Vectorial Boolean Functions for Cryptography.
This chapter deals with multi-output Boolean functions viewed from a cryptographic
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …
Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes
In this paper, a novel approach of finding disjoint linear codes is presented. The cardinality
of a set of [u, m, t+ 1] disjoint linear codes largely exceeds all the previous best known …
of a set of [u, m, t+ 1] disjoint linear codes largely exceeds all the previous best known …
Constrained Search for a Class of Good Bijective -Boxes With Improved DPA Resistivity
B Mazumdar, D Mukhopadhyay… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The transparency order is proposed as a parameter for the robustness of S-boxes to
differential power analysis (DPA): lower transparency order implying more resistance …
differential power analysis (DPA): lower transparency order implying more resistance …
On guess and determine cryptanalysis of LFSR-based stream ciphers
E Pasalic - IEEE Transactions on Information Theory, 2009 - ieeexplore.ieee.org
In this paper, the complexity of applying a guess and determine attack to so-called Linear
Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream …
Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream …
Analysis of affine equivalent Boolean functions for cryptography
JE Fuller - 2003 - eprints.qut.edu.au
Boolean functions are an important area of study for cryptography. These functions,
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …
consisting merely of one's and zero's, are the heart of numerous cryptographic systems and …
Improved construction of nonlinear resilient S-boxes
We provide two new construction methods for nonlinear resilient functions. The first method
is a simple modification of a construction due to Zhang and Zheng and constructs n-input, m …
is a simple modification of a construction due to Zhang and Zheng and constructs n-input, m …
Analysis and construction of nonlinear correctors used in true random number generators
W Zhang - IEEE Transactions on Information Theory, 2023 - ieeexplore.ieee.org
The problem of true random number generators (TRNGs) traces back to von Neumann's
1951 work that aims to simulate an unbiased coin by using a biased coin with unknown …
1951 work that aims to simulate an unbiased coin by using a biased coin with unknown …
Improved construction of nonlinear resilient S-boxes
We provide two new construction methods for nonlinear resilient functions. The first method
is a simple modification of an elegant construction due to Zhang and Zheng and constructs n …
is a simple modification of an elegant construction due to Zhang and Zheng and constructs n …
Maiorana–McFarland class: Degree optimization and algebraic properties
E Pasalic - IEEE Transactions on Information Theory, 2006 - ieeexplore.ieee.org
In this paper, we consider a subclass of the Maiorana-McFarland class used in the design of
resilient nonlinear Boolean functions. We show that these functions allow a simple …
resilient nonlinear Boolean functions. We show that these functions allow a simple …
Highly nonlinear resilient functions through disjoint codes in projective spaces
P Charpin, E Pasalic - Designs, codes and cryptography, 2005 - Springer
Functions which map n-bits to m-bits are important cryptographic sub-primitives in the
design of additive stream ciphers. We construct highly nonlinear t-resilient such functions …
design of additive stream ciphers. We construct highly nonlinear t-resilient such functions …