Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Reed-Muller codes achieve capacity on erasure channels
We introduce a new approach to proving that a sequence of deterministic linear codes
achieves capacity on an erasure channel under maximum a posteriori decoding. Rather …
achieves capacity on an erasure channel under maximum a posteriori decoding. Rather …
An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity
C Carlet, K Feng - International Conference on the Theory and …, 2008 - Springer
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and
the introduction of the related notion of algebraic immunity, several constructions of infinite …
the introduction of the related notion of algebraic immunity, several constructions of infinite …
[HTML][HTML] Substitution box generation using Chaos: An image encryption application
VM Silva-García, R Flores-Carapia… - Applied Mathematics …, 2018 - Elsevier
There are procedures to encrypt images; however, sometimes there is a loss of information
in the decryption process or the key set size is not specifically mentioned. In this research …
in the decryption process or the key set size is not specifically mentioned. In this research …
Human behaviour based optimization supported with self-organizing maps for solving the S-box design problem
R Soto, B Crawford, FG Molina, R Olivares - IEEE Access, 2021 - ieeexplore.ieee.org
The cryptanalytic resistance of modern block and stream encryption systems mainly
depends on the substitution box (S-box). In this context, the problem is thus to create an S …
depends on the substitution box (S-box). In this context, the problem is thus to create an S …
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
C Carlet - IEEE Transactions on information Theory, 2008 - ieeexplore.ieee.org
The nonlinearity profile of a Boolean function (ie, the sequence of its minimum Hamming
distances nl r (f) to all functions of degrees at most r, for r ges 1) is a cryptographic criterion …
distances nl r (f) to all functions of degrees at most r, for r ges 1) is a cryptographic criterion …
Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks
Inspired by the previous work of Tu and Deng, we propose two infinite classes of Boolean
functions of 2 k variables where k≥ 2. The first class contains unbalanced functions having …
functions of 2 k variables where k≥ 2. The first class contains unbalanced functions having …
Further properties of several classes of Boolean functions with optimum algebraic immunity
Based on a method proposed by the first author, several classes of balanced Boolean
functions with optimum algebraic immunity are constructed, and they have nonlinearities …
functions with optimum algebraic immunity are constructed, and they have nonlinearities …
[HTML][HTML] A novel strong S-box design using quantum crossover and chaotic boolean functions for symmetric cryptosystems
In this paper, we propose a new method for drawing a cryptographically strong substitution
box using the Lorenz system and quantum genetic algorithm techniques. We used the …
box using the Lorenz system and quantum genetic algorithm techniques. We used the …