Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
[PDF][PDF] A bound on correlation immunity.
DG Fon-Der-Flaass - Sibirskie Ehlektronnye Matematicheskie Izvestiya …, 2007 - eudml.org
In this note we prove a new bound on correlation immunity of unbalanced Boolean
functions. This bound was conjectured by Yu. Tarannikov. Let Ω={1,..., n}. The powerset H …
functions. This bound was conjectured by Yu. Tarannikov. Let Ω={1,..., n}. The powerset H …
[图书][B] Boolean functions in coding theory and cryptography
OA Logachev, AA Sal_nikov, VV I_A_shchenko - 2012 - books.google.com
This book offers a systematic presentation of cryptographic and code-theoretic aspects of the
theory of Boolean functions. Both classical and recent results are thoroughly presented …
theory of Boolean functions. Both classical and recent results are thoroughly presented …
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
This paper presents an efficient approach to the classification of the affine equivalence
classes of cosets of the first order Reed-Muller code with respect to cryptographic properties …
classes of cosets of the first order Reed-Muller code with respect to cryptographic properties …
Analysis of affine equivalent Boolean functions for cryptography
JE Fuller - 2003 - eprints.qut.edu.au
Boolean functions are an important area of study for cryptography. These functions,
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …
New constructions of resilient Boolean functions with maximal nonlinearity
Y Tarannikov - Fast Software Encryption: 8th International Workshop …, 2002 - Springer
In this paper we develop a technique that allows to obtain new effective constructions of
highly resilient Boolean functions with high nonlinearity. In particular, we prove that the …
highly resilient Boolean functions with high nonlinearity. In particular, we prove that the …
Autocorrelation properties of correlation immune Boolean functions
S Maitra - Progress in Cryptology—INDOCRYPT 2001: Second …, 2001 - Springer
In this paper we study the autocorrelation values of correlation immune and resilient
Boolean functions. We provide new lower bounds and related results on absolute indicator …
Boolean functions. We provide new lower bounds and related results on absolute indicator …
Additive autocorrelation of resilient Boolean functions
G Gong, K Khoo - International Workshop on Selected Areas in …, 2003 - Springer
In this paper, we introduce a new notion called the dual function for studying Boolean
functions. First, we discuss general properties of the dual function that are related to …
functions. First, we discuss general properties of the dual function that are related to …