Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier… - Journal of …, 2013 - Springer
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash
functions has been repeatedly expressed by professionals, notably to implement …
functions has been repeatedly expressed by professionals, notably to implement …
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …
has been observed that a Boolean function f used as a cryptographic primitive, and …
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier… - … and embedded systems, 2010 - Springer
The need for lightweight cryptographic hash functions has been repeatedly expressed by
application designers, notably for implementing RFID protocols. However not many designs …
application designers, notably for implementing RFID protocols. However not many designs …
Nonlinearity bounds and constructions of resilient Boolean functions
In this paper we investigate the relationship between the nonlinearity and the order of
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …
[HTML][HTML] Rotation symmetric Boolean functions—Count and cryptographic properties
Rotation symmetric (RotS) Boolean functions have been used as components of different
cryptosystems. This class of Boolean functions are invariant under circular translation of …
cryptosystems. This class of Boolean functions are invariant under circular translation of …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
On the algebraic immunity of symmetric Boolean functions
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The
algebraic immunity is a property which measures the resistance against the algebraic …
algebraic immunity is a property which measures the resistance against the algebraic …
Results on algebraic immunity for cryptographically significant Boolean functions
Recently algebraic attack has received a lot of attention in cryptographic literature. It has
been observed that a Boolean function f, interpreted as a multivariate polynomial over GF …
been observed that a Boolean function f, interpreted as a multivariate polynomial over GF …
On resilient Boolean functions with maximal possible nonlinearity
YV Tarannikov - Progress in Cryptology—INDOCRYPT 2000: First …, 2000 - Springer
It is proved that the maximal possible nonlinearity of nvariable m-resilient Boolean function
is 2 n-1-2 m+ 1 for 2 n-7/3≤ m≤ n-2. This value can be achieved only for optimized …
is 2 n-1-2 m+ 1 for 2 n-7/3≤ m≤ n-2. This value can be achieved only for optimized …