Claude Carlet
#132,478
Most Influential Person Now
French Computer Scientist
Claude Carlet's AcademicÂInfluence.com Rankings
Claude Carletcomputer-science Degrees
Computer Science
#5890
World Rank
#6214
Historical Rank
Database
#3018
World Rank
#3146
Historical Rank

Download Badge
Computer Science
Claude Carlet's Degrees
- PhD Computer Science Paris-Saclay University
- Doctorate Computer Science Paris-Saclay University
Similar Degrees You Can Earn
Why Is Claude Carlet Influential?
(Suggest an Edit or Addition)Claude Carlet's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Boolean Functions for Cryptography and Error-Correcting Codes (2010) (891)
- Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems (1998) (603)
- Algebraic Attacks and Decomposition of Boolean Functions (2004) (505)
- Vectorial Boolean Functions for Cryptography (2010) (443)
- Linear codes from perfect nonlinear mappings and their secret sharing schemes (2005) (307)
- Complementary dual codes for counter-measures to side-channel attacks (2016) (266)
- Algebraic immunity for cryptographically significant Boolean functions: analysis and construction (2006) (256)
- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity (2008) (244)
- On Correlation-Immune Functions (1991) (235)
- Highly nonlinear mappings (2004) (235)
- New classes of almost bent and almost perfect nonlinear polynomials (2005) (205)
- Two New Classes of Bent Functions (1994) (200)
- Boolean Functions for Cryptography and Coding Theory (2020) (183)
- Four decades of research on bent functions (2016) (172)
- The weight distribution of a class of linear codes from perfect nonlinear functions (2006) (143)
- Partially-bent functions (1992) (143)
- Constructing new APN functions from known ones (2009) (142)
- Construction of bent functions via Niho power functions (2006) (139)
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks (2006) (135)
- Two Classes of Quadratic APN Binomials Inequivalent to Power Functions (2008) (135)
- Linear Codes Over đœq Are Equivalent to LCD Codes for q>3 (2018) (134)
- Z2k-Linear Codes (1998) (128)
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts (2016) (122)
- Higher-Order Masking Schemes for S-Boxes (2012) (120)
- On cryptographic properties of the cosets of R(1, m) (2001) (116)
- Further properties of several classes of Boolean functions with optimum algebraic immunity (2009) (114)
- Euclidean and Hermitian LCD MDS codes (2017) (112)
- Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks (2013) (107)
- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction (2002) (106)
- Classes of Quadratic APN Trinomials and Hexanomials and Related Structures (2008) (104)
- On Dillon's class H of bent functions, Niho bent functions and o-polynomials (2011) (99)
- Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions (2000) (98)
- Propagation Characteristics of Boolean Functions (2005) (96)
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance (2012) (95)
- Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks (2014) (91)
- On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities (2006) (89)
- Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications (2008) (86)
- More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks (2011) (86)
- On the Secondary Constructions of Resilient and Bent Functions (2004) (83)
- On Plateaued Functions and Their Constructions (2003) (78)
- A method of construction of balanced functions with optimum algebraic immunity (2008) (77)
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions (2011) (72)
- Nonlinearities of S-boxes (2007) (69)
- Improving the Upper Bounds on the Covering Radii of Binary ReedâMuller Codes (2007) (68)
- On the Higher Order Nonlinearities of Algebraic Immune Functions (2006) (68)
- Generalized partial spreads (1995) (67)
- Boolean and Vectorial Plateaued Functions and APN Functions (2015) (66)
- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks (2005) (65)
- On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions (2004) (65)
- Differentially 4-uniform bijections by permuting the inverse function (2015) (65)
- Hyper-bent functions and cyclic codes (2004) (64)
- A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions (2014) (64)
- An infinite class of quadratic APN functions which are not equivalent to power mappings (2006) (63)
- On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions (2001) (60)
- New Characterization and Parametrization of LCD Codes (2017) (58)
- A characterization of binary bent functions (1996) (57)
- Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions (2012) (55)
- A construction of bent function (1996) (54)
- On Known and New Differentially Uniform Functions (2011) (53)
- Self-dual bent functions (2010) (53)
- More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings (1997) (50)
- A New Representation of Boolean Functions (1999) (49)
- One-weight Z4-linear Codes (2000) (48)
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions (2004) (48)
- On a construction of quadratic APN functions (2009) (45)
- On a weakness of the Tu-Deng function and its repair (2009) (44)
- On the construction of balanced boolean functions with a good algebraic immunity (2005) (43)
- Normal extensions of bent functions (2004) (42)
- Algebraic Decomposition for Probing Security (2015) (41)
- Boolean functions with restricted input and their robustness; application to the FLIP cipher (2017) (36)
- Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform (2018) (36)
- Secondary constructions of bent functions and their enforcement (2012) (36)
- Leakage Squeezing of Order Two (2012) (35)
- Further Results on Niho Bent Functions (2012) (35)
- Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions (2013) (34)
- On Cryptographic Complexity of Boolean Functions (2002) (33)
- On Linear Complementary Pairs of Codes (2018) (33)
- Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography (2016) (33)
- Connecting and Improving Direct Sum Masking and Inner Product Masking (2017) (32)
- On generalized bent and q-ary perfect nonlinear functions (1999) (32)
- Analysis of the algebraic side channel attack (2012) (31)
- On cryptographic propagation criteria for Boolean functions (1998) (31)
- The complexity of Boolean functions from cryptographic viewpoint (2006) (30)
- Open Questions on Nonlinearity and on APN Functions (2014) (30)
- Open Problems on Binary Bent Functions (2014) (30)
- Comments on "Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials" (2011) (29)
- An Alternate Characterization of the Bentness of Binary Functions, with Uniqueness (1998) (29)
- On Ï-LCD codes (2017) (29)
- Side-channel indistinguishability (2013) (28)
- Statistical properties of side-channel and fault injection attacks using coding theory (2018) (28)
- Achieving side-channel high-order correlation immunity with leakage squeezing (2014) (28)
- Upper bounds on the numbers of resilient functions and of bent functions (2006) (28)
- New Construction of Differentially 4-Uniform Bijections (2013) (28)
- Linear codes over Fq which are equivalent to LCD codes (2017) (27)
- More constructions of APN and differentially 4-uniform functions by concatenation (2013) (27)
- Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions (2014) (27)
- Covering Sequences of Boolean Functions and Their Cryptographic Significance (2002) (26)
- On the Propagation Criterion of Degree l and Order k (1998) (26)
- On Semibent Boolean Functions (2012) (26)
- Authentication Schemes from Highly Nonlinear Functions (2006) (26)
- An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity (2009) (26)
- Constructing balanced functions with optimum algebraic immunity (2007) (26)
- Constructing APN Functions Through Isotopic Shifts (2020) (26)
- Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks (2018) (25)
- CCZ-equivalence of bent vectorial functions and related constructions (2011) (25)
- Piecewise Constructions of Bent and Almost Optimal Boolean Functions (2005) (25)
- Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions (2004) (25)
- New secondary constructions of Bent functions (2016) (25)
- On the Higher Order Nonlinearities of Boolean Functions and S-boxes (2008) (24)
- On the construction of bent vectorial functions (2010) (24)
- On Upper Bounds for Algebraic Degrees of APN Functions (2018) (23)
- A New Class of Codes for Boolean Masking of Cryptographic Computations (2011) (23)
- On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators (2003) (22)
- Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks (2015) (22)
- On Almost Perfect Nonlinear Functions (2007) (22)
- On CCZ-equivalence and its use in secondary constructions of bent functions (2009) (22)
- Another class of quadratic APN binomials over F2n: the case n divisible by 4 (2006) (22)
- Linear codes with small hulls in semi-primitive case (2019) (21)
- Quadratic zero-difference balanced functions, APN functions and strongly regular graphs (2014) (21)
- Sequences and Their Applications - SETA 2010 - 6th International Conference, Paris, France, September 13-17, 2010. Proceedings (2010) (21)
- A transformation of boolean functions, its consequences on some problems related to Reed-Muller codes (1990) (20)
- On known constructions of APN and AB functions and their relation to each other (2020) (20)
- On the dual of bent functions with 2r Niho exponents (2011) (20)
- Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity (2017) (20)
- Stochastic Collision Attack (2017) (20)
- Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions (2014) (19)
- Cryptographic properties of the hidden weighted bit function (2014) (19)
- A class of quadratic APN binomials inequivalent to power functions (2006) (19)
- Improved Filter Permutators for Efficient FHE: Better Instances and Implementations (2019) (19)
- Optimizing Inner Product Masking Scheme by a Coding Theory Approach (2021) (19)
- Orthogonal Direct Sum Masking (2018) (18)
- Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective (2015) (18)
- Leakage squeezing: Optimal implementation and security evaluation (2014) (17)
- Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight (2015) (16)
- Bent, resilient functions and the numerical normal form (1999) (16)
- Optimal First-Order Masking with Linear and Non-linear Bijections (2012) (16)
- Binary linear codes from vectorial boolean functions and their weight distribution (2016) (15)
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience (2017) (15)
- Correlation-immune Boolean functions for easing counter measures to side-channel attacks (2014) (15)
- Generalized bent functions and their relation to Maiorana-McFarland class (2012) (14)
- Euclidean and Hermitian LCD MDS codes (2018) (13)
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator (2015) (13)
- CCZ-equivalence and Boolean functions (2009) (13)
- Constructing Low-Weight $d$ th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform (2018) (13)
- A Note on Semi-bent Boolean Functions (2010) (13)
- Linear Codes Over $\mathbb F_q$ Are Equivalent to LCD Codes for $q>3$ (2018) (13)
- Optimized linear complementary codes implementation for hardware trojan prevention (2015) (13)
- On bent functions associated to AB functions (2011) (13)
- On Cryptographic Properties of the Cosets of (2001) (12)
- An Upper Bound on the Number of m-Resilient Boolean Functions (2002) (12)
- Generalized Correlation Analysis of Vectorial Boolean Functions (2007) (12)
- More PS and H-like bent functions (2015) (11)
- On Z4-duality (1995) (11)
- Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions (2018) (11)
- A simple description of Kerdock codes (1989) (11)
- Generalized isotopic shift construction for APN functions (2020) (11)
- On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions (2009) (10)
- The Fifth International Studentsâ Olympiad in cryptographyâNSUCRYPTO: Problems and their solutions (2019) (10)
- A new concatenated type construction for LCD codes and isometry codes (2018) (10)
- Higher-Order CIS Codes (2014) (10)
- Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity (2010) (10)
- A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks (2014) (10)
- On the second-order nonlinearities of some bent functions (2013) (10)
- Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions (2020) (10)
- Niho bent functions from quadratic o-monomials (2014) (10)
- Cubic Boolean functions with highest resiliency (2004) (10)
- Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (2019) (9)
- Univariate Niho Bent Functions From o-Polynomials (2014) (9)
- Polynomial direct sum masking to protect against both SCA and FIA (2018) (9)
- The Automorphism Groups of the Kerdock Codes (1991) (9)
- Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks (2013) (9)
- On the supports of the Walsh transforms of Boolean functions (2004) (9)
- Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations (2019) (9)
- A Survey on Nonlinear Boolean Functions with Optimal Algebraic Immunity Suitable for Stream Ciphers (2013) (8)
- On Immunity Profile of Boolean Functions (2006) (8)
- Boolean functions for homomorphic-friendly stream ciphers (2019) (8)
- On Two Fundamental Problems on APN Power Functions (2022) (8)
- More Vectorial Boolean Functions with Unbounded nonlinearity Profile (2011) (8)
- Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions (2017) (8)
- On $\sigma$ -LCD Codes (2017) (8)
- Designing bent functions and resilient functions from known ones, without extending their number of variables (2005) (8)
- On the Distance Between APN Functions (2020) (8)
- A new construction of differentially 4-uniform (n, n-1)-functions (2015) (8)
- Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions (2021) (8)
- Concatenating Indicators of Flats for Designing Cryptographic Functions (2005) (7)
- Information Leakages in Code-based Masking: A Unified Quantification Approach (2021) (7)
- On o-Equivalence of Niho Bent Functions (2014) (7)
- Intrinsic Resiliency of S-Boxes Against Side-Channel AttacksâBest and Worst Scenarios (2021) (7)
- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions (2015) (7)
- Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency (2011) (7)
- On the algebraic thickness and non-normality of Boolean functions (2003) (7)
- On the nonlinearity profile of the Dillon function (2009) (7)
- Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function (2008) (6)
- Vectorial Functions and Covering Sequences (2003) (6)
- Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets (2018) (6)
- Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings (2007) (6)
- Comments on 'Generating and counting binary Bent sequences' (1994) (6)
- New balanced Boolean functions satisfying all the main cryptographic criteria (2008) (6)
- A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions (2022) (6)
- Spectral methods for cross correlations of geometric sequences (2004) (6)
- On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials (2017) (6)
- Problems and solutions from the fourth International Studentsâ Olympiad in Cryptography (NSUCRYPTO) (2018) (6)
- A lower bound on the higher order nonlinearity of algebraic immune functions (2005) (6)
- On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures (2018) (6)
- On the nonlinearity of monotone Boolean functions (2018) (5)
- Handling Vectorial Functions by Means of Their Graph Indicators (2020) (5)
- Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets (2015) (5)
- Bent functions on a Galois ring and systematic authentication codes (2012) (5)
- Cryptographic properties of monotone Boolean functions (2016) (5)
- On the divisibility properties and nonlinearity of resilient functions (2000) (5)
- Evolutionary algorithms-assisted construction of cryptographic boolean functions (2021) (5)
- Polynomial Evaluation and Side Channel Analysis (2015) (5)
- On the Derivative Imbalance and Ambiguity of Functions (2017) (4)
- Improving the upper bounds on the covering radii of Reed-Muller codes (2005) (4)
- A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers (2020) (4)
- On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity (2008) (4)
- A direct proof of APN-ness of the Kasami functions (2020) (4)
- A Further Study of Quadratic APN Permutations in Dimension Nine (2021) (4)
- Algebraic manipulation detection codes with perfect nonlinear functions under non-uniform distribution (2017) (3)
- On the Sixth International Olympiad in Cryptography NSUCRYPTO (2020) (3)
- Detecting faults in inner product masking scheme (2020) (3)
- Cellular Network Security (2011) (3)
- Conceptual Modeling (2012) (3)
- The automorphism groups of the Delsarte-Goethals codes (1993) (3)
- Guest editorial for the special issue for Jacques Wolfmann (2011) (3)
- On the arithmetic Walsh coefficients of Boolean functions (2014) (3)
- A Search for Differentially-6 Uniform (n, n-2) Functions (2018) (3)
- Parameterization of Boolean functions by vectorial functions and associated constructions (2021) (3)
- Security, Privacy, and Applied Cryptography Engineering (2016) (3)
- On Isotopic Shift Construction for Planar Functions (2019) (3)
- On those multiplicative subgroups of F â 2 n which are Sidon sets and/or sum-free sets (2020) (2)
- Asymptotic lower bound on the algebraic immunity of random balanced multi-output Boolean functions (2013) (2)
- On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences (2021) (2)
- Constructing infinite families of low differential uniformity (n, m)-functions with $$m>n/2$$m>n/2 (2018) (2)
- S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels (2015) (2)
- The Divisors of x2m+x of Constant Derivatives and Degree 2m-2 (1994) (2)
- Evolving constructions for balanced, highly nonlinear boolean functions (2022) (2)
- Quadratic zero-difference balanced functions, APN functions and strongly regular graphs (2014) (2)
- On the (non-)existence of APN (n, n)-functions of algebraic degree n (2016) (2)
- Codes, Cryptology, and Information Security (2015) (2)
- Some (almost) optimally extendable linear codes (2019) (2)
- Nonlinearity of Boolean Functions (2005) (2)
- An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO" (2022) (2)
- Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity (2006) (2)
- Proceedings of the 1st international workshop on Arithmetic of Finite Fields (2007) (1)
- Algebraic Immunity of Boolean Functions (2011) (1)
- Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions (2012) (1)
- Characterizations of o-polynomials by the Walsh transform (2017) (1)
- The Seventh International Olympiad in Cryptography: Problems and solutions (2021) (1)
- Partial covering sequences: a method for designing classes of cryptographic functions (2008) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields (2022) (1)
- A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function (2022) (1)
- On APN Functions Whose Graphs are Maximal Sidon Sets (2022) (1)
- On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions (2020) (1)
- Three basic questions on Boolean functions (2017) (1)
- On group rings and some of their applications to combinatorics and symmetric cryptography (2015) (1)
- Two constructions of optimal pairs of linear codes for resisting side channel and fault injection attacks (2018) (1)
- Revisiting some results on APN and algebraic immune functions (2021) (1)
- On Dillon's class H of Niho bent functions and o-polynomials (2012) (1)
- Fourier spectrum of optimal Boolean functions via Kasami's identities (2000) (1)
- Boolean functions, vectorial functions, and cryptography (2020) (1)
- Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators (2022) (1)
- On the secondary constructions of resilient functions (2004) (1)
- A Search for Additional Structure: The Case of Cryptographic S-boxes (2020) (1)
- Z/sub 2/k-linear codes (1998) (1)
- Changing Points in APN Functions (2018) (1)
- Statistical properties of side-channel and fault injection attacks using coding theory (2017) (1)
- ON GROUP RINGS AND SOME OF THEIR APPLICATIONS TO COMBINATORICS AND CRYPTOGRAPHY (2015) (1)
- Detecting faults in inner product masking scheme (2020) (1)
- BIOS Basic Input Output System (2011) (0)
- Differentially 4-uniform bijections by permuting the inverse function (2014) (0)
- Constructing inïŹnite families of low differential uniformity ( n , m ) -functions with m > n / 2 (2018) (0)
- On those Boolean functions that are coset leaders of first order Reed-Muller codes (2023) (0)
- Analysis of the algebraic side channel attack (2012) (0)
- Bent functions and plateaued functions (2020) (0)
- On generalizing the power function exponent constructions with genetic programming (2022) (0)
- Three parameters of Boolean functions related to their constancy on affine spaces (2020) (0)
- Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography (2021) (0)
- Boolean Functions on Finite Fields of Characteristic 2 (1993) (0)
- Editorial: Special Issue on Boolean functions and their applications (2018) (0)
- Introduction to cryptography, codes, Boolean, and vectorial functions (2020) (0)
- Editorial: Special issue on Boolean functions and their applications 2018 (2019) (0)
- Correlation Immune and Resilient Boolean Functions (2005) (0)
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator (2014) (0)
- OnAlmostPerfect Nonlinear Functions (2007) (0)
- Minimal value set polynomials and Frobenius non-classical curves (2010) (0)
- Some observations and open problems on APN functions (1998) (0)
- Editorial: Special issue on Boolean functions and their applications 2021 (2022) (0)
- On the formal duals of Kerdock codes (1994) (0)
- Information Leakages in Code-based Masking (2021) (0)
- Preface: Volume 6 (2001) (0)
- Some (almost) optimally extendable linear codes (2019) (0)
- Access Lists (2020) (0)
- Recent uses of Boolean and vectorial functions and related problems (2020) (0)
- Construction of Efficient Codes for High-Order Direct Sum Masking (2019) (0)
- Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks (2019) (0)
- A general case of normal duality between binary nonlinear codes (1993) (0)
- Quasi-linear masking to protect against both SCA and FIA (2023) (0)
- More constructions of APN and differentially 4-uniform functions by concatenation (2013) (0)
- Gold functions and switched cube functions are not 0-extendable in dimension n > 5 (2022) (0)
- On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ F 2 n (2020) (0)
- The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions (2021) (0)
- New secondary constructions of Bent functions (2016) (0)
- New Results - Primitives du chiffrement symétrique (2002) (0)
- On the arithmetic Walsh coefficients of Boolean functions (2014) (0)
- Kalpa Publications in Computing (2019) (0)
- Proceedings of the 6th international conference on Sequences and their applications (2010) (0)
- On 24- Duality (1995) (0)
- Highly nonlinear vectorial functions with low differential uniformity (2020) (0)
- Relation between o-equivalence and EA-equivalence for Niho bent functions (2021) (0)
- Four decades of research on bent functions (2015) (0)
- Boolean Functions (2019) (0)
- An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes (2022) (0)
- Preface (2003) (0)
- Generalized partial spreads, geometric forms of bent functions (1995) (0)
- Editorial: Special Issue on Boolean functions and their applications (2018) (0)
- Structural Attack (and Repair) of Diffused-Input-Blocked-Output WBC (2021) (0)
- Credential Verification (2011) (0)
- Guest Editorial (2000) (0)
- Particular classes of Boolean functions (2020) (0)
- Appendix: finite fields (2020) (0)
- and Deng Tang Cryptographic properties of monotone Boolean functions (2016) (0)
- Generalized isotopic shift construction for APN functions (2020) (0)
- Private Key Cryptosystem (2006) (0)
- Cryptography and Communications (2011) (0)
- The bank card (2013) (0)
- Achieving side-channel high-order correlation immunity with leakage squeezing (2014) (0)
- On the nonlinearity of monotone Boolean functions (2017) (0)
- Guest Editorial (2014) (0)
- New Results - Fonctions booléennes (2005) (0)
- The weight spectrum of several families of Reed-Muller codes (2023) (0)
- A Survey on Nonlinear Boolean Functions with Optimal Algebraic Immunity Suitable for Stream Ciphers (2013) (0)
- Boolean functions, vectorial functions, and error-correcting codes (2020) (0)
- Foreword (2001) (0)
- Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks (2014) (0)
- Evolutionary Strategies for the Design of Binary Linear Codes (2022) (0)
- Editorial: Special issue on Boolean functions and their applications 2020 (2021) (0)
- A NEW CONSTRUCTION OF DIFFERENTIALLY 4-UNIFORM (2015) (0)
- Polynomial direct sum masking to protect against both SCA and FIA (2018) (0)
- Codes, Cryptology, and Information Security: First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger (2015) (0)
- Simplicity conditions for binary orthogonal arrays (2022) (0)
- Pseudo-linear Codes (1991) (0)
- Biometric Cryptosystem (2009) (0)
- Editorial: Cryptography and Communications, Volume 1, Issue 1 (2009) (0)
- Gold Functions Are Not 0-Extendable in Dimension n>5 (2022) (0)
- On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures (2018) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Claude Carlet?
Claude Carlet is affiliated with the following schools: