References
L.A. Bassalygo, G.V. Zaitsev, and V.A. Zinoviev, Uniformly packed codes, Problems of Information Transmission, Vol. 10, No1 (1974) pp. 9–14.
L.A. Bassalygo and V.A. Zinoviev, Remark on uniformly packed codes, Problems of Information Transmission, Vol. 13, No3 (1977) pp. 22–25.
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol. 4, No.1 (1991) pp. 3–72.
A.E. Brouwer and L.M.G.M. Tolhuizen, A Sharpening of the Johnson Bound for Binary Linear Codes, Designs, Codes and Cryptography, Vol. 3, No.1 (1993) pp. 95–98.
A.R. Calderbank, G. McGuire, B. Poonen and M. Rubinstein, On a conjecture of Helleseth regarding pairs of binary m-sequences, IEEE Transactions on Information Theory, Vol. 42 (1996) pp. 988–990.
P. Camion and A. Canteaut, Construction of t-resilient functions over a finite alphabet, Advances in Cryptology, EUROCRYPT'96, Lecture Notes in Computer Science, Springer-Verlag, New York, 1070 (1996) pp 283–293.
C. Carlet, Partially-bent functions, Designs Codes and Cryptography, Vol. 3 (1993) pp. 135–145.
C. Carlet, Two new classes of bent functions, Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 77–101.
T. Cusick and H. Dobbertin, Some new 3-valued crosscorrelation functions of binary m-sequences, IEEE Transactions on Information Theory, Vol. 42 (1996) pp. 1238–1240.
F. Chabaud and S. Vaudenay, Links between differential and linear cryptanalysis, Advances in Cryptology, EUROCRYPT'94, Lecture Notes in Computer Science, Springer-Verlag, NewYork, 950 (1995) pp. 356–365.
P. Charpin, A. Tietäväinen and V. Zinoviev, On binary cyclic codes with d = 3, Problems of Information Transmission, Vol. 33, No.3 (1997).
P. Delsarte, Four Fundamental parameters of a code and their combinatorial significance, Inf. and Contr. Vol. 23 (1973) pp. 407–438.
J.F. Dillon, Elementary Hadamard Difference Sets, Ph. D. Thesis, Univ. of Maryland (1974).
H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity, Fast Software Encryption: Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms, Lecture Notes in Computer Science, Springer-Verlag, New York, 1008 (1995) pp. 61–74.
H. Dobbertin, One to one highly nonlinear power functions on GF(2n), preprint.
H. Dobbertin, Almost perfect nonlinear power functions on GF(2n), preprint.
H. Dobbertin, Another proof of Kasami's theorem, preprint.
S.M. Dodunekov and V.A. Zinoviev, V.A. A note on Preparata Codes, Proceedings of Sixth Intern. Symp. on Information Theory, Moscow-Tashkent Part 2 (1984) pp. 78–80.
J.M. Goethals and S.L. Snover, Nearly perfect codes, Discrete Mathematics, Vol. 3 (1972) pp. 64–88.
J.M. Goethals and H.C.A. Van Tilborg, Uniformly packed codes, Philips Res. Repts Vol. 30 (1975) pp. 9–36.
T. Helleseth and P.V. Kumar, Sequences with low correlation, Handbook of coding theory (V. S. Pless and W. C. Huffman, eds., R. A. Brualdi, asst. ed.), to appear.
H. Janwa, G. McGuire and R.M. Wilson Double-error-correcting codes and absolutely irreductible polynomials over GF(2), Journal of Algebra, Vol. 178 (1995) pp. 665–676.
T. Kasami, Weight distributions of Bose-Chaudhuri-Hocquenghem Codes, Combinatorial Math. and Applications (R.C. Bose and T.A. Dowlings, eds.), Univ. of North Carolina Press, Chapel Hill, NC (1969).
T. Kasami, The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes, Information and Control Vol. 18 (1971) pp. 369–394.
G. Lachaud and J. Wolfmann, The weights of the orthogonals of the extended quadratic binary Goppa codes, IEEE Transactions on Information Theory, Vol. 36 (1990) pp. 686–692.
R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia of Mathematics and its Applications, Vol. 20, Cambridge University Press, Cambridge (1983).
Y. Niho, Multi-valued cross-correlation functions between two maximal linear recursive sequences, Ph. D. Thesis, USCEE Rep. 409 (1972).
V. Pless, Power moment identities on weight distributions in error-correcting codes, Info. and Control, Vol. 6 (1963) pp. 147–152.
F.J. Mac Williams and N.J. Sloane, The theory of error-correcting codes, Amsterdam, The Netherlands: North Holland (1977).
M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptography, EUROCRYPT'93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 386–397.
K. Nyberg, Perfect non-linear S-boxes, Advances in Cryptology, EUROCRYPT' 91, Lecture Notes in Computer Science, Springer-Verlag, New York, 547 (1992) pp. 378–386.
K. Nyberg, Differentially uniform mappings for cryptography, Advances in Cryptography, EUROCRYPT' 93, Lecture Notes in Computer Science, Springer-Verlag, New York, 765 (1994) pp. 55–64.
O.S. Rothaus, On Bent Functions, J. Comb. Theory, Vol. 20A (1976) pp. 300–305.
N.V. Semakov, V.A. Zinoviev and G.V. Zaitsev, Uniformly packed codes, Problems of Information Transmission, Vol. 7, No1 (1971) pp. 38–50.
V.M. Sidel'nikov, On the mutual correlation of sequences, Soviet Math. Dokl., Vol. 12 (1971) pp. 197–201
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Carlet, C., Charpin, P. & Zinoviev, V. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems. Designs, Codes and Cryptography 15, 125–156 (1998). https://doi.org/10.1023/A:1008344232130
Issue Date:
DOI: https://doi.org/10.1023/A:1008344232130