scientific article; zbMATH DE number 4195884
From MaRDI portal
Publication:5202622
zbMath0724.94009MaRDI QIDQ5202622
Willi Meier, Othmar Staffelbach
Publication date: 1990
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
stream ciphersBoolean functionsblock ciphersbent functionslinear structurescorrelation problemaffine functionsmaximum distancecryptographic design
Related Items (68)
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties ⋮ Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups ⋮ Synthesis of highly nonlinear S-boxes satisfying higher order propagation criterion ⋮ Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functions ⋮ Algebraic construction of near-bent function with application to cryptography ⋮ Boolean functions: degree and support ⋮ On third-order nonlinearity of biquadratic monomial Boolean functions ⋮ On various nonlinearity measures for Boolean functions ⋮ Walsh transforms and cryptographic applications in bias computing ⋮ Efficient key-dependent dynamic S-boxes based on permutated elliptic curves ⋮ Algebraic nonlinearity and its applications to cryptography ⋮ Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix ⋮ Matrix representations of vectorial Boolean functions and eigenanalysis ⋮ Quaternary cryptographic bent functions and their binary projection ⋮ Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors ⋮ Substitution-permutation networks resistant to differential and linear cryptanalysis ⋮ Unnamed Item ⋮ Correlation properties of a general binary combiner with memory ⋮ Generalized hyper-bent functions over \(GF(p)\) ⋮ Constructive Relationships Between Algebraic Thickness and Normality ⋮ Some remarks on the TKIP key mixing function of IEEE 802.11i ⋮ Affine Equivalency and Nonlinearity Preserving Bijective Mappings over $$\mathbb {F}_2$$ ⋮ Nonlinearity of functions over finite fields ⋮ A construction of bent functions of \(n+2\) variables from a bent function of \(n\) variables and its cyclic shifts ⋮ When does \(G(x)+\gamma \, \text{Tr}(H(x))\) permute \(\mathbb F_{p^n}\)? ⋮ Modifications of bijective S-boxes with linear structures ⋮ Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps ⋮ Construction of nonlinear component based on bent Boolean functions ⋮ On the construction of new bent functions from the max-weight and min-weight functions of old bent functions ⋮ Construction of 1-resilient Boolean functions with optimal algebraic immunity and good non\-linearity ⋮ Random number generation using decimal cellular automata ⋮ Literature survey on nonlinear components and chaotic nonlinear components of block ciphers ⋮ Methods and instruments for designing S-boxes ⋮ Improving high-meets-low technique to generate odd-variable resilient Boolean functions with currently best nonlinearity ⋮ Minimal Sign Representation of Boolean Functions: Algorithms and Exact Results for Low Dimensions ⋮ The structured design of cryptographically good s-boxes ⋮ Constructions of Resilient S-Boxes With Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes ⋮ Nearly bent functions ⋮ Correlation properties of combiners with memory in stream ciphers ⋮ A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function ⋮ On immunity against Biham and Shamir's differential cryptanalysis ⋮ Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ Generating bent sequences ⋮ I/O correlation properties of bent functions ⋮ Algebraic construction of near-bent and APN functions ⋮ Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks ⋮ Revisiting Correlation-Immunity in Filter Generators ⋮ Perfect nonlinear functions and cryptography ⋮ Characterizations of generators for modified de Bruijn sequences ⋮ G-perfect nonlinear functions ⋮ On a new classification of Boolean functions ⋮ A graph theoretic approach to construct desired cryptographic Boolean functions ⋮ Low order approximation of cipher functions ⋮ Clues to the hidden nature of de Bruijn sequences ⋮ On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions ⋮ New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions ⋮ Unnamed Item ⋮ Provable security against a differential attack ⋮ Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity ⋮ Highly nonlinear resilient functions through disjoint codes in projective spaces. ⋮ On the balancedness of nonlinear generators of binary sequences. ⋮ On cryptographic propagation criteria for Boolean functions ⋮ Weight class distributions of de Bruijn sequences ⋮ К вопросу о приближении векторных функций над конечными полями аффинными аналогами ⋮ Algorithm 959 ⋮ Improving the strict avalanche characteristics of cryptographic functions ⋮ Connections among nonlinearity, avalanche and correlation immunity
This page was built for publication: