Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Quark: A Lightweight Hash

JP Aumasson, L Henzen, W Meier… - Journal of …, 2013 - Springer
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash
functions has been repeatedly expressed by professionals, notably to implement …

Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

C Carlet, DK Dalai, KC Gupta… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …

Quark: A Lightweight Hash

JP Aumasson, L Henzen, W Meier… - … and embedded systems, 2010 - Springer
The need for lightweight cryptographic hash functions has been repeatedly expressed by
application designers, notably for implementing RFID protocols. However not many designs …

Nonlinearity bounds and constructions of resilient Boolean functions

P Sarkar, S Maitra - Advances in Cryptology—CRYPTO 2000: 20th Annual …, 2000 - Springer
In this paper we investigate the relationship between the nonlinearity and the order of
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …

[HTML][HTML] Rotation symmetric Boolean functions—Count and cryptographic properties

P Stănică, S Maitra - Discrete Applied Mathematics, 2008 - Elsevier
Rotation symmetric (RotS) Boolean functions have been used as components of different
cryptosystems. This class of Boolean functions are invariant under circular translation of …

[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness

I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …

On the algebraic immunity of symmetric Boolean functions

A Braeken, B Preneel - Progress in Cryptology-INDOCRYPT 2005: 6th …, 2005 - Springer
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The
algebraic immunity is a property which measures the resistance against the algebraic …

Results on algebraic immunity for cryptographically significant Boolean functions

DK Dalai, KC Gupta, S Maitra - … on Cryptology in India, Chennai, India …, 2005 - Springer
Recently algebraic attack has received a lot of attention in cryptographic literature. It has
been observed that a Boolean function f, interpreted as a multivariate polynomial over GF …

On resilient Boolean functions with maximal possible nonlinearity

YV Tarannikov - Progress in Cryptology—INDOCRYPT 2000: First …, 2000 - Springer
It is proved that the maximal possible nonlinearity of nvariable m-resilient Boolean function
is 2 n-1-2 m+ 1 for 2 n-7/3≤ m≤ n-2. This value can be achieved only for optimized …