default search action
Lilya Budaghyan
Person information
- affiliation: University of Bergen, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j35]Lilya Budaghyan, Ivana Ivkovic, Nikolay S. Kaleyski:
Triplicate functions. Cryptogr. Commun. 15(1): 35-83 (2023) - [j34]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Wilfried Meidl:
Editorial: Special issue on Boolean functions and their applications 2022. Cryptogr. Commun. 15(6): 1049-1051 (2023) - [j33]José Luis Imaña, Nikolay S. Kaleyski, Lilya Budaghyan:
Hardware architecture of Dillon's APN permutation for different primitive polynomials. Microprocess. Microsystems 103: 104945 (2023) - [j32]Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes. IEEE Trans. Inf. Theory 69(10): 6700-6710 (2023) - [i30]Lilya Budaghyan, Mohit Pal:
ARITHMETIZATION-ORIENTED APN FUNCTIONS. IACR Cryptol. ePrint Arch. 2023: 1081 (2023) - [i29]Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stanica, Svetla Nikova:
On Decompositions of Permutations in Quadratic Functions. IACR Cryptol. ePrint Arch. 2023: 1632 (2023) - 2022
- [j31]Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica:
On the behavior of some APN permutations under swapping points. Cryptogr. Commun. 14(2): 319-345 (2022) - [j30]Lilya Budaghyan, Claude Carlet, Cunsheng Ding, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications 2021. Cryptogr. Commun. 14(6): 1207-1209 (2022) - [j29]Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay S. Kaleyski:
On Two Fundamental Problems on APN Power Functions. IEEE Trans. Inf. Theory 68(5): 3389-3403 (2022) - [c12]José Luis Imaña, Lilya Budaghyan, Nikolay S. Kaleyski:
Decomposition of Dillon's APN Permutation with Efficient Hardware Implementation. WAIFI 2022: 250-268 - [i28]Anastasiya Gorodilova, Natalia N. Tokareva, Sergey Agievich, Ilya Beterov, Tim Beyne, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Valeria Idrisova, Nikolay Kolomeec, Aleksandr Kutsenko, Ekaterina Malygina, Nicky Mouha, Marina Pudovkina, Francesco Sica, Aleksei Udovenko:
An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO". CoRR abs/2204.11502 (2022) - [i27]Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes. IACR Cryptol. ePrint Arch. 2022: 1141 (2022) - 2021
- [j28]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Kaisa Nyberg:
Editorial: Special issue on Boolean functions and their applications 2020. Cryptogr. Commun. 13(6): 887-889 (2021) - [j27]Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Generalized isotopic shift construction for APN functions. Des. Codes Cryptogr. 89(1): 19-32 (2021) - [j26]Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila:
Relation between o-equivalence and EA-equivalence for Niho bent functions. Finite Fields Their Appl. 72: 101834 (2021) - [i26]Lilya Budaghyan, Ivana Ivkovic, Nikolay S. Kaleyski:
Triplicate functions. IACR Cryptol. ePrint Arch. 2021: 1387 (2021) - 2020
- [j25]Lilya Budaghyan, Marco Calderini, Irene Villa:
On relations between CCZ- and EA-equivalences. Cryptogr. Commun. 12(1): 85-100 (2020) - [j24]Lilya Budaghyan, Nikolay S. Kaleyski, Soonhak Kwon, Constanza Riera, Pantelimon Stanica:
Partially APN Boolean functions and classes of functions that are not APN infinitely often. Cryptogr. Commun. 12(3): 527-545 (2020) - [j23]Lilya Budaghyan, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications. Cryptogr. Commun. 12(5): 819-820 (2020) - [j22]Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica:
Partially APN functions with APN-like polynomial representations. Des. Codes Cryptogr. 88(6): 1159-1177 (2020) - [j21]Lilya Budaghyan, Marco Calderini, Irene Villa:
On equivalence between known families of quadratic APN functions. Finite Fields Their Appl. 66: 101704 (2020) - [j20]Yuyin Yu, Nikolay S. Kaleyski, Lilya Budaghyan, Yongqiang Li:
Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9. Finite Fields Their Appl. 68: 101733 (2020) - [j19]Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Constructing APN Functions Through Isotopic Shifts. IEEE Trans. Inf. Theory 66(8): 5299-5309 (2020) - [j18]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay S. Kaleyski:
On the Distance Between APN Functions. IEEE Trans. Inf. Theory 66(9): 5742-5753 (2020) - [j17]Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski:
A New Family of APN Quadrinomials. IEEE Trans. Inf. Theory 66(11): 7081-7087 (2020) - [i25]Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Generalized Isotopic Shift Construction for APN Functions. IACR Cryptol. ePrint Arch. 2020: 295 (2020) - [i24]Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica:
On the sensitivity of some APN permutations to swapping points. IACR Cryptol. ePrint Arch. 2020: 557 (2020) - [i23]Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay S. Kaleyski:
On two fundamental problems on APN power functions. IACR Cryptol. ePrint Arch. 2020: 1359 (2020) - [i22]Marco Calderini, Lilya Budaghyan, Claude Carlet:
On known constructions of APN and AB functions and their relation to each other. IACR Cryptol. ePrint Arch. 2020: 1444 (2020)
2010 – 2019
- 2019
- [j16]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
Editorial: Special Issue on Boolean functions and their applications. Cryptogr. Commun. 11(1): 1-2 (2019) - [j15]Lilya Budaghyan, Chunlei Li, Matthew Geoffrey Parker:
Editorial: Special Issue on Mathematical Methods for Cryptography. Cryptogr. Commun. 11(3): 363-365 (2019) - [j14]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications 2018. Cryptogr. Commun. 11(6): 1145-1146 (2019) - [c11]Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
On Isotopic Shift Construction for Planar Functions. ISIT 2019: 2962-2966 - [i21]Lilya Budaghyan, Nikolay S. Kaleyski, Soonhak Kwon, Constanza Riera, Pantelimon Stanica:
Partially APN Boolean functions and classes of functions that are not APN infinitely often. CoRR abs/1905.13025 (2019) - [i20]Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila:
Relation between o-equivalence and EA-equivalence for Niho bent functions. IACR Cryptol. ePrint Arch. 2019: 789 (2019) - [i19]Lilya Budaghyan, Marco Calderini, Irene Villa:
On equivalence between known families of quadratic APN functions. IACR Cryptol. ePrint Arch. 2019: 793 (2019) - [i18]Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski:
A new family of APN quadrinomials. IACR Cryptol. ePrint Arch. 2019: 994 (2019) - [i17]Yuyin Yu, Nikolay S. Kaleyski, Lilya Budaghyan, Yongqiang Li:
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9. IACR Cryptol. ePrint Arch. 2019: 1491 (2019) - 2018
- [j13]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun:
On Upper Bounds for Algebraic Degrees of APN Functions. IEEE Trans. Inf. Theory 64(6): 4399-4411 (2018) - [e1]Lilya Budaghyan, Francisco Rodríguez-Henríquez:
Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11321, Springer 2018, ISBN 978-3-030-05152-5 [contents] - [i16]Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Constructing APN functions through isotopic shifts. IACR Cryptol. ePrint Arch. 2018: 769 (2018) - [i15]Lilya Budaghyan, Marco Calderini, Irene Villa:
On relations between CCZ- and EA-equivalences. IACR Cryptol. ePrint Arch. 2018: 796 (2018) - [i14]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay S. Kaleyski:
Changing Points in APN Functions. IACR Cryptol. ePrint Arch. 2018: 1217 (2018) - 2017
- [c10]Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. C2SI 2017: 3-16 - 2016
- [j12]Lilya Budaghyan, Tor Helleseth, Alexander Kholosha:
Editorial: Special issue on Boolean functions and their applications. Cryptogr. Commun. 8(2): 173-174 (2016) - [j11]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Univariate Niho Bent Functions From o-Polynomials. IEEE Trans. Inf. Theory 62(4): 2254-2265 (2016) - [c9]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. ISIT 2016: 480-484 - [i13]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. IACR Cryptol. ePrint Arch. 2016: 143 (2016) - [i12]Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. IACR Cryptol. ePrint Arch. 2016: 1183 (2016) - 2014
- [b1]Lilya Budaghyan:
Construction and Analysis of Cryptographic Functions. Springer 2014, ISBN 978-3-319-12990-7, pp. 1-168 - [j10]Lilya Budaghyan, Tor Helleseth, Matthew Geoffrey Parker:
Editorial: special issue on coding and cryptography. Des. Codes Cryptogr. 73(2): 269 (2014) - [c8]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Niho bent functions from quadratic o-monomials. ISIT 2014: 1827-1831 - [c7]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha:
On o-Equivalence of Niho Bent Functions. WAIFI 2014: 155-168 - [i11]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Univariate Niho Bent Functions from o-Polynomials. CoRR abs/1411.2394 (2014) - 2012
- [j9]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha, Sihem Mesnager:
Further Results on Niho Bent Functions. IEEE Trans. Inf. Theory 58(11): 6979-6985 (2012) - [c6]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha:
Generalized bent functions and their relation to Maiorana-McFarland class. ISIT 2012: 1212-1215 - [c5]Lilya Budaghyan, Oleksandr Kazymyrov:
Verification of Restricted EA-Equivalence for Vectorial Boolean Functions. WAIFI 2012: 108-118 - 2011
- [j8]Lilya Budaghyan, Tor Helleseth:
New commutative semifields defined by new PN multinomials. Cryptogr. Commun. 3(1): 1-16 (2011) - [j7]Lilya Budaghyan, Claude Carlet:
CCZ-equivalence of bent vectorial functions and related constructions. Des. Codes Cryptogr. 59(1-3): 69-87 (2011) - [j6]Lilya Budaghyan, Tor Helleseth:
On Isotopisms of Commutative presemifields and CCZ-Equivalence of Functions. Int. J. Found. Comput. Sci. 22(6): 1243-1258 (2011) - [c4]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
On bent functions associated to AB functions. ITW 2011: 150-154 - 2010
- [i10]Lilya Budaghyan, Tor Helleseth:
On isotopisms of commutative presemifields and CCZ-equivalence of functions. IACR Cryptol. ePrint Arch. 2010: 507 (2010)
2000 – 2009
- 2009
- [j5]Lilya Budaghyan, Alexander Pott:
On differential uniformity and nonlinearity of functions. Discret. Math. 309(2): 371-384 (2009) - [j4]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. Finite Fields Their Appl. 15(2): 150-159 (2009) - [i9]Lilya Budaghyan, Claude Carlet:
On CCZ-equivalence and its use in secondary constructions of bent functions. IACR Cryptol. ePrint Arch. 2009: 42 (2009) - [i8]Lilya Budaghyan, Tor Helleseth:
New commutative semifields defined by PN multinomials. IACR Cryptol. ePrint Arch. 2009: 53 (2009) - [i7]Lilya Budaghyan, Claude Carlet:
CCZ-equivalence and Boolean functions. IACR Cryptol. ePrint Arch. 2009: 63 (2009) - 2008
- [j3]Lilya Budaghyan, Claude Carlet:
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures. IEEE Trans. Inf. Theory 54(5): 2354-2357 (2008) - [j2]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions. IEEE Trans. Inf. Theory 54(9): 4218-4229 (2008) - [c3]Lilya Budaghyan, Tor Helleseth:
New Perfect Nonlinear Multinomials over Ffor Any Odd Prime p. SETA 2008: 403-414 - 2007
- [c2]Lilya Budaghyan:
The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions. WAIFI 2007: 177-188 - [i6]Lilya Budaghyan:
The simplest method for constructing APN polynomials EA-inequivalent to power functions. IACR Cryptol. ePrint Arch. 2007: 58 (2007) - [i5]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. IACR Cryptol. ePrint Arch. 2007: 63 (2007) - [i4]Lilya Budaghyan, Claude Carlet:
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures. IACR Cryptol. ePrint Arch. 2007: 98 (2007) - 2006
- [j1]Lilya Budaghyan, Claude Carlet, Alexander Pott:
New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3): 1141-1152 (2006) - [c1]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. ISIT 2006: 2637-2641 - [i3]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Another class of quadratic APN binomials over F2n: the case n divisible by 4. IACR Cryptol. ePrint Arch. 2006: 428 (2006) - [i2]Lilya Budaghyan, Claude Carlet, Gregor Leander:
A class of quadratic APN binomials inequivalent to power functions. IACR Cryptol. ePrint Arch. 2006: 445 (2006) - 2005
- [i1]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. IACR Cryptol. ePrint Arch. 2005: 359 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint