scientific article; zbMATH DE number 4195884

From MaRDI portal
Revision as of 17:04, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5202622

zbMath0724.94009MaRDI QIDQ5202622

Willi Meier, Othmar Staffelbach

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesInvestigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroupsSynthesis of highly nonlinear S-boxes satisfying higher order propagation criterionImproved lower bound for algebraic immunity of a subclass of MM bent Boolean functionsAlgebraic construction of near-bent function with application to cryptographyBoolean functions: degree and supportOn third-order nonlinearity of biquadratic monomial Boolean functionsOn various nonlinearity measures for Boolean functionsWalsh transforms and cryptographic applications in bias computingEfficient key-dependent dynamic S-boxes based on permutated elliptic curvesAlgebraic nonlinearity and its applications to cryptographyConstructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrixMatrix representations of vectorial Boolean functions and eigenanalysisQuaternary cryptographic bent functions and their binary projectionCharacterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectorsSubstitution-permutation networks resistant to differential and linear cryptanalysisUnnamed ItemCorrelation properties of a general binary combiner with memoryGeneralized hyper-bent functions over \(GF(p)\)Constructive Relationships Between Algebraic Thickness and NormalitySome remarks on the TKIP key mixing function of IEEE 802.11iAffine Equivalency and Nonlinearity Preserving Bijective Mappings over $$\mathbb {F}_2$$Nonlinearity of functions over finite fieldsA construction of bent functions of \(n+2\) variables from a bent function of \(n\) variables and its cyclic shiftsWhen does \(G(x)+\gamma \, \text{Tr}(H(x))\) permute \(\mathbb F_{p^n}\)?Modifications of bijective S-boxes with linear structuresInvertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local mapsConstruction of nonlinear component based on bent Boolean functionsOn the construction of new bent functions from the max-weight and min-weight functions of old bent functionsConstruction of 1-resilient Boolean functions with optimal algebraic immunity and good non\-linearityRandom number generation using decimal cellular automataLiterature survey on nonlinear components and chaotic nonlinear components of block ciphersMethods and instruments for designing S-boxesImproving high-meets-low technique to generate odd-variable resilient Boolean functions with currently best nonlinearityMinimal Sign Representation of Boolean Functions: Algorithms and Exact Results for Low DimensionsThe structured design of cryptographically good s-boxesConstructions of Resilient S-Boxes With Strictly Almost Optimal Nonlinearity Through Disjoint Linear CodesNearly bent functionsCorrelation properties of combiners with memory in stream ciphersA quantum query algorithm for computing the degree of a perfect nonlinear Boolean functionOn immunity against Biham and Shamir's differential cryptanalysisComment on ``Bounds on the number of functions satisfying the Strict Avalanche CriterionFast Correlation Attacks: Methods and CountermeasuresGenerating bent sequencesI/O correlation properties of bent functionsAlgebraic construction of near-bent and APN functionsEfficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksRevisiting Correlation-Immunity in Filter GeneratorsPerfect nonlinear functions and cryptographyCharacterizations of generators for modified de Bruijn sequencesG-perfect nonlinear functionsOn a new classification of Boolean functionsA graph theoretic approach to construct desired cryptographic Boolean functionsLow order approximation of cipher functionsClues to the hidden nature of de Bruijn sequencesOn the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functionsNew constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functionsUnnamed ItemProvable security against a differential attackConstruction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearityHighly nonlinear resilient functions through disjoint codes in projective spaces.On the balancedness of nonlinear generators of binary sequences.On cryptographic propagation criteria for Boolean functionsWeight class distributions of de Bruijn sequencesК вопросу о приближении векторных функций над конечными полями аффинными аналогамиAlgorithm 959Improving the strict avalanche characteristics of cryptographic functionsConnections among nonlinearity, avalanche and correlation immunity




This page was built for publication: