Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Search for Boolean functions with excellent profiles in the rotation symmetric class
For the first time Boolean functions on 9 variables having nonlinearity 241 are discovered,
that remained as an open question in literature for almost three decades. Such functions are …
that remained as an open question in literature for almost three decades. Such functions are …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
Results on rotation symmetric bent and correlation immune Boolean functions
Recent research shows that the class of Rotation Symmetric Boolean Functions (RSBFs), ie,
the class of Boolean functions that are invariant under circular translation of indices, is …
the class of Boolean functions that are invariant under circular translation of indices, is …
Secure industrial Internet of Things critical infrastructure node design
JM Mcginthy, AJ Michaels - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Integration of industrial Internet of Things (IIoT) into critical infrastructures (CIs) is aiming to
improve efficiency in many crucial areas. The positive benefits of IIoT are increasing the …
improve efficiency in many crucial areas. The positive benefits of IIoT are increasing the …
On the secondary constructions of resilient and bent functions
C Carlet - Coding, Cryptography and Combinatorics, 2004 - Springer
We first give a survey of the known secondary constructions of Boolean functions, permitting
to obtain resilient functions achieving the best possible trade-offs between resiliency order …
to obtain resilient functions achieving the best possible trade-offs between resiliency order …
Evolving Boolean functions satisfying multiple criteria
Many desirable properties have been identified for Boolean functions with cryptographic
applications. Obtaining optimal tradeoffs among such properties is hard. In this paper we …
applications. Obtaining optimal tradeoffs among such properties is hard. In this paper we …
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
Recently, weight divisibility results on resilient and correlation immune Boolean functions
have received a lot of attention. These results have direct consequences towards the upper …
have received a lot of attention. These results have direct consequences towards the upper …
Almost Boolean functions: The design of Boolean functions by spectral inversion
The design of Boolean functions with properties of cryptographic significance is a hard task.
In this paper, we adopt an unorthodox approach to the design of such functions. Our search …
In this paper, we adopt an unorthodox approach to the design of such functions. Our search …