Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
On plateaued functions and their constructions
We use the notion of covering sequence, introduced by C. Carlet and Y. Tarannikov, to give
a simple characterization of bent functions. We extend it into a characterization of plateaued …
a simple characterization of bent functions. We extend it into a characterization of plateaued …
Degree 2 Boolean functions on Grassmann graphs
J De Beule, J D'haeseleer, F Ihringer… - arXiv preprint arXiv …, 2022 - arxiv.org
We investigate the existence of Boolean degree $ d $ functions on the Grassmann graph of
$ k $-spaces in the vector space $\mathbb {F} _q^ n $. For $ d= 1$ several non-existence …
$ k $-spaces in the vector space $\mathbb {F} _q^ n $. For $ d= 1$ several non-existence …
On propagation characteristics of resilient functions
P Charpin, E Pasalic - Selected Areas in Cryptography: 9th Annual …, 2003 - Springer
In this paper we derive several important results towards a better understanding of
propagation characteristics of resilient Boolean functions. We first introduce a new upper …
propagation characteristics of resilient Boolean functions. We first introduce a new upper …
Construction of nonlinear component based on bent Boolean functions
The substitution box (S-box) is the core component of any block cipher that creates
confusion in the ciphertext. This research contributes to creating a substitution box based on …
confusion in the ciphertext. This research contributes to creating a substitution box based on …
On the supports of the Walsh transforms of Boolean functions
C Carlet¹, S Mesnager¹ - BFCA'05: Boolean Functions …, 2005 - books.google.com
On the supports of the Walsh transforms of Boolean functions Page 77 Boolean Functions:
Cryptography and Applications Fonctions Booléennes: Cryptographie & Applications BFCA'05 …
Cryptography and Applications Fonctions Booléennes: Cryptographie & Applications BFCA'05 …
A Construction of Bent Functions of n + 2 Variables from a Bent Function of n Variables and Its Cyclic Shifts
We present a method to iteratively construct new bent functions of n+ 2 variables from a bent
function of n variables and its cyclic shift permutations using minterms of n variables and …
function of n variables and its cyclic shift permutations using minterms of n variables and …
On the non-linearity and sparsity of Boolean functions related to the discrete logarithm in finite fields of characteristic two
N Brandstätter, T Lange, A Winterhof - Coding and Cryptography …, 2006 - Springer
In public-key cryptography the discrete logarithm has gained increasing interest as a one-
way function. This paper deals with the particularly interesting case of the discrete logarithm …
way function. This paper deals with the particularly interesting case of the discrete logarithm …
On plateaued Boolean functions with the same spectrum support
AV Khalyavin, MS Lobanov… - Сибирские электронные …, 2016 - mathnet.ru
In the first half of the paper we give a brief review of plateaued functions, regular functions
and related topics including connections with problems on subgraphs of the Hamming …
and related topics including connections with problems on subgraphs of the Hamming …