Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
PICARO–a block cipher allowing efficient higher-order side-channel resistance
G Piret, T Roche, C Carlet - … Conference, ACNS 2012, Singapore, June 26 …, 2012 - Springer
Many papers deal with the problem of constructing an efficient masking scheme for existing
block ciphers. We take the reverse approach: that is, given a proven masking scheme …
block ciphers. We take the reverse approach: that is, given a proven masking scheme …
On plateaued functions and their constructions
We use the notion of covering sequence, introduced by C. Carlet and Y. Tarannikov, to give
a simple characterization of bent functions. We extend it into a characterization of plateaued …
a simple characterization of bent functions. We extend it into a characterization of plateaued …
When does G (x)+ γTr (H (x)) permute Fpn?
P Charpin, G Kyureghyan - Finite Fields and Their Applications, 2009 - Elsevier
When does G(x)+γTr(H(x)) permute Fpn? Page 1 Finite Fields and Their Applications 15 (2009)
615–632 Contents lists available at ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa …
615–632 Contents lists available at ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa …
Normal boolean functions
P Charpin - Journal of Complexity, 2004 - Elsevier
Dobbertin (Construction of bent functions and balanced Boolean functions with high
nonlinearity, in: Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008 …
nonlinearity, in: Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008 …
Intrinsic resiliency of S-boxes against side-channel attacks–best and worst scenarios
Constructing S-boxes that are inherently resistant against side-channel attacks is an
important problem in cryptography. By using an optimal distinguisher under an additive …
important problem in cryptography. By using an optimal distinguisher under an additive …
On the confusion and diffusion properties of Maiorana–McFarland's and extended Maiorana–McFarland's functions
C Carlet - Journal of complexity, 2004 - Elsevier
A practical problem in symmetric cryptography is finding constructions of Boolean functions
leading to reasonably large sets of functions satisfying some desired cryptographic criteria …
leading to reasonably large sets of functions satisfying some desired cryptographic criteria …
Analysis of affine equivalent Boolean functions for cryptography
JE Fuller - 2003 - eprints.qut.edu.au
Boolean functions are an important area of study for cryptography. These functions,
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …