Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
Algebraic attacks on stream ciphers with linear feedback
NT Courtois, W Meier - … 2003: International Conference on the Theory and …, 2003 - Springer
A classical construction of stream ciphers is to combine several LFSRs and a highly non-
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …
has been observed that a Boolean function f used as a cryptographic primitive, and …
Construction of S-box based on chaotic Boolean functions and its application in image encryption
In numerous encryption frameworks, the first information is changed into encoded form by
applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is …
applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is …
Basic theory in construction of Boolean functions with maximum possible annihilator immunity
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind the basic …
annihilator immunity. In this paper we present a construction keeping in mind the basic …
An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity
C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …
the introduction of the related notion of algebraic immunity, several constructions of infinite …
Sosemanuk, a Fast Software-Oriented Stream Cipher
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile
1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and …
1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and …
A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity
Z Tu, Y Deng - Designs, Codes and Cryptography, 2011 - Springer
In this paper, a combinatorial conjecture about binary strings is proposed. Under the
assumption that the proposed conjecture is correct, two classes of Boolean functions with …
assumption that the proposed conjecture is correct, two classes of Boolean functions with …
On the algebraic immunity of symmetric Boolean functions
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The
algebraic immunity is a property which measures the resistance against the algebraic …
algebraic immunity is a property which measures the resistance against the algebraic …