Perfect nonlinear functions and cryptography (Q2512886): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Q4115154 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The cryptanalysis of FEAL-4 with 20 chosen plaintexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3062262 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Handbook of Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3081626 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Planes of order \(n\) with collineation groups of order \(n^ 2\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934708 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5202622 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ``bent'' functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect nonlinear S-boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized bent functions and their properties / rank
 
Normal rank
Property / cites work
 
Property / cites work: ‐Relative Difference Sets and Their Representations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Links between Differential and Linear Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly nonlinear mappings / rank
 
Normal rank
Property / cites work
 
Property / cites work: On finite Abelian groups with nonsingular quadratic form / rank
 
Normal rank
Property / cites work
 
Property / cites work: Codes, bent functions and permutations suitable for DES-like cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Switching Construction of Planar Functions on Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Codes From Perfect Nonlinear Mappings and Their Secret Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279664 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New classes of almost bent and almost perfect nonlinear polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCZ-equivalence of bent vectorial functions and related constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some Theorems on Planar Mappings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of transformation groups of polynomials over \(\mathrm{GF}(2)\) with applications to linear shift register sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost perfect nonlinear power functions on \(\mathrm{GF}(2^n)\): the Niho case. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost perfect nonlinear power functions on GF(2/sup n/): the Welch case / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of the Welch and Niho conjectures on cross-correlations of binary \(m\)-sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Almost Perfect Nonlinear Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2712106 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Planar functions and planes of Lenz-Barlotti class II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Planar functions and perfect nonlinear monomials over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new APN function which is not equivalent to a power mapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing new APN functions from known ones / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484892 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Affinity of permutations of \(\mathbb F_{2}^{n}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5327067 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new almost perfect nonlinear function which is not quadratic / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the classification of planar monomials over fields of square order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Coding and Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Nonlinearity of Discrete Logarithm in $\mathbb F_{2^n}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Properties of a Family of Cryptographic Boolean Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: APN permutations on \(\mathbb Z_n\) and Costas arrays / rank
 
Normal rank
Property / cites work
 
Property / cites work: SAFER K-64: A byte-oriented block-ciphering algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: SAFER K-64: One year later / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Nonlinearity of Exponential Welch Costas Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: An upper bound for the linearity of exponential Welch-Costas functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318725 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provable security against a differential attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250811 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The interpolation attack on block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: New structure of block ciphers with provable security against differential and linear cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: New block encryption algorithm MISTY / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear frameworks for block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Understanding Two-Round Differentials in AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extended differential properties of cryptographic functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Classification of 4 Bit S-Boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the classification of APN functions up to dimension five / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Properties of ${x\mapsto x^{2^{t}-1}}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential properties of power functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: More differentially 6-uniform power functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536254 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Analysis of the XSL Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of FIDES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3062265 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Crooked functions, bent functions, and distance regular graphs / rank
 
Normal rank

Revision as of 14:38, 9 July 2024

scientific article
Language Label Description Also known as
English
Perfect nonlinear functions and cryptography
scientific article

    Statements

    Perfect nonlinear functions and cryptography (English)
    0 references
    0 references
    0 references
    30 January 2015
    0 references
    Perfect nonlinear functions \(F:G\to H\) between groups \(G\) and \(H\) are those for which \(F(x+a)-F(x)=b\) has the same number \(\lambda\) of solutions for all \(b\) and all \(a\neq 0\). They have numerous applications in finite geometry, coding theory and cryptography. There are several survey type articles dealing with such functions, see [\textit{A. Pott}, Des. Codes Cryptography 78, No. 1, 141--195 (2016; Zbl 1351.51004)] and [\textit{C. Carlet} and \textit{C. Ding}, J. Complexity 20, No. 2--3, 205--244 (2004; Zbl 1053.94011)], for instance. The survey under review focuses on the cryptographic applications. In that case, also some extensions of perfect nonlinear functions have to be considered, notably the case of almost perfect nonlinear functions: these are functions where \(G=H={\mathbb Z}_2^n\) and \(F(x+a)-F(x)=b\) has \(0\) or \(2\) solutions for all \(b\) and all \(a\neq 0\) (it is known that the number of solutions must be always an even number if \(G=H={\mathbb Z}_2^n\), hence perfect nonlinear functions cannot exist in this case). Another goal is that \(F\) is bijective, which seems to be difficult to reach if \(n\) is even and \(G=H={\mathbb Z}_2^n\) (only one example for \(n=6\) is known [\textit{K. A. Browning} et al., Contemp. Math. 518, 33--42 (2010; Zbl 1206.94026)] ). Therefore, some further extensions of perfect nonlinearity have been studied, like the discrete exponential and logarithmic functions. The authors describe very concrete applications of perfect nonlinear functions and their variations in different cryptographic schemes (IDEA, AES, CRADIC, Keccak or FIDES, to name just a few). The strength of this article is the description of the links between perfect nonlinearity real world cryptography.
    0 references
    survey
    0 references
    perfect nonlinear functions
    0 references
    PN functions
    0 references
    almost perfect nonlinear functions
    0 references
    APN functions
    0 references
    differential uniformity
    0 references
    nonlinearity
    0 references
    differential cryptanalysis
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers