Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
نویسندگان
چکیده
Propagation criteria and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1], [2], [3], [4], [7], [8], [10], [11] and [16]). Kurosawa , Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper algebraic-geometric codes over GF (2m) are used to modify the Carlet and Kurosawa-Satoh’s construction for giving vectorial resilient Boolean functions satisfying PC(l) of order k criterion. This new construction is compared with
منابع مشابه
Boolean Functions from AG-Codes
Propagation criterion of degree l and order k (PC(l) of order k) and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1, 2, 3, 6, 7,8,10,11,16]. Kurosawa , Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper, algebraic-geometric codes over GF (2) are used to modif...
متن کاملConstructing PC(l) of order k Boolean Functions from Algebraic-Geometric Codes
Propagation criterion of degree l and order k (PC(l) of order k) for Boolean functions is important for the design of block ciphers. In [1-2] Kurosawa , Stoh and Carlet give several constructions of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes.
متن کاملVectorial Boolean functions and linear codes in the context of algebraic attacks
In this paper we study the relationship between vectorial (Boolean) functions and cyclic codes in the context of algebraic attacks. We first derive a direct link between the annihilators of a vectorial function (in univariate form) and certain 2n-ary cyclic codes (which we prove that they are LCD codes) extending results due to Rønjom and Helleseth. The knowledge of the minimum distance of thos...
متن کاملNew Constructions for Resilient and Highly Nonlinear Boolean Functions
We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables with nonlinearity 2n−1−2(n−1)/2, n odd. The Hadamard transform of these functions is 3-valued, which limits the efficiency of certain stream cipher attacks. From the case for n odd, we construct highly nonlinear 1-resilient functi...
متن کاملBinary linear codes from vectorial boolean functions and their weight distribution
Binary linear codes with good parameters have important applications in secret sharing schemes, authentication codes, association schemes, and consumer electronics and communications. In this paper, we construct several classes of binary linear codes from vectorial Boolean functions and determine their parameters, by further studying a generic construction developed by Ding et al. recently. Fir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0606011 شماره
صفحات -
تاریخ انتشار 2006