Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity
C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …
the introduction of the related notion of algebraic immunity, several constructions of infinite …
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
In this paper we propose several efficient algorithms for assessing the resistance of Boolean
functions against algebraic and fast algebraic attacks when implemented in LFSR-based …
functions against algebraic and fast algebraic attacks when implemented in LFSR-based …
Measurement of the e+ e−→ bb and e+ e−→ cc forward-backward asymmetries at the Z0 resonance
O Adriani, M Aguilar-Benitez, S Ahlen, H Akbari… - Physics Letters B, 1992 - Elsevier
We have measured the forward-backward asymmetry in e+ e−→ bb and e+ e−→ cc
processes using hadronic events containing muons or electrons. The data sample …
processes using hadronic events containing muons or electrons. The data sample …
On algebraic immunity and annihilators
XM Zhang, J Pieprzyk, Y Zheng - … Security and Cryptology–ICISC 2006: 9th …, 2006 - Springer
Algebraic immunity AI (f) defined for a boolean function f measures the resistance of the
function against algebraic attacks. Currently known algorithms for computing the optimal …
function against algebraic attacks. Currently known algorithms for computing the optimal …
A simple stream cipher with proven properties
W Si, C Ding - Cryptography and communications, 2012 - Springer
Both stream ciphers and block ciphers can be used to provide data confidentiality service.
Stream ciphers are preferred in many applications, since they can destroy statistical …
Stream ciphers are preferred in many applications, since they can destroy statistical …
Reducing the number of homogeneous linear equations in finding annihilators
Given a Boolean function f on n-variables, we find a reduced set of homogeneous linear
equations by solving which one can decide whether there exist annihilators at degree d or …
equations by solving which one can decide whether there exist annihilators at degree d or …
Some necessary conditions of boolean functions to resist algebraic attacks
D Dalai - 2006 - search.proquest.com
In this thesis we discuss certain properties of Boolean functions that are necessary for
resistance against algebraic and fast algebraic attacks. A Boolean function f (x 1,..., xn) on n …
resistance against algebraic and fast algebraic attacks. A Boolean function f (x 1,..., xn) on n …
On the Boolean functions with maximum possible algebraic immunity: construction and a lower bound of the count
L Qu, G Feng, C Li - Cryptology ePrint Archive, 2005 - eprint.iacr.org
This paper gives a construction method which can get a large class of Boolean functions
with maximum algebraic immunity (AI) from one such giving function. Our constructions get …
with maximum algebraic immunity (AI) from one such giving function. Our constructions get …
A motion computation and interpretation framework for oceanographic satellite images
We present a motion computation and interpretation framework for oceanographic satellite
images. This framework is based on the use of a non quadratic regularization technique in …
images. This framework is based on the use of a non quadratic regularization technique in …