Vectorial Boolean Functions for Cryptography
暂无分享,去创建一个
[1] Claude Carlet,et al. Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications , 2008, IEEE Transactions on Information Theory.
[2] Guang Gong,et al. New Constructions for Resilient and Highly Nonlinear Boolean Functions , 2003, ACISP.
[3] Guang Gong,et al. Highly nonlinear s-boxes with reduced bound on maximum correlation (extended abstract) , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[4] Cunsheng Ding,et al. Highly nonlinear mappings , 2004, J. Complex..
[5] Alexander Pott,et al. On differential uniformity and nonlinearity of functions , 2009, Discret. Math..
[6] Anne Canteaut,et al. Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences , 2000, SIAM J. Discret. Math..
[7] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[8] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[9] Kaisa Nyberg,et al. Multidimensional Walsh Transform and a Characterization of Bent Functions , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.
[10] Jing Yang,et al. Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..
[11] D. Stinson,et al. Resilient functions and large sets of orthogonal arrays , 2022 .
[12] Kaisa Nyberg,et al. S-boxes and Round Functions with Controllable Linearity and Differential Uniformity , 1994, FSE.
[13] Claude Carlet,et al. On the Higher Order Nonlinearities of Boolean Functions and S-boxes , 2008, 2009 International Conference on Availability, Reliability and Security.
[14] Ingo Wegener,et al. The complexity of Boolean functions , 1987 .
[15] Agnes Hui Chan,et al. Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers , 2000, CRYPTO.
[16] Dieter Jungnickel,et al. Difference Sets: An Introduction , 1999 .
[17] Eimear Byrne,et al. An Infinite Family of Quadratic Quadrinomial APN Functions , 2007 .
[18] Alexander Pott,et al. Two results on maximum nonlinear functions , 2008, Des. Codes Cryptogr..
[19] Eimear Byrne,et al. On the equivalence of quadratic APN functions , 2011, Des. Codes Cryptogr..
[20] Gohar M. M. Kyureghyan. The only crooked power functions are x2k+2l , 2007, Eur. J. Comb..
[21] C. Carlet. On the Secondary Constructions of Resilient and Bent Functions , 2004 .
[22] Pascale Charpin,et al. Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces , 2005, Des. Codes Cryptogr..
[23] Eimear Byrne,et al. A few more quadratic APN functions , 2008, Cryptography and Communications.
[24] Nobuo Nakagawa,et al. A Construction of Differentially 4-Uniform Functions from Commutative Semifields of Characteristic 2 , 2007, WAIFI.
[25] Hans Dobbertin,et al. Some new three-valued crosscorrelation functions for binary m-sequences , 1996, IEEE Trans. Inf. Theory.
[26] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[27] T. Johansson,et al. A construction of resilient functions with high nonlinearity , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[28] Cunsheng Ding,et al. Nonlinearities of S-boxes , 2007, Finite Fields Their Appl..
[29] H. Niederreiter,et al. Finite Fields: Encyclopedia of Mathematics and Its Applications. , 1997 .
[30] Kaoru Kurosawa,et al. On Cryptographically Secure Vectorial Boolean Functions , 1999, ASIACRYPT.
[31] Subhamoy Maitra,et al. Linear codes in generalized construction of resilient functions with very high nonlinearity , 2002, IEEE Trans. Inf. Theory.
[32] Dmitry Fon-Der-Flaass,et al. Codes, graphs, and schemes from nonlinear functions , 2003, Eur. J. Comb..
[33] Dmitry Fon-Der-Flaass,et al. Crooked Functions, Bent Functions, and Distance Regular Graphs , 1998, Electron. J. Comb..
[34] Claude Carlet,et al. On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity , 2007, Adv. Math. Commun..
[35] Lilya Budaghyan. The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions , 2007, WAIFI.
[36] Hans Dobbertin. Uniformly Representable Permutation Polynomials , 2001, SETA.
[37] Yue Zhou,et al. The Walsh Spectrum of a New Family of APN Functions , 2008, IACR Cryptol. ePrint Arch..
