Vectorial Boolean Functions for Cryptography

To appear as a chapter of the volume " Boolean Methods and Models " ,

[1]  Claude Carlet,et al.  Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications , 2008, IEEE Transactions on Information Theory.

[2]  Guang Gong,et al.  New Constructions for Resilient and Highly Nonlinear Boolean Functions , 2003, ACISP.

[3]  Guang Gong,et al.  Highly nonlinear s-boxes with reduced bound on maximum correlation (extended abstract) , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[4]  Cunsheng Ding,et al.  Highly nonlinear mappings , 2004, J. Complex..

[5]  Alexander Pott,et al.  On differential uniformity and nonlinearity of functions , 2009, Discret. Math..

[6]  Anne Canteaut,et al.  Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences , 2000, SIAM J. Discret. Math..

[7]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[8]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[9]  Kaisa Nyberg,et al.  Multidimensional Walsh Transform and a Characterization of Bent Functions , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.

[10]  Jing Yang,et al.  Maximal values of generalized algebraic immunity , 2009, Des. Codes Cryptogr..

[11]  D. Stinson,et al.  Resilient functions and large sets of orthogonal arrays , 2022 .

[12]  Kaisa Nyberg,et al.  S-boxes and Round Functions with Controllable Linearity and Differential Uniformity , 1994, FSE.

[13]  Claude Carlet,et al.  On the Higher Order Nonlinearities of Boolean Functions and S-boxes , 2008, 2009 International Conference on Availability, Reliability and Security.

[14]  Ingo Wegener,et al.  The complexity of Boolean functions , 1987 .

[15]  Agnes Hui Chan,et al.  Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers , 2000, CRYPTO.

[16]  Dieter Jungnickel,et al.  Difference Sets: An Introduction , 1999 .

[17]  Eimear Byrne,et al.  An Infinite Family of Quadratic Quadrinomial APN Functions , 2007 .

[18]  Alexander Pott,et al.  Two results on maximum nonlinear functions , 2008, Des. Codes Cryptogr..

[19]  Eimear Byrne,et al.  On the equivalence of quadratic APN functions , 2011, Des. Codes Cryptogr..

[20]  Gohar M. M. Kyureghyan The only crooked power functions are x2k+2l , 2007, Eur. J. Comb..

[21]  C. Carlet On the Secondary Constructions of Resilient and Bent Functions , 2004 .

[22]  Pascale Charpin,et al.  Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces , 2005, Des. Codes Cryptogr..

[23]  Eimear Byrne,et al.  A few more quadratic APN functions , 2008, Cryptography and Communications.

[24]  Nobuo Nakagawa,et al.  A Construction of Differentially 4-Uniform Functions from Commutative Semifields of Characteristic 2 , 2007, WAIFI.

[25]  Hans Dobbertin,et al.  Some new three-valued crosscorrelation functions for binary m-sequences , 1996, IEEE Trans. Inf. Theory.

[26]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[27]  T. Johansson,et al.  A construction of resilient functions with high nonlinearity , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[28]  Cunsheng Ding,et al.  Nonlinearities of S-boxes , 2007, Finite Fields Their Appl..

[29]  H. Niederreiter,et al.  Finite Fields: Encyclopedia of Mathematics and Its Applications. , 1997 .

[30]  Kaoru Kurosawa,et al.  On Cryptographically Secure Vectorial Boolean Functions , 1999, ASIACRYPT.

[31]  Subhamoy Maitra,et al.  Linear codes in generalized construction of resilient functions with very high nonlinearity , 2002, IEEE Trans. Inf. Theory.

[32]  Dmitry Fon-Der-Flaass,et al.  Codes, graphs, and schemes from nonlinear functions , 2003, Eur. J. Comb..

[33]  Dmitry Fon-Der-Flaass,et al.  Crooked Functions, Bent Functions, and Distance Regular Graphs , 1998, Electron. J. Comb..

[34]  Claude Carlet,et al.  On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity , 2007, Adv. Math. Commun..

[35]  Lilya Budaghyan The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions , 2007, WAIFI.

[36]  Hans Dobbertin Uniformly Representable Permutation Polynomials , 2001, SETA.

[37]  Yue Zhou,et al.  The Walsh Spectrum of a New Family of APN Functions , 2008, IACR Cryptol. ePrint Arch..

