[引用][C] Boolean functions for cryptography and coding theory

C Carlet - 2021 - Cambridge University Press

Low c-differential and c-boomerang uniformity of the swapped inverse function

P Stănică - Discrete Mathematics, 2021 - Elsevier
Modifying the binary inverse function in a variety of ways, like swapping two output points
has been known to produce a 4-differential uniform permutation function. Recently, in [21] it …

On the distance between APN functions

L Budaghyan, C Carlet, T Helleseth… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate the differential properties of a vectorial Boolean function G obtained by
modifying an APN function F. This generalizes previous constructions where a function is …

Low c-Differential Uniformity for the Gold Function Modified on a Subfield

P Stănică - Security and Privacy: Select Proceedings of ICSP 2020, 2021 - Springer
Modifying the binary inverse function (which is used in the Advanced Encryption Standard)
in a variety of ways, like swapping two output points, has been known to produce a 4 …

The classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functions

K Kalgin, V Idrisova - Cryptography and Communications, 2023 - Springer
Almost perfect nonlinear functions possess optimal resistance to differential cryptanalysis
and are widely studied. Most known APN functions are defined using their representation as …

The classification of quadratic APN functions in 7 variables

K Kalgin, V Idrisova - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Almost perfect nonlinear functions possess the optimal resistance to the differential
cryptanalysis and are widely studied. Most known APN functions are obtained as functions …

On functions of low differential uniformity in characteristic 2: A close look (I)

N Anbar, T Kalaycı, A Topuzoğlu - arXiv preprint arXiv:2406.07468, 2024 - arxiv.org
We introduce a new concept, the APN-defect, which can be thought of as measuring the
distance of a given function $ G:\mathbb {F} _ {2^ n}\rightarrow\mathbb {F} _ {2^ n} $ to the …

Differential uniformity of the composition of two functions

L Shuai, L Wang, L Miao, X Zhou - Cryptography and Communications, 2020 - Springer
In this paper, we study the differential uniformity of the composition of two functions with the
help of Boolean matrix theory. Based on the result of our research, we can construct new …

On the behavior of some APN permutations under swapping points

L Budaghyan, N Kaleyski, C Riera… - Cryptography and …, 2022 - Springer
We define the pAPN-spectrum (which is a measure of how close a function is to being APN)
of an (n, n)-function F and investigate how its size changes when two of the outputs of a …

Permutation polynomials and factorization

T Kalaycı, H Stichtenoth, A Topuzoğlu - Cryptography and …, 2020 - Springer
We discuss a special class of permutation polynomials over finite fields focusing on some
recent work on their factorization. In particular we obtain permutation polynomials with …