نتایج جستجو برای: vectorial boolean function

تعداد نتایج: 1234290  

Journal: :IACR Cryptology ePrint Archive 2015
Jian Liu Sihem Mesnager Lusheng Chen

For vectorial Boolean functions, the behavior of iteration has consequence in the diffusion property of the system. We present a study on the diffusion property of iterated vectorial Boolean functions. The measure that will be of main interest here is the notion of the degree of completeness, which has been suggested by the NESSIE project. We provide the first (to the best of our knowledge) two...

Journal: :IACR Cryptology ePrint Archive 2009
Lilya Budaghyan Claude Carlet

We prove that, for bent vectorial functions, CCZ-equivalence coincides with EA-equivalence. However, we show that CCZ-equivalence can be used for constructing bent functions which are new up to CCZequivalence. Using this approach we construct classes of nonquadratic bent Boolean and bent vectorial functions.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم پایه 1387

چکیده ندارد.

2015
S. M. Dehnavi M. R. Mirzaee Hamidreza Maimani Einollah Pasha

In this paper, we investigate some statistical properties of multiplication mod 2 for cryptographic use. For this purpose, we introduce a family of T-functions similar to modular multiplication, which we call M-functions. We obtain the probability distribution of M-functions as vectorial Boolean functions. At first, we determine the joint probability distribution of arbitrary number of the outp...

1999
Takashi Satoh Tetsu Iwata Kaoru Kurosawa

In this paper, we show the rst method to construct vecto-rial bent functions which satisfy both the largest degree and the largest number of output bits simultaneously. We next apply this method to construct balanced vectorial Boolean functions which have larger non-linearities than previously known constructions.

2007
Claude Carlet Khoongming Khoo Chu-Wee Lim Chuan-Wen Loe

We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those based on the usual correlation attack. In...

2009
Aileen Zhang Chu-Wee Lim Khoongming Khoo Lei Wei Josef Pieprzyk

At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degr...

Journal: :Discrete Mathematics 2021

Let n be an even positive integer, and m<n one of its divisors. In this paper, inspired by the work Tang et al. (2017) [23] on constructing large classes bent functions from known ones, we consider construction vectorial plateaued (n,m)-functions form H(x)=G(x)+g(x), where G is a (n,m)-function, g Boolean function. We find efficient generic method to construct such kind (plateaued) establishing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید