Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness

I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …

PICARO–a block cipher allowing efficient higher-order side-channel resistance

G Piret, T Roche, C Carlet - … Conference, ACNS 2012, Singapore, June 26 …, 2012 - Springer
Many papers deal with the problem of constructing an efficient masking scheme for existing
block ciphers. We take the reverse approach: that is, given a proven masking scheme …

On plateaued functions and their constructions

C Carlet, E Prouff - Fast Software Encryption: 10th International Workshop …, 2003 - Springer
We use the notion of covering sequence, introduced by C. Carlet and Y. Tarannikov, to give
a simple characterization of bent functions. We extend it into a characterization of plateaued …

When does G (x)+ γTr (H (x)) permute Fpn?

P Charpin, G Kyureghyan - Finite Fields and Their Applications, 2009 - Elsevier
When does G(x)+γTr(H(x)) permute Fpn? Page 1 Finite Fields and Their Applications 15 (2009)
615–632 Contents lists available at ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa …

Normal boolean functions

P Charpin - Journal of Complexity, 2004 - Elsevier
Dobbertin (Construction of bent functions and balanced Boolean functions with high
nonlinearity, in: Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008 …

Intrinsic resiliency of S-boxes against side-channel attacks–best and worst scenarios

C Carlet, E de Chérisey, S Guilley… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Constructing S-boxes that are inherently resistant against side-channel attacks is an
important problem in cryptography. By using an optimal distinguisher under an additive …

On the confusion and diffusion properties of Maiorana–McFarland's and extended Maiorana–McFarland's functions

C Carlet - Journal of complexity, 2004 - Elsevier
A practical problem in symmetric cryptography is finding constructions of Boolean functions
leading to reasonably large sets of functions satisfying some desired cryptographic criteria …

Analysis of affine equivalent Boolean functions for cryptography

JE Fuller - 2003 - eprints.qut.edu.au
Boolean functions are an important area of study for cryptography. These functions,
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …