References

[1] Adams C. On immunity against Biham and Shamir’s “differential cryptanalysis". Inf Process Lett. 1992;41:77–80.

[2] Adams C. Constructing symmetric ciphers using the CAST design procedure. Des Codes Crypt. 1997;12(3):283–316.

[3] Adams C, Tavares S. The structured design of cryptographically good S-boxes. J Cryptol. 1990;3(1):27–43.

[4] Adams C, Tavares S. Generating and counting binary bent sequences. IEEE Trans Inform Theory. 1990;36:1170–1173.

[5] Ageev DV. Foundations of the theory of linear selection. A code channel division. In: Collection of scientific papers of the Leningrad experimental institute of communications. 1935 [in Russian].

[6] Agibalov GP. Selected theorems of the initial course of cryptography. Tomsk: Tomsk ...

Get Bent Functions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.