Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Algebraic attacks on stream ciphers with linear feedback

NT Courtois, W Meier - … 2003: International Conference on the Theory and …, 2003 - Springer
A classical construction of stream ciphers is to combine several LFSRs and a highly non-
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …

[图书][B] New stream cipher designs: the eSTREAM finalists

M Robshaw, O Billet - 2008 - Springer
The question “Stream ciphers: dead or alive?” was posed by Adi Shamir. Intended to
provoke debate, the question could not have been better, or more starkly, put. However, it …

Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

C Carlet, DK Dalai, KC Gupta… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …

Construction of S-box based on chaotic Boolean functions and its application in image encryption

M Khan, T Shah, SI Batool - Neural Computing and Applications, 2016 - Springer
In numerous encryption frameworks, the first information is changed into encoded form by
applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is …

Basic theory in construction of Boolean functions with maximum possible annihilator immunity

DK Dalai, S Maitra, S Sarkar - Designs, Codes and Cryptography, 2006 - Springer
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind the basic …

An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity

C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …

Sosemanuk, a Fast Software-Oriented Stream Cipher

C Berbain, O Billet, A Canteaut, N Courtois… - New Stream Cipher …, 2008 - Springer
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile
1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and …

A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity

Z Tu, Y Deng - Designs, Codes and Cryptography, 2011 - Springer
In this paper, a combinatorial conjecture about binary strings is proposed. Under the
assumption that the proposed conjecture is correct, two classes of Boolean functions with …

On the algebraic immunity of symmetric Boolean functions

A Braeken, B Preneel - Progress in Cryptology-INDOCRYPT 2005: 6th …, 2005 - Springer
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The
algebraic immunity is a property which measures the resistance against the algebraic …