[38] Claude Carlet,et al. Classes of Quadratic APN Trinomials and Hexanomials and Related Structures , 2008, IEEE Transactions on Information Theory.
[39] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[40] Hans Dobbertin,et al. Almost Perfect Nonlinear Power Functions on GF(2n): The Welch Case , 1999, IEEE Trans. Inf. Theory.
[41] Cunsheng Ding,et al. On Almost Perfect Nonlinear Permutations , 1994, EUROCRYPT.
[42] Tadao Kasami,et al. The Weight Enumerators for Several Clauses of Subcodes of the 2nd Order Binary Reed-Muller Codes , 1971, Inf. Control..
[43] Claude Carlet,et al. An infinite class of quadratic APN functions which are not equivalent to power mappings , 2006, 2006 IEEE International Symposium on Information Theory.
[44] N. S. Barnett,et al. Private communication , 1969 .
[45] Palash Sarkar,et al. Construction of perfect nonlinear and maximally nonlinear multiple-output Boolean functions satisfying higher order strict avalanche criteria , 2004, IEEE Transactions on Information Theory.
[46] Anne Canteaut,et al. Construction of bent functions via Niho power functions , 2006, J. Comb. Theory, Ser. A.
[47] Claude Carlet,et al. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems , 1998, Des. Codes Cryptogr..
[48] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[49] John F. Dillon,et al. Multiplicative Difference Sets via Additive Characters , 1999, Des. Codes Cryptogr..
[50] Jürgen Bierbrauer,et al. Crooked binomials , 2008, Des. Codes Cryptogr..
[51] Philippe Langevin,et al. On the Non-linearity of Power Functions , 2005, Des. Codes Cryptogr..
[52] Claude Carlet,et al. On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators , 2003, Selected Areas in Cryptography.
[53] Frederik Armknecht,et al. Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity , 2006, ICALP.
[54] Kaisa Nyberg,et al. New Bent Mappings Suitable for Fast Implementation , 1993, FSE.
[55] Emmanuel Prouff,et al. DPA Attacks and S-Boxes , 2005, FSE.
[56] Claude Carlet,et al. New classes of almost bent and almost perfect nonlinear polynomials , 2006, IEEE Transactions on Information Theory.
[57] José Felipe Voloch. Symmetric Cryptography and Algebraic Curves , 2008 .
[58] Kaoru Kurosawa,et al. Highly Nonlinear t-resilient Functions , 1997, J. Univers. Comput. Sci..
[59] Xiang-dong Hou,et al. Affinity of permutations of P2n , 2006, Discret. Appl. Math..
[60] Anne Canteaut,et al. A New Characterization of Almost Bent Functions , 1999, FSE.
[61] Lars R. Knudsen. Proceedings of the 6th International Workshop on Fast Software Encryption , 1999 .
[62] Alexander Pott,et al. A new almost perfect nonlinear function which is not quadratic , 2008, Adv. Math. Commun..
[63] Anne Canteaut,et al. Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis , 2002, EUROCRYPT.
[64] Yuliang Zheng,et al. Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.
[65] Eimear Byrne,et al. New families of quadratic almost perfect nonlinear trinomials and multinomials , 2008, Finite Fields Their Appl..
[66] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[67] Claude Carlet,et al. On Correlation-Immune Functions , 1991, CRYPTO.
[68] Anne Canteaut,et al. Almost Perfect Nonlinear functions , 2005 .
[69] P. Sarkar,et al. Improved construction of nonlinear resilient S-boxes , 2002, IEEE Transactions on Information Theory.
[70] Douglas R. Stinson,et al. Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds , 1996, SIAM J. Discret. Math..
[71] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.
[72] Lloyd R. Welch,et al. Lower bounds on the maximum cross correlation of signals (Corresp.) , 1974, IEEE Trans. Inf. Theory.
[73] H. Dobbertin. Almost Perfect Nonlinear Power Functions on GF(2n): A New Case for n Divisible by 5 , 2001 .
[74] J. Goethals. UNIFORMLY PACKED CODES , 1975 .
[75] Claude Carlet. On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations , 2008, SETA.
[76] Claude Carlet,et al. Generalized Correlation Analysis of Vectorial Boolean Functions , 2007, FSE.
[77] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[78] Henri Gilbert,et al. A Known Plaintext Attack of FEAL-4 and FEAL-6 , 1991, CRYPTO.
[79] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[80] Priya Kohli. ORTHOGONAL ARRAYS , 2008 .
[81] L. Carlitz,et al. Bounds for exponential sums , 1957 .
[82] Hans Dobbertin. Another Proof of Kasami's Theorem , 1999, Des. Codes Cryptogr..
[83] Claude Carlet,et al. Constructing new APN functions from known ones , 2009, Finite Fields Their Appl..
[84] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[85] K. Horadam. Hadamard Matrices and Their Applications , 2006 .
[86] Yuliang Zheng,et al. On Nonlinear Resilient Functions (Extended Abstract) , 1995, EUROCRYPT.
[87] Vladimir I. Levenshtein. Split Orthogonal Arrays and Maximum Independent Resilient Systems of Functions , 1997, Des. Codes Cryptogr..
[88] Alexander Pott,et al. A new APN function which is not equivalent to a power mapping , 2005, IEEE Transactions on Information Theory.
[89] Anne Canteaut,et al. Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations , 1996, CRYPTO.
[90] Gregor Leander,et al. On the classification of APN functions up to dimension five , 2008, Des. Codes Cryptogr..
[91] Anne Canteaut,et al. Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture , 2000, IEEE Trans. Inf. Theory.
[92] J. Feigenbaum. Advances in cryptology--CRYPTO '91 : proceedings , 1992 .
[93] Tor Helleseth,et al. Some Power Mappings with Low Differential Uniformity , 1997, Applicable Algebra in Engineering, Communication and Computing.
[94] Hans Dobbertin,et al. Almost Perfect Nonlinear Power Functions on GF(2n): The Niho Case , 1999, Inf. Comput..
[95] H. Dobbertin. Kasami Power Functions, Permutation Polynomials and Cyclic Difference Sets , 1999 .
[96] A. Robert Calderbank,et al. On a conjecture of Helleseth regarding pairs of binary m-sequences , 1996, IEEE Trans. Inf. Theory.
[97] R. Lathe. Phd by thesis , 1988, Nature.
[98] Jung Hee Cheon,et al. Nonlinear Vector Resilient Functions , 2001, CRYPTO.
[99] G. Lachaud,et al. The weights of the orthogonals of the extended quadratic binary Goppa codes , 1990, IEEE Trans. Inf. Theory.
[100] A. Robert Calderbank,et al. Proof of a conjecture of Sarwate and Pursley regarding pairs of binary m-sequences , 1995, IEEE Trans. Inf. Theory.
[101] Zhang Jian-zhong. Construction of Bent Functions , 2005 .
[102] Jyrki T. Lahtonen,et al. Gold and Kasami-Welch functions, quadratic forms, and bent functions , 2007, Adv. Math. Commun..
[103] Faruk Göloglu,et al. Results on the Crosscorrelation and Autocorrelation of Sequences , 2008, SETA.
[104] van Hca Henk Tilborg,et al. Uniformly packed codes , 1976 .
[105] Hans Dobbertin,et al. Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.
[106] Kaoru Kurosawa,et al. Probabilistic Higher Order Differential Attack and Higher Order Bent Functions , 1999, ASIACRYPT.
[107] H. Hollmann,et al. A Proof of the Welch and Niho Conjectures on Cross-Correlations of Binary m-Sequences , 2001 .
[108] Douglas R. Stinson,et al. An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions , 2004, Journal of Cryptology.
[109] Lars R. Knudsen,et al. Provable Security Against Differential Cryptanalysis , 1992, CRYPTO.
[110] Hans Dobbertin,et al. One-to-One Highly Nonlinear Power Functions on GF(2n) , 1998, Applicable Algebra in Engineering, Communication and Computing.
[111] Eimear Byrne,et al. Determining the Nonlinearity of a New Family of APN Functions , 2007, AAECC.
[112] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[113] C. R. Rao,et al. Factorial Experiments Derivable from Combinatorial Arrangements of Arrays , 1947 .
[114] Anne Canteaut,et al. Construction of t-Resilient Functions over a Finite Alphabet , 1996, EUROCRYPT.
[115] Esther Seiden,et al. On Orthogonal Arrays , 1966 .
[116] Toshinobu Kaneko,et al. Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES , 1998, CRYPTO.
[117] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[118] P. Delsarte. Bounds for unrestricted codes, by linear programming , 1972 .
[119] Nicolas Courtois,et al. On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions , 2006, ACISP.
[120] Claude Carlet,et al. A construction of bent function , 1996 .
[121] Sihem Mesnager,et al. On the construction of bent vectorial functions , 2010, Int. J. Inf. Coding Theory.
[122] Claude Carlet,et al. Vectorial Functions and Covering Sequences , 2003, International Conference on Finite Fields and Applications.
[123] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[124] Tor Helleseth,et al. On Z4-Linear Goethals Codes and Kloosterman Sums , 1999, Des. Codes Cryptogr..
[125] Anne Canteaut,et al. Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography , 1999, Des. Codes Cryptogr..
[126] Serge Vaudenay,et al. Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.
[127] J. Faugère,et al. Algebraic Immunities of functions over finite fields , 2005 .
[128] Tor Helleseth,et al. New Families of Almost Perfect Nonlinear Power Mappings , 1999, IEEE Trans. Inf. Theory.
[129] Richard M. Wilson,et al. Hyperplane Sections of Fermat Varieties in P3 in Char.2 and Some Applications to Cyclic Codes , 1993, AAECC.
[130] J. Seberry,et al. Relationships Among Nonlinear Criteria (Extended Abstract) , 1994, EUROCRYPT.
[131] Claude Carlet,et al. Another class of quadratic APN binomials over F2n: the case n divisible by 4 , 2006, IACR Cryptol. ePrint Arch..
[132] Anne Canteaut. Cryptographic Functions and Design Criteria for Block Ciphers , 2001, INDOCRYPT.
[133] Dong Hoon Lee,et al. Resistance of S-Boxes against Algebraic Attacks , 2004, FSE.
[134] Rudolf Lide,et al. Finite fields , 1983 .
[135] Anne Canteaut,et al. Cryptanalysis of block ciphers and weight divisibility of some binary codes , 2002 .
[136] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[137] P. Delsarte. AN ALGEBRAIC APPROACH TO THE ASSOCIATION SCHEMES OF CODING THEORY , 2011 .
[138] Claude Carlet. On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions , 2004, J. Complex..
[139] Cunsheng Ding,et al. Cartesian authentication codes from functions with optimal nonlinearity , 2003, Theor. Comput. Sci..
[140] Claude Carlet. On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions , 2009, Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes.
[141] Claude Carlet,et al. Two Classes of Quadratic APN Binomials Inequivalent to Power Functions , 2008, IEEE Transactions on Information Theory.
[142] Eimear Byrne,et al. On the Walsh Spectrum of a New APN Function , 2007, IMACC.
[143] Alex Biryukov,et al. Slide Attacks , 1999, FSE.
[144] Joel Friedman,et al. On the bit extraction problem , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[145] Carl Bracken,et al. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree , 2009, Finite Fields Their Appl..
[146] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[147] Hans Dobbertin,et al. New cyclic difference sets with Singer parameters , 2004, Finite Fields Their Appl..
[148] Philippe Langevin,et al. On Exponents with highly divisible Fourier Coefficients and Conjectures of Niho and Dobbertin , 2008 .
[149] Stephen D. Cohen,et al. A class of exceptional polynomials , 1994 .
[150] Anne Canteaut. Diierential Cryptanalysis of Feistel Ciphers and Diierentially -uniform Mappings , 1997 .
[151] David Jedlicka,et al. APN monomials over GF(2n) for infinitely many n , 2007, Finite Fields Their Appl..
[152] Pingzhi Fan,et al. Special Section on Signal Design and its Application in Communications , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..