scientific article; zbMATH DE number 2009966

From MaRDI portal
Publication:4434885

zbMath1038.94525MaRDI QIDQ4434885

Willi Meier, Nicolas T. Courtois

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560345.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functionsAnalysis of variability and degree of non-linearity of HC-128Algebraic construction of near-bent function with application to cryptographyThe Cryptographic Power of Random SelectionCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeOn the maximal component algebraic immunity of vectorial Boolean functionsCube Attack on Stream Ciphers using a Modified Linearity TestOn the annihilators of Boolean polynomialsProperties of a Family of Cryptographic Boolean FunctionsDistribution Properties of Half-$$\ell $$-SequenceStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionSecondary constructions of RSBFs with good cryptographic propertiesOn the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean FunctionsEfficient and extensive search for precise linear approximations with high correlations of full SNOW-VConstructing odd-variable RSBFs with optimal algebraic immunity, good nonlinearity and good behavior against fast algebraic attacksA new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearityOn algebraic immunity of trace inverse functions on finite fields of characteristic twoOn the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generatorA new construction of weightwise perfectly balanced Boolean functionsA lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functionsTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherAlgebraic attacks on Rasta and Dasta using low-degree equationsThe Stream Cipher HC-128A unified construction of weightwise perfectly balanced Boolean functionsОб одном методе построения следствий специального вида для систем булевых уравнений;On a method to construct special type corollaries for systems of Boolean equationsAlgebraic Attacks against Random Local Functions and Their CountermeasuresA Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic AttacksGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128Algebraic and Slide Attacks on KeeLoqThe decomposition of an NFSR into the cascade connection of two smaller NFSRs revisitedA matrix construction of Boolean functions with maximum algebraic immunityBalanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearityA new method to construct Boolean functions with good cryptographic propertiesConstruction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearityA Survey of Recent Attacks on the Filter GeneratorConstruction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic ImmunityAlgebraic immunity for cryptographically significant Boolean functions: analysis and constructionLoiss: A Byte-Oriented Stream CipherFROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTIONAttacks Against Filter Generators Exploiting Monomial MappingsStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionFast Correlation Attacks: Methods and CountermeasuresWG: a family of stream ciphers with designed randomness propertiesOn the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunityConcatenating indicators of flats for designing cryptographic functionsQUAD: A Practical Stream Cipher with Provable SecurityHow to Strengthen Pseudo-random Generators by Using CompressionEfficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksMutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic AttacksWeight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of VariablesAn Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good NonlinearitySequences, DFT and Resistance against Fast Algebraic AttacksOn the Number of Linearly Independent Equations Generated by XLParallel Generation of ℓ-SequencesOn the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their GeneralizationsEfficient Computation of the Best Quadratic Approximations of Cubic Boolean FunctionsAlgebraic Cryptanalysis of the Data Encryption StandardRandomness and Representation of Span n SequencesA survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphersOn the spectral immunity of periodic sequences restricted to binary annihilatorsConstruction of balanced even-variable Boolean functions with optimal algebraic immunityCryptanalysis of CTC2Cube Attacks on Tweakable Black Box PolynomialsOn construction of correlation-immune functions via minimal functionsHill Climbing Algorithms and TriviumAn algorithm for the spectral immunity of binary sequence with period 2 nAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksPractical Algebraic Attacks on the Hitag2 Stream CipherA New Construction of Boolean Functions with Maximum Algebraic ImmunityConstructing de Bruijn Sequences Based on a New Necessary ConditionA class of rotation symmetric Boolean functions with optimum algebraic immunityOn the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i  + 1, 2 j  + 1}Construction of balanced rotation symmetric Boolean functions with optimal algebraic immunityUnnamed ItemLinear codes from vectorial Boolean functions in the context of algebraic attacksThe method for constructing uniform planar approximations of the filter generatorAlgorithm 959On the fast algebraic immunity of threshold functionsCryptanalysis of the class of maximum period Galois NLFSR-based stream ciphersA new construction of odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearityStream/block ciphers, difference equations and algebraic attacksEnhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsOn various nonlinearity measures for Boolean functionsStatistical properties of half-\(\ell\)-sequencesA construction of 1-resilient Boolean functions with good cryptographic propertiesA systematic method of constructing weightwise almost perfectly balanced Boolean functions on an arbitrary number of variablesGrain-like structures with minimal and maximal period sequencesLinearization of nonlinear filter generators and its application to cryptanalysis of stream ciphersAn algebraic attack on the improved summation generator with 2-bit memoryLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Correlation attacks on combination generatorsCryptanalysis of WG-7: a lightweight stream cipherConstructing even-variable RSBFs with higher nonlinearity, optimal AI and almost optimal FAIFunctions without short implicants. I: Lower estimates of weightsDifferential-ML distinguisher: machine learning based generic extension for differential cryptanalysisConstructions of balanced odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearityBalanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunityBasic theory in construction of Boolean functions with maximum possible annihilator immunityBoolean functions of an odd number of variables with maximum algebraic immunityOn the linear complexity of feedforward clock-controlled sequenceFast near collision attack on the Grain v1 stream cipherBoolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng constructionQuaternary cryptographic bent functions and their binary projectionCAR30: a new scalable stream cipher with rule 30Secondary constructions of Boolean functions with maximum algebraic immunityImproved multi-pass fast correlation attacks with applicationsOn the algebraic immunity of direct sum constructionsOn a method of derivation of lower bounds for the nonlinearity of Boolean functionsOn the algebraic immunity of multiplexer Boolean functionsAlgebraic attacks on a class of stream ciphers with unknown output functionA characterization of balanced Boolean functions with optimal algebraic immunityImproving the high order nonlinearity lower bound for Boolean functions with given algebraic immunityImproved filter permutators for efficient FHE: better instances and implementationsA family of weightwise (almost) perfectly balanced Boolean functions with optimal algebraic immunityThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsConstruction of weightwise perfectly balanced Boolean functions with high weightwise nonlinearityA characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphersBalanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degreeNew constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunityCryptographic properties of the hidden weighted bit functionCharacterization of robust immune symmetric Boolean functionsBoolean functions optimizing most of the cryptographic criteriaOn the relation between the MXL family of algorithms and Gröbner basis algorithmsOn designated-weight Boolean functions with highest algebraic immunityA construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation costOn the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunityUpper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functionsA combinatorial condition and Boolean functions with optimal algebraic immunityA note on determine the greatest common subfamily of two NFSRs by Gröbner basisOn the construction of multi-output Boolean functions with optimal algebraic immunityOn extended algebraic immunityOn the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacksInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean functionA note on the algebraic immunity of the Maiorana-McFarland class of bent functionsBalanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunityA construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunityConcatenations of the hidden weighted bit function and their cryptographic propertiesA design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementationThe Tu-Deng conjecture holds almost surelyA quantum query algorithm for computing the degree of a perfect nonlinear Boolean functionEnhanced Boolean functions suitable for the filter model of pseudo-random generatorTwo constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacksAlgebraic cryptanalysis of stream ciphers using decomposition of Boolean functionConstructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearityEspresso: a stream cipher for 5G wireless communication systemsSecondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functionsImproving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\)An improved degree evaluation method of NFSR-based cryptosystemsAFSRs synthesis with the extended Euclidean rational approximation algorithmA systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller codeA conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunityBalanced