = {Mon, 16 Sep 2019 14:43:07 +0200}, biburl = {https://dblp.org/rec/books/cu/10/CarletCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/cu/10/CarletCH10a, author = {Claude Carlet and Yves Crama and Peter L. Hammer}, editor = {Yves Crama and Peter L. Hammer}, title = {Vectorial Boolean Functions for Cryptography}, booktitle = {Boolean Models and Methods in Mathematics, Computer Science, and Engineering}, pages = {398--470}, publisher = {Cambridge University Press}, year = {2010}, url = {https://doi.org/10.1017/cbo9780511780448.012}, doi = {10.1017/CBO9780511780448.012}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/cu/10/CarletCH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/seta/2010, editor = {Claude Carlet and Alexander Pott}, title = {Sequences and Their Applications - {SETA} 2010 - 6th International Conference, Paris, France, September 13-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6338}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15874-2}, doi = {10.1007/978-3-642-15874-2}, isbn = {978-3-642-15873-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seta/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM10, author = {Claude Carlet and Sihem Mesnager}, title = {A {NOTE} {ON} {SEMI-BENT} {BOOLEAN} {FUNCTIONS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2010}, url = {http://eprint.iacr.org/2010/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengCSH10, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2010}, url = {http://eprint.iacr.org/2010/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM10a, author = {Claude Carlet and Sihem Mesnager}, title = {{ON} DILLON'S {CLASS} {H} {OF} {BENT} FUNCTIONS, {NIHO} {BENT} {FUNCTIONS} {AND} {O-POLYNOMIALS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2010}, url = {http://eprint.iacr.org/2010/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Carlet09, author = {Claude Carlet}, title = {Editorial: Cryptography and Communications, Volume 1, Issue 1}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.1007/s12095-009-0010-6}, doi = {10.1007/S12095-009-0010-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Carlet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletZLH09, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {Further properties of several classes of Boolean functions with optimum algebraic immunity}, journal = {Des. Codes Cryptogr.}, volume = {52}, number = {3}, pages = {303--338}, year = {2009}, url = {https://doi.org/10.1007/s10623-009-9284-0}, doi = {10.1007/S10623-009-9284-0}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletZLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/BudaghyanCL09, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Constructing new {APN} functions from known ones}, journal = {Finite Fields Their Appl.}, volume = {15}, number = {2}, pages = {150--159}, year = {2009}, url = {https://doi.org/10.1016/j.ffa.2008.10.001}, doi = {10.1016/J.FFA.2008.10.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/BudaghyanCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Carlet09, author = {Claude Carlet}, title = {On the Higher Order Nonlinearities of Boolean Functions and S-boxes}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {768}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.31}, doi = {10.1109/ARES.2009.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Carlet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/CarletF09, author = {Claude Carlet and Keqin Feng}, editor = {Yeow Meng Chee and Chao Li and San Ling and Huaxiong Wang and Chaoping Xing}, title = {An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity}, booktitle = {Coding and Cryptology, Second International Workshop, {IWCC} 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5557}, pages = {1--11}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01877-0\_1}, doi = {10.1007/978-3-642-01877-0\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/CarletF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/Carlet09, author = {Claude Carlet}, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions}, booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, pages = {104--116}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-002-5-104}, doi = {10.3233/978-1-60750-002-5-104}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/Carlet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanC09, author = {Lilya Budaghyan and Claude Carlet}, title = {On CCZ-equivalence and its use in secondary constructions of bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2009}, url = {http://eprint.iacr.org/2009/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanC09a, author = {Lilya Budaghyan and Claude Carlet}, title = {CCZ-equivalence and Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2009}, url = {http://eprint.iacr.org/2009/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet09, author = {Claude Carlet}, title = {On the nonlinearity profile of the Dillon function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2009}, url = {http://eprint.iacr.org/2009/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet09a, author = {Claude Carlet}, title = {On a weakness of the Tu-Deng function and its repair}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2009}, url = {http://eprint.iacr.org/2009/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletKLL08, author = {Claude Carlet and Khoongming Khoo and Chu{-}Wee Lim and Chuan{-}Wen Loe}, title = {On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity}, journal = {Adv. Math. Commun.}, volume = {2}, number = {2}, pages = {201--221}, year = {2008}, url = {https://doi.org/10.3934/amc.2008.2.201}, doi = {10.3934/AMC.2008.2.201}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletKLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Carlet08, author = {Claude Carlet}, title = {On Almost Perfect Nonlinear Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {12}, pages = {3665--3678}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.12.3665}, doi = {10.1093/IETFEC/E91-A.12.3665}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Carlet08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet08, author = {Claude Carlet}, title = {Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {3}, pages = {1262--1272}, year = {2008}, url = {https://doi.org/10.1109/TIT.2007.915704}, doi = {10.1109/TIT.2007.915704}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanC08, author = {Lilya Budaghyan and Claude Carlet}, title = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related Structures}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {5}, pages = {2354--2357}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.920246}, doi = {10.1109/TIT.2008.920246}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCL08, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Two Classes of Quadratic {APN} Binomials Inequivalent to Power Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {9}, pages = {4218--4229}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.928275}, doi = {10.1109/TIT.2008.928275}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CarletF08, author = {Claude Carlet and Keqin Feng}, editor = {Josef Pieprzyk}, title = {An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {425--440}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_26}, doi = {10.1007/978-3-540-89255-7\_26}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CarletF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Carlet08, author = {Claude Carlet}, title = {Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function}, booktitle = {2008 {IEEE} Information Theory Workshop, {ITW} 2008, Porto, Portugal, May 5-9, 2008}, pages = {333--337}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ITW.2008.4578680}, doi = {10.1109/ITW.2008.4578680}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/itw/Carlet08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/Carlet08, author = {Claude Carlet}, editor = {Solomon W. Golomb and Matthew Geoffrey Parker and Alexander Pott and Arne Winterhof}, title = {On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations}, booktitle = {Sequences and Their Applications - {SETA} 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5203}, pages = {345--367}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85912-3\_31}, doi = {10.1007/978-3-540-85912-3\_31}, timestamp = {Wed, 01 Sep 2021 10:36:07 +0200}, biburl = {https://dblp.org/rec/conf/seta/Carlet08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletF08, author = {Claude Carlet and Keqin Feng}, title = {New balanced Boolean functions satisfying all the main cryptographic criteria}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2008}, url = {http://eprint.iacr.org/2008/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/CarletD07, author = {Claude Carlet and Cunsheng Ding}, title = {Nonlinearities of S-boxes}, journal = {Finite Fields Their Appl.}, volume = {13}, number = {1}, pages = {121--135}, year = {2007}, url = {https://doi.org/10.1016/j.ffa.2005.07.003}, doi = {10.1016/J.FFA.2005.07.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/CarletD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletM07, author = {Claude Carlet and Sihem Mesnager}, title = {Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {1}, pages = {162--173}, year = {2007}, url = {https://doi.org/10.1109/TIT.2006.887494}, doi = {10.1109/TIT.2006.887494}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletKLL07, author = {Claude Carlet and Khoongming Khoo and Chu{-}Wee Lim and Chuan{-}Wen Loe}, editor = {Alex Biryukov}, title = {Generalized Correlation Analysis of Vectorial Boolean Functions}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {382--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_24}, doi = {10.1007/978-3-540-74619-5\_24}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/CarletKLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Carlet07, author = {Claude Carlet}, title = {Constructing balanced functions with optimum algebraic immunity}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {451--455}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557094}, doi = {10.1109/ISIT.2007.4557094}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Carlet07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waifi/2007, editor = {Claude Carlet and Berk Sunar}, title = {Arithmetic of Finite Fields, First International Workshop, {WAIFI} 2007, Madrid, Spain, June 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4547}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73074-3}, doi = {10.1007/978-3-540-73074-3}, isbn = {978-3-540-73073-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCL07, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Constructing new {APN} functions from known ones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2007}, url = {http://eprint.iacr.org/2007/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanC07, author = {Lilya Budaghyan and Claude Carlet}, title = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2007}, url = {http://eprint.iacr.org/2007/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletKLL07, author = {Claude Carlet and Khoongming Khoo and Chu{-}Wee Lim and Chuan{-}Wen Loe}, title = {On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2007}, url = {http://eprint.iacr.org/2007/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletKLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletZLH07, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2007}, url = {http://eprint.iacr.org/2007/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletDN06, author = {Claude Carlet and Cunsheng Ding and Harald Niederreiter}, title = {Authentication Schemes from Highly Nonlinear Functions}, journal = {Des. Codes Cryptogr.}, volume = {40}, number = {1}, pages = {71--79}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6407-0}, doi = {10.1007/S10623-005-6407-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/CarletG06, author = {Claude Carlet and Philippe Gaborit}, title = {Hyper-bent functions and cyclic codes}, journal = {J. Comb. Theory, Ser. {A}}, volume = {113}, number = {3}, pages = {466--482}, year = {2006}, url = {https://doi.org/10.1016/j.jcta.2005.04.008}, doi = {10.1016/J.JCTA.2005.04.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/CarletG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/DobbertinLCCFG06, author = {Hans Dobbertin and Gregor Leander and Anne Canteaut and Claude Carlet and Patrick Felke and Philippe Gaborit}, title = {Construction of bent functions via Niho power functions}, journal = {J. Comb. Theory, Ser. {A}}, volume = {113}, number = {5}, pages = {779--798}, year = {2006}, url = {https://doi.org/10.1016/j.jcta.2005.07.009}, doi = {10.1016/J.JCTA.2005.07.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/DobbertinLCCFG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YuanCD06, author = {Jin Yuan and Claude Carlet and Cunsheng Ding}, title = {The weight distribution of a class of linear codes from perfect nonlinear functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {2}, pages = {712--717}, year = {2006}, url = {https://doi.org/10.1109/TIT.2005.862125}, doi = {10.1109/TIT.2005.862125}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YuanCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BudaghyanCP06, author = {Lilya Budaghyan and Claude Carlet and Alexander Pott}, title = {New classes of almost bent and almost perfect nonlinear polynomials}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {3}, pages = {1141--1152}, year = {2006}, url = {https://doi.org/10.1109/TIT.2005.864481}, doi = {10.1109/TIT.2005.864481}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BudaghyanCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletDGM06, author = {Claude Carlet and Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra}, title = {Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {7}, pages = {3105--3121}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.876253}, doi = {10.1109/TIT.2006.876253}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletDGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/Carlet06, author = {Claude Carlet}, editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli}, title = {On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3857}, pages = {1--28}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11617983\_1}, doi = {10.1007/11617983\_1}, timestamp = {Thu, 10 Sep 2020 17:39:08 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/Carlet06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Carlet06, author = {Claude Carlet}, editor = {Cynthia Dwork}, title = {On the Higher Order Nonlinearities of Algebraic Immune Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {584--601}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_35}, doi = {10.1007/11818175\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Carlet06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06, author = {Frederik Armknecht and Claude Carlet and Philippe Gaborit and Simon K{\"{u}}nzli and Willi Meier and Olivier Ruatta}, editor = {Serge Vaudenay}, title = {Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {147--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_10}, doi = {10.1007/11761679\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ArmknechtCGKMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletDM06, author = {Claude Carlet and Deepak Kumar Dalai and Subhamoy Maitra}, title = {Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {734--738}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261629}, doi = {10.1109/ISIT.2006.261629}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/CarletDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletDN06, author = {Claude Carlet and Cunsheng Ding and Harald Niederreiter}, title = {Authentication Schemes from Highly Nonlinear Functions}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {739--743}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261630}, doi = {10.1109/ISIT.2006.261630}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/CarletDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BudaghyanCFL06, author = {Lilya Budaghyan and Claude Carlet and Patrick Felke and Gregor Leander}, title = {An infinite class of quadratic {APN} functions which are not equivalent to power mappings}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {2637--2641}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262131}, doi = {10.1109/ISIT.2006.262131}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/BudaghyanCFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/CarletGM06, author = {Claude Carlet and Philippe Guillot and Sihem Mesnager}, editor = {Guang Gong and Tor Helleseth and Hong{-}Yeop Song and Kyeongcheol Yang}, title = {On Immunity Profile of Boolean Functions}, booktitle = {Sequences and Their Applications - {SETA} 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4086}, pages = {364--375}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863854\_32}, doi = {10.1007/11863854\_32}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/seta/CarletGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Carlet06, author = {Claude Carlet}, editor = {Matthias Krause and Pavel Pudl{\'{a}}k and R{\"{u}}diger Reischuk and Dieter van Melkebeek}, title = {The complexity of Boolean functions from cryptographic viewpoint}, booktitle = {Complexity of Boolean Functions, 12.03. - 17.03.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06111}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2006/604}, timestamp = {Thu, 10 Jun 2021 13:02:07 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Carlet06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet06, author = {Claude Carlet}, title = {A method of construction of balanced functions with optimum algebraic immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2006}, url = {http://eprint.iacr.org/2006/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCL06, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Another class of quadratic {APN} binomials over F\({}_{\mbox{2\({}^{\mbox{n}}\)}}\): the case n divisible by 4}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2006}, url = {http://eprint.iacr.org/2006/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCL06a, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {A class of quadratic {APN} binomials inequivalent to power functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2006}, url = {http://eprint.iacr.org/2006/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCL06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet06a, author = {Claude Carlet}, title = {Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2006}, url = {http://eprint.iacr.org/2006/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet05, author = {Claude Carlet}, title = {Concatenating Indicators of Flats for Designing Cryptographic Functions}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {189--202}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1704-6}, doi = {10.1007/S10623-004-1704-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletY05, author = {Claude Carlet and Joseph L. Yucas}, title = {Piecewise Constructions of Bent and Almost Optimal Boolean Functions}, journal = {Des. Codes Cryptogr.}, volume = {37}, number = {3}, pages = {449--464}, year = {2005}, url = {https://doi.org/10.1007/s10623-005-4036-2}, doi = {10.1007/S10623-005-4036-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletC05, author = {Claude Carlet and Pascale Charpin}, title = {Cubic Boolean functions with highest resiliency}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {2}, pages = {562--571}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.840902}, doi = {10.1109/TIT.2004.840902}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletDY05, author = {Claude Carlet and Cunsheng Ding and Jin Yuan}, title = {Linear codes from perfect nonlinear mappings and their secret sharing schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {6}, pages = {2089--2102}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.847722}, doi = {10.1109/TIT.2005.847722}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletDY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Carlet05, author = {Claude Carlet}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {On Highly Nonlinear S-Boxes and Their Inability to Thwart {DPA} Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {49--62}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_5}, doi = {10.1007/11596219\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletM05, author = {Claude Carlet and Sihem Mesnager}, title = {Improving the upper bounds on the covering radii of Reed-Muller codes}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {795--799}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523446}, doi = {10.1109/ISIT.2005.1523446}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CarletM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Carlet05, author = {Claude Carlet}, title = {Designing bent functions and resilient functions from known ones, without extending their number of variables}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1096--1100}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523509}, doi = {10.1109/ISIT.2005.1523509}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletG05, author = {Claude Carlet and Philippe Gaborit}, title = {On the construction of balanced boolean functions with a good algebraic immunity}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1101--1105}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523510}, doi = {10.1109/ISIT.2005.1523510}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/CarletG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet05, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg}, title = {Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_40}, doi = {10.1007/0-387-23483-7\_40}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet05a, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg}, title = {Correlation Immune and Resilient Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_81}, doi = {10.1007/0-387-23483-7\_81}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet05b, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg}, title = {Nonlinearity of Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_275}, doi = {10.1007/0-387-23483-7\_275}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Carlet05c, author = {Claude Carlet}, editor = {Henk C. A. van Tilborg}, title = {Propagation Characteristics of Boolean Functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_322}, doi = {10.1007/0-387-23483-7\_322}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Carlet05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCFL05, author = {Lilya Budaghyan and Claude Carlet and Patrick Felke and Gregor Leander}, title = {An infinite class of quadratic {APN} functions which are not equivalent to power mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2005}, url = {http://eprint.iacr.org/2005/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCFL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet05, author = {Claude Carlet}, title = {On highly nonlinear S-boxes and their inability to thwart {DPA} attacks (completed version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2005}, url = {http://eprint.iacr.org/2005/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet05a, author = {Claude Carlet}, title = {A lower bound on the higher order nonlinearity of algebraic immune functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2005}, url = {http://eprint.iacr.org/2005/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/Carlet04, author = {Claude Carlet}, title = {On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions}, journal = {J. Complex.}, volume = {20}, number = {2-3}, pages = {182--204}, year = {2004}, url = {https://doi.org/10.1016/j.jco.2003.08.013}, doi = {10.1016/J.JCO.2003.08.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/Carlet04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/CarletD04, author = {Claude Carlet and Cunsheng Ding}, title = {Highly nonlinear mappings}, journal = {J. Complex.}, volume = {20}, number = {2-3}, pages = {205--244}, year = {2004}, url = {https://doi.org/10.1016/j.jco.2003.08.008}, doi = {10.1016/J.JCO.2003.08.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/CarletD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KlapperC04, author = {Andrew Klapper and Claude Carlet}, title = {Spectral methods for cross correlations of geometric sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {1}, pages = {229--232}, year = {2004}, url = {https://doi.org/10.1109/TIT.2003.821982}, doi = {10.1109/TIT.2003.821982}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KlapperC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet04, author = {Claude Carlet}, title = {On the Degree, Nonlinearity, Algebraic Thickness, and Nonnormality of Boolean Functions, With Developments on Symmetric Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {9}, pages = {2178--2185}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.833361}, doi = {10.1109/TIT.2004.833361}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletDL04, author = {Claude Carlet and Hans Dobbertin and Gregor Leander}, title = {Normal Extensions of Bent Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {11}, pages = {2880--2885}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.836681}, doi = {10.1109/TIT.2004.836681}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeierPC04, author = {Willi Meier and Enes Pasalic and Claude Carlet}, editor = {Christian Cachin and Jan Camenisch}, title = {Algebraic Attacks and Decomposition of Boolean Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {474--491}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_28}, doi = {10.1007/978-3-540-24676-3\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeierPC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletG04, author = {Claude Carlet and Pascale Gaborit}, title = {Hyper-bent functions and cyclic codes}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {497}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365534}, doi = {10.1109/ISIT.2004.1365534}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CarletG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CarletC04, author = {Claude Carlet and Philippe Charpin}, title = {Cubic Boolean functions with highest resiliency}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {499}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365535}, doi = {10.1109/ISIT.2004.1365535}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/CarletC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Carlet04, author = {Claude Carlet}, title = {On the secondary constructions of resilient functions}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {545}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365584}, doi = {10.1109/ISIT.2004.1365584}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Carlet04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM04, author = {Claude Carlet and Sihem Mesnager}, title = {On the supports of the Walsh transforms of Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2004}, url = {http://eprint.iacr.org/2004/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet04, author = {Claude Carlet}, title = {Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2004}, url = {http://eprint.iacr.org/2004/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/Carlet03, author = {Claude Carlet}, title = {Preface}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {1}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00431-6}, doi = {10.1016/S0166-218X(02)00431-6}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/Carlet03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fq/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Gary L. Mullen and Alain Poli and Henning Stichtenoth}, title = {Vectorial Functions and Covering Sequences}, booktitle = {Finite Fields and Applications, 7th International Conference, Fq7, Toulouse, France, May 5-9, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2948}, pages = {215--248}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24633-6\_17}, doi = {10.1007/978-3-540-24633-6\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/fq/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Thomas Johansson}, title = {On Plateaued Functions and Their Constructions}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {54--73}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_6}, doi = {10.1007/978-3-540-39887-5\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Carlet03, author = {Claude Carlet}, title = {On the algebraic thickness and non-normality of Boolean functions}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {147--150}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216716}, doi = {10.1109/ITW.2003.1216716}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Carlet03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {291--305}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_21}, doi = {10.1007/978-3-540-24654-1\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletT02, author = {Claude Carlet and Yuriy V. Tarannikov}, title = {Covering Sequences of Boolean Functions and Their Cryptographic Significance}, journal = {Des. Codes Cryptogr.}, volume = {25}, number = {3}, pages = {263--279}, year = {2002}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CarletG02, author = {Claude Carlet and Aline Gouget}, editor = {Yuliang Zheng}, title = {An Upper Bound on the Number of m-Resilient Boolean Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {484--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_30}, doi = {10.1007/3-540-36178-2\_30}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CarletG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Carlet02, author = {Claude Carlet}, editor = {Moti Yung}, title = {A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {549--564}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_35}, doi = {10.1007/3-540-45708-9\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Carlet02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/Carlet01, author = {Claude Carlet}, title = {Foreword}, journal = {Discret. Appl. Math.}, volume = {111}, number = {1-2}, pages = {1}, year = {2001}, url = {https://doi.org/10.1016/S0166-218X(00)00340-1}, doi = {10.1016/S0166-218X(00)00340-1}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/Carlet01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/AugotC01, author = {Daniel Augot and Claude Carlet}, title = {Preface: Volume 6}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {556--557}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(05)80005-8}, doi = {10.1016/S1571-0653(05)80005-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/AugotC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CanteautCCF01, author = {Anne Canteaut and Claude Carlet and Pascale Charpin and Caroline Fontaine}, title = {On cryptographic properties of the cosets of R(1, m)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {47}, number = {4}, pages = {1494--1513}, year = {2001}, url = {https://doi.org/10.1109/18.923730}, doi = {10.1109/18.923730}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CanteautCCF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/Carlet01, author = {Claude Carlet}, editor = {Tor Helleseth and P. Vijay Kumar and Kyeongcheol Yang}, title = {On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen, Norway, May 13-17, 2001}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {131--144}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4471-0673-9\_9}, doi = {10.1007/978-1-4471-0673-9\_9}, timestamp = {Tue, 25 Jun 2019 15:57:55 +0200}, biburl = {https://dblp.org/rec/conf/seta/Carlet01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanteautCCF00, author = {Anne Canteaut and Claude Carlet and Pascale Charpin and Caroline Fontaine}, editor = {Bart Preneel}, title = {Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {507--522}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_36}, doi = {10.1007/3-540-45539-6\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanteautCCF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Carlet99, author = {Claude Carlet}, title = {On Cryptographic Propagation Criteria for Boolean Functions}, journal = {Inf. Comput.}, volume = {151}, number = {1-2}, pages = {32--56}, year = {1999}, url = {https://doi.org/10.1006/inco.1998.2763}, doi = {10.1006/INCO.1998.2763}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Carlet99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/CarletG99, author = {Claude Carlet and Philippe Guillot}, editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli}, title = {A New Representation of Boolean Functions}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1719}, pages = {94--103}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46796-3\_10}, doi = {10.1007/3-540-46796-3\_10}, timestamp = {Thu, 10 Sep 2020 17:39:08 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/CarletG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/CarletG99, author = {Claude Carlet and Philippe Guillot}, editor = {Alexander Barg and Simon Litsyn}, title = {Bent, resilient functions and the numerical normal form}, booktitle = {Codes and Association Schemes, Proceedings of a {DIMACS} Workshop, Piscataway, New Jersey, USA, November 9-12, 1999}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {56}, pages = {87--96}, publisher = {{DIMACS/AMS}}, year = {1999}, url = {https://doi.org/10.1090/dimacs/056/06}, doi = {10.1090/DIMACS/056/06}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/CarletG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletG98, author = {Claude Carlet and Philippe Guillot}, title = {An Alternate Characterization of the Bentness of Binary Functions, with Uniqueness}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {2}, pages = {133--140}, year = {1998}, url = {https://doi.org/10.1023/A:1008283912025}, doi = {10.1023/A:1008283912025}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletCZ98, author = {Claude Carlet and Pascale Charpin and Victor A. Zinoviev}, title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {15}, number = {2}, pages = {125--156}, year = {1998}, url = {https://doi.org/10.1023/A:1008344232130}, doi = {10.1023/A:1008344232130}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletCZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet98, author = {Claude Carlet}, title = {Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\)-Linear Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {4}, pages = {1543--1547}, year = {1998}, url = {https://doi.org/10.1109/18.681328}, doi = {10.1109/18.681328}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Carlet98, author = {Claude Carlet}, editor = {Kaisa Nyberg}, title = {On the Propagation Criterion of Degree l and Order k}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {462--474}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054146}, doi = {10.1007/BFB0054146}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Carlet98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Carlet97, author = {Claude Carlet}, editor = {Walter Fumy}, title = {More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {422--433}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_29}, doi = {10.1007/3-540-69053-0\_29}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Carlet97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/CarletG96, author = {Claude Carlet and Philippe Guillot}, title = {A Characterization of Binary Bent Functions}, journal = {J. Comb. Theory, Ser. {A}}, volume = {76}, number = {2}, pages = {328--335}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0110}, doi = {10.1006/JCTA.1996.0110}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/CarletG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet95, author = {Claude Carlet}, title = {Generalized partial spreads}, journal = {{IEEE} Trans. Inf. Theory}, volume = {41}, number = {5}, pages = {1482--1487}, year = {1995}, url = {https://doi.org/10.1109/18.412693}, doi = {10.1109/18.412693}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Carlet95a, author = {Claude Carlet}, title = {On Z\({}_{\mbox{4}}\)-duality}, journal = {{IEEE} Trans. Inf. Theory}, volume = {41}, number = {5}, pages = {1487--1494}, year = {1995}, url = {https://doi.org/10.1109/18.412694}, doi = {10.1109/18.412694}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Carlet95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/Carlet94, author = {Claude Carlet}, title = {The Divisors of x\({}^{\mbox{2}}\)m+x of Constant Derivatives and Degree 2\({}^{\mbox{m}}\)-2}, journal = {{SIAM} J. Discret. Math.}, volume = {7}, number = {2}, pages = {238--244}, year = {1994}, url = {https://doi.org/10.1137/S0895480192229133}, doi = {10.1137/S0895480192229133}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/Carlet94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletSZ94, author = {Claude Carlet and Jennifer Seberry and Xian{-}Mo Zhang}, title = {Comments on 'Generating and counting binary Bent sequences'}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {2}, pages = {600}, year = {1994}, url = {https://doi.org/10.1109/18.312194}, doi = {10.1109/18.312194}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletSZ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet93, author = {Claude Carlet}, title = {Partially-Bent Functions}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {2}, pages = {135--145}, year = {1993}, url = {https://doi.org/10.1007/BF01388412}, doi = {10.1007/BF01388412}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet93a, author = {Claude Carlet}, title = {The Automorphism Groups of the Delsarte-Goethals Codes}, journal = {Des. Codes Cryptogr.}, volume = {3}, number = {3}, pages = {237--249}, year = {1993}, url = {https://doi.org/10.1007/BF01388485}, doi = {10.1007/BF01388485}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/Carlet93, author = {Claude Carlet}, title = {A general case of normal duality between binary nonlinear codes}, journal = {Discret. Math.}, volume = {111}, number = {1-3}, pages = {77--85}, year = {1993}, url = {https://doi.org/10.1016/0012-365X(93)90143-H}, doi = {10.1016/0012-365X(93)90143-H}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/Carlet93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Carlet93, author = {Claude Carlet}, editor = {Tor Helleseth}, title = {Two New Classes of Bent Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {77--101}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_8}, doi = {10.1007/3-540-48285-7\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Carlet93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Carlet92, author = {Claude Carlet}, editor = {Ernest F. Brickell}, title = {Partially-Bent Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {280--291}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_19}, doi = {10.1007/3-540-48071-4\_19}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Carlet92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamionCCS91, author = {Paul Camion and Claude Carlet and Pascale Charpin and Nicolas Sendrier}, editor = {Joan Feigenbaum}, title = {On Correlation-Immune Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {86--100}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_6}, doi = {10.1007/3-540-46766-1\_6}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CamionCCS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocode/Carlet90, author = {Claude Carlet}, editor = {G{\'{e}}rard D. Cohen and Pascale Charpin}, title = {A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes}, booktitle = {{EUROCODE} '90, International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {514}, pages = {42--50}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54303-1\_116}, doi = {10.1007/3-540-54303-1\_116}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocode/Carlet90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coding/Carlet88, author = {Claude Carlet}, editor = {G{\'{e}}rard D. Cohen and Jacques Wolfmann}, title = {A simple description of Kerdock codes}, booktitle = {Coding Theory and Applications, 3rd International Colloquium, Toulon, France, November 2-4, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {388}, pages = {202--208}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0019858}, doi = {10.1007/BFB0019858}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/coding/Carlet88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.