Perfect nonlinear functions and cryptography
From MaRDI portal
Publication:2512886
DOI10.1016/j.ffa.2014.10.007zbMath1372.94413OpenAlexW2052178764MaRDI QIDQ2512886
Publication date: 30 January 2015
Published in: Finite Fields and their Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ffa.2014.10.007
surveynonlinearitydifferential cryptanalysisAPN functionsalmost perfect nonlinear functionsdifferential uniformityperfect nonlinear functionsPN functions
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items
Differential and boomerang spectrums of some power permutations ⋮ Optimal \(p\)-ary cyclic codes with minimum distance four from monomials ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets ⋮ Some new results on the conjecture on exceptional APN functions and absolutely irreducible polynomials: the Gold case ⋮ The number of almost perfect nonlinear functions grows exponentially ⋮ On kernels and nuclei of rank metric codes ⋮ A new class of generalized almost perfect nonlinear power function ⋮ Investigating rational perfect nonlinear functions ⋮ Image sets of perfectly nonlinear maps ⋮ Further constructions and characterizations of generalized almost perfect nonlinear functions ⋮ Symmetric random function generator (SRFG): a novel cryptographic primitive for designing fast and robust algorithms ⋮ Boomerang uniformity of power permutations and algebraic curves over \(\mathbb{F}_{2^n}\) ⋮ The classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functions ⋮ Construction of \(\varepsilon_d\)-ASIC-POVMs via 2-to-1 PN functions and the Li bound ⋮ Almost perfect and planar functions ⋮ Nonexistence results on generalized bent functions \(\mathbb{Z}_q^m \rightarrow \mathbb{Z}_q\) with odd \(m\) and \(q \equiv 2\pmod 4\) ⋮ Classification of 8-dimensional rank two commutative semifields ⋮ FROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTION ⋮ ON CONSTRUCTING APN PERMUTATIONS USING SUBFUNCTIONS ⋮ New generalized almost perfect nonlinear functions ⋮ On an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problem ⋮ Determining the Walsh spectra of Taniguchi's and related APN-functions ⋮ Constructing new differentially 4-uniform permutations from known ones ⋮ Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem ⋮ Monomial Generalized Almost Perfect Nonlinear Functions ⋮ Symbolic dynamics and rotation symmetric Boolean functions ⋮ Planar polynomials arising from linearized polynomials
Uses Software
Cites Work
- More differentially 6-uniform power functions
- An upper bound for the linearity of exponential Welch-Costas functions
- Differential properties of power functions
- Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions
- Planar functions and planes of Lenz-Barlotti class II
- On the classification of planar monomials over fields of square order
- The cryptanalysis of FEAL-4 with 20 chosen plaintexts
- APN permutations on \(\mathbb Z_n\) and Costas arrays
- On the classification of APN functions up to dimension five
- Constructing new APN functions from known ones
- Generalized bent functions and their properties
- On ``bent functions
- Codes, bent functions and permutations suitable for DES-like cryptosystems
- Crooked functions, bent functions, and distance regular graphs
- On finite Abelian groups with nonsingular quadratic form
- Highly nonlinear mappings
- Linear frameworks for block ciphers
- Provable security against a differential attack
- Almost perfect nonlinear power functions on \(\mathrm{GF}(2^n)\): the Niho case.
- A new almost perfect nonlinear function which is not quadratic
- Planar functions and perfect nonlinear monomials over finite fields
- CCZ-equivalence of bent vectorial functions and related constructions
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Affinity of permutations of \(\mathbb F_{2}^{n}\)
- Planes of order \(n\) with collineation groups of order \(n^ 2\)
- Theory of transformation groups of polynomials over \(\mathrm{GF}(2)\) with applications to linear shift register sequences
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Handbook of Finite Fields
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Properties of a Family of Cryptographic Boolean Functions
- Cryptanalysis of FIDES
- Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- The LED Block Cipher
- Extended differential properties of cryptographic functions
- Some Theorems on Planar Mappings
- PRESENT: An Ultra-Lightweight Block Cipher
- Understanding Two-Round Differentials in AES
- New classes of almost bent and almost perfect nonlinear polynomials
- Linear Codes From Perfect Nonlinear Mappings and Their Secret Sharing Schemes
- A new APN function which is not equivalent to a power mapping
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Switching Construction of Planar Functions on Finite Fields
- On the Nonlinearity of Discrete Logarithm in $\mathbb F_{2^n}$
- Perfect nonlinear S-boxes
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- SAFER K-64: One year later
- SAFER K-64: A byte-oriented block-ciphering algorithm
- Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture
- New structure of block ciphers with provable security against differential and linear cryptanalysis
- The interpolation attack on block ciphers
- New block encryption algorithm MISTY
- Almost perfect nonlinear power functions on GF(2/sup n/): the Welch case
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- New Links between Differential and Linear Cryptanalysis
- On Almost Perfect Nonlinear Permutations
- Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences
- On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions
- Differential Properties of ${x\mapsto x^{2^{t}-1}}$
- On the Nonlinearity of Exponential Welch Costas Functions
- An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity
- ‐Relative Difference Sets and Their Representations
- Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
- On the Classification of 4 Bit S-Boxes
- An Analysis of the XSL Algorithm
- The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes
- Fast Software Encryption
- Coding and Cryptography
- A proof of the Welch and Niho conjectures on cross-correlations of binary \(m\)-sequences
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item