[38]  Claude Carlet,et al.  Classes of Quadratic APN Trinomials and Hexanomials and Related Structures , 2008, IEEE Transactions on Information Theory.

[39]  Serge Vaudenay,et al.  On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.

[40]  Hans Dobbertin,et al.  Almost Perfect Nonlinear Power Functions on GF(2n): The Welch Case , 1999, IEEE Trans. Inf. Theory.

[41]  Cunsheng Ding,et al.  On Almost Perfect Nonlinear Permutations , 1994, EUROCRYPT.

[42]  Tadao Kasami,et al.  The Weight Enumerators for Several Clauses of Subcodes of the 2nd Order Binary Reed-Muller Codes , 1971, Inf. Control..

[43]  Claude Carlet,et al.  An infinite class of quadratic APN functions which are not equivalent to power mappings , 2006, 2006 IEEE International Symposium on Information Theory.

[44]  N. S. Barnett,et al.  Private communication , 1969 .

[45]  Palash Sarkar,et al.  Construction of perfect nonlinear and maximally nonlinear multiple-output Boolean functions satisfying higher order strict avalanche criteria , 2004, IEEE Transactions on Information Theory.

[46]  Anne Canteaut,et al.  Construction of bent functions via Niho power functions , 2006, J. Comb. Theory, Ser. A.

[47]  Claude Carlet,et al.  Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems , 1998, Des. Codes Cryptogr..

[48]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[49]  John F. Dillon,et al.  Multiplicative Difference Sets via Additive Characters , 1999, Des. Codes Cryptogr..

[50]  Jürgen Bierbrauer,et al.  Crooked binomials , 2008, Des. Codes Cryptogr..

[51]  Philippe Langevin,et al.  On the Non-linearity of Power Functions , 2005, Des. Codes Cryptogr..

[52]  Claude Carlet,et al.  On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators , 2003, Selected Areas in Cryptography.

[53]  Frederik Armknecht,et al.  Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity , 2006, ICALP.

[54]  Kaisa Nyberg,et al.  New Bent Mappings Suitable for Fast Implementation , 1993, FSE.

[55]  Emmanuel Prouff,et al.  DPA Attacks and S-Boxes , 2005, FSE.

[56]  Claude Carlet,et al.  New classes of almost bent and almost perfect nonlinear polynomials , 2006, IEEE Transactions on Information Theory.

[57]  José Felipe Voloch Symmetric Cryptography and Algebraic Curves , 2008 .

[58]  Kaoru Kurosawa,et al.  Highly Nonlinear t-resilient Functions , 1997, J. Univers. Comput. Sci..

[59]  Xiang-dong Hou,et al.  Affinity of permutations of P2n , 2006, Discret. Appl. Math..

[60]  Anne Canteaut,et al.  A New Characterization of Almost Bent Functions , 1999, FSE.

[61]  Lars R. Knudsen Proceedings of the 6th International Workshop on Fast Software Encryption , 1999 .

[62]  Alexander Pott,et al.  A new almost perfect nonlinear function which is not quadratic , 2008, Adv. Math. Commun..

[63]  Anne Canteaut,et al.  Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis , 2002, EUROCRYPT.

[64]  Yuliang Zheng,et al.  Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.

[65]  Eimear Byrne,et al.  New families of quadratic almost perfect nonlinear trinomials and multinomials , 2008, Finite Fields Their Appl..

[66]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[67]  Claude Carlet,et al.  On Correlation-Immune Functions , 1991, CRYPTO.

[68]  Anne Canteaut,et al.  Almost Perfect Nonlinear functions , 2005 .

[69]  P. Sarkar,et al.  Improved construction of nonlinear resilient S-boxes , 2002, IEEE Transactions on Information Theory.

[70]  Douglas R. Stinson,et al.  Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds , 1996, SIAM J. Discret. Math..

[71]  K. Conrad,et al.  Finite Fields , 2018, Series and Products in the Development of Mathematics.

[72]  Lloyd R. Welch,et al.  Lower bounds on the maximum cross correlation of signals (Corresp.) , 1974, IEEE Trans. Inf. Theory.

[73]  H. Dobbertin Almost Perfect Nonlinear Power Functions on GF(2n): A New Case for n Divisible by 5 , 2001 .

[74]  J. Goethals UNIFORMLY PACKED CODES , 1975 .

[75]  Claude Carlet On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations , 2008, SETA.

[76]  Claude Carlet,et al.  Generalized Correlation Analysis of Vectorial Boolean Functions , 2007, FSE.

[77]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[78]  Henri Gilbert,et al.  A Known Plaintext Attack of FEAL-4 and FEAL-6 , 1991, CRYPTO.

[79]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[80]  Priya Kohli ORTHOGONAL ARRAYS , 2008 .

[81]  L. Carlitz,et al.  Bounds for exponential sums , 1957 .

[82]  Hans Dobbertin Another Proof of Kasami's Theorem , 1999, Des. Codes Cryptogr..

[83]  Claude Carlet,et al.  Constructing new APN functions from known ones , 2009, Finite Fields Their Appl..

[84]  Kaisa Nyberg,et al.  On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.

[85]  K. Horadam Hadamard Matrices and Their Applications , 2006 .

[86]  Yuliang Zheng,et al.  On Nonlinear Resilient Functions (Extended Abstract) , 1995, EUROCRYPT.

[87]  Vladimir I. Levenshtein Split Orthogonal Arrays and Maximum Independent Resilient Systems of Functions , 1997, Des. Codes Cryptogr..

[88]  Alexander Pott,et al.  A new APN function which is not equivalent to a power mapping , 2005, IEEE Transactions on Information Theory.

[89]  Anne Canteaut,et al.  Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations , 1996, CRYPTO.

[90]  Gregor Leander,et al.  On the classification of APN functions up to dimension five , 2008, Des. Codes Cryptogr..

[91]  Anne Canteaut,et al.  Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture , 2000, IEEE Trans. Inf. Theory.

[92]  J. Feigenbaum Advances in cryptology--CRYPTO '91 : proceedings , 1992 .

[93]  Tor Helleseth,et al.  Some Power Mappings with Low Differential Uniformity , 1997, Applicable Algebra in Engineering, Communication and Computing.

[94]  Hans Dobbertin,et al.  Almost Perfect Nonlinear Power Functions on GF(2n): The Niho Case , 1999, Inf. Comput..

[95]  H. Dobbertin Kasami Power Functions, Permutation Polynomials and Cyclic Difference Sets , 1999 .

[96]  A. Robert Calderbank,et al.  On a conjecture of Helleseth regarding pairs of binary m-sequences , 1996, IEEE Trans. Inf. Theory.

[97]  R. Lathe Phd by thesis , 1988, Nature.

[98]  Jung Hee Cheon,et al.  Nonlinear Vector Resilient Functions , 2001, CRYPTO.

[99]  G. Lachaud,et al.  The weights of the orthogonals of the extended quadratic binary Goppa codes , 1990, IEEE Trans. Inf. Theory.

[100]  A. Robert Calderbank,et al.  Proof of a conjecture of Sarwate and Pursley regarding pairs of binary m-sequences , 1995, IEEE Trans. Inf. Theory.

[101]  Zhang Jian-zhong Construction of Bent Functions , 2005 .

[102]  Jyrki T. Lahtonen,et al.  Gold and Kasami-Welch functions, quadratic forms, and bent functions , 2007, Adv. Math. Commun..

[103]  Faruk Göloglu,et al.  Results on the Crosscorrelation and Autocorrelation of Sequences , 2008, SETA.

[104]  van Hca Henk Tilborg,et al.  Uniformly packed codes , 1976 .

[105]  Hans Dobbertin,et al.  Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.

[106]  Kaoru Kurosawa,et al.  Probabilistic Higher Order Differential Attack and Higher Order Bent Functions , 1999, ASIACRYPT.

[107]  H. Hollmann,et al.  A Proof of the Welch and Niho Conjectures on Cross-Correlations of Binary m-Sequences , 2001 .

[108]  Douglas R. Stinson,et al.  An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions , 2004, Journal of Cryptology.

[109]  Lars R. Knudsen,et al.  Provable Security Against Differential Cryptanalysis , 1992, CRYPTO.

[110]  Hans Dobbertin,et al.  One-to-One Highly Nonlinear Power Functions on GF(2n) , 1998, Applicable Algebra in Engineering, Communication and Computing.

[111]  Eimear Byrne,et al.  Determining the Nonlinearity of a New Family of APN Functions , 2007, AAECC.

[112]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[113]  C. R. Rao,et al.  Factorial Experiments Derivable from Combinatorial Arrangements of Arrays , 1947 .

[114]  Anne Canteaut,et al.  Construction of t-Resilient Functions over a Finite Alphabet , 1996, EUROCRYPT.

[115]  Esther Seiden,et al.  On Orthogonal Arrays , 1966 .

[116]  Toshinobu Kaneko,et al.  Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES , 1998, CRYPTO.

[117]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[118]  P. Delsarte Bounds for unrestricted codes, by linear programming , 1972 .

[119]  Nicolas Courtois,et al.  On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions , 2006, ACISP.

[120]  Claude Carlet,et al.  A construction of bent function , 1996 .

[121]  Sihem Mesnager,et al.  On the construction of bent vectorial functions , 2010, Int. J. Inf. Coding Theory.

[122]  Claude Carlet,et al.  Vectorial Functions and Covering Sequences , 2003, International Conference on Finite Fields and Applications.

[123]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[124]  Tor Helleseth,et al.  On Z4-Linear Goethals Codes and Kloosterman Sums , 1999, Des. Codes Cryptogr..

[125]  Anne Canteaut,et al.  Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography , 1999, Des. Codes Cryptogr..

[126]  Serge Vaudenay,et al.  Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.

[127]  J. Faugère,et al.  Algebraic Immunities of functions over finite fields , 2005 .

[128]  Tor Helleseth,et al.  New Families of Almost Perfect Nonlinear Power Mappings , 1999, IEEE Trans. Inf. Theory.

[129]  Richard M. Wilson,et al.  Hyperplane Sections of Fermat Varieties in P3 in Char.2 and Some Applications to Cyclic Codes , 1993, AAECC.

[130]  J. Seberry,et al.  Relationships Among Nonlinear Criteria (Extended Abstract) , 1994, EUROCRYPT.

[131]  Claude Carlet,et al.  Another class of quadratic APN binomials over F2n: the case n divisible by 4 , 2006, IACR Cryptol. ePrint Arch..

[132]  Anne Canteaut Cryptographic Functions and Design Criteria for Block Ciphers , 2001, INDOCRYPT.

[133]  Dong Hoon Lee,et al.  Resistance of S-Boxes against Algebraic Attacks , 2004, FSE.

[134]  Rudolf Lide,et al.  Finite fields , 1983 .

[135]  Anne Canteaut,et al.  Cryptanalysis of block ciphers and weight divisibility of some binary codes , 2002 .

[136]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[137]  P. Delsarte AN ALGEBRAIC APPROACH TO THE ASSOCIATION SCHEMES OF CODING THEORY , 2011 .

[138]  Claude Carlet On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions , 2004, J. Complex..

[139]  Cunsheng Ding,et al.  Cartesian authentication codes from functions with optimal nonlinearity , 2003, Theor. Comput. Sci..

[140]  Claude Carlet On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions , 2009, Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes.

[141]  Claude Carlet,et al.  Two Classes of Quadratic APN Binomials Inequivalent to Power Functions , 2008, IEEE Transactions on Information Theory.

[142]  Eimear Byrne,et al.  On the Walsh Spectrum of a New APN Function , 2007, IMACC.

[143]  Alex Biryukov,et al.  Slide Attacks , 1999, FSE.

[144]  Joel Friedman,et al.  On the bit extraction problem , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[145]  Carl Bracken,et al.  A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree , 2009, Finite Fields Their Appl..

[146]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[147]  Hans Dobbertin,et al.  New cyclic difference sets with Singer parameters , 2004, Finite Fields Their Appl..

[148]  Philippe Langevin,et al.  On Exponents with highly divisible Fourier Coefficients and Conjectures of Niho and Dobbertin , 2008 .

[149]  Stephen D. Cohen,et al.  A class of exceptional polynomials , 1994 .

[150]  Anne Canteaut Diierential Cryptanalysis of Feistel Ciphers and Diierentially -uniform Mappings , 1997 .

[151]  David Jedlicka,et al.  APN monomials over GF(2n) for infinitely many n , 2007, Finite Fields Their Appl..

[152]  Pingzhi Fan,et al.  Special Section on Signal Design and its Application in Communications , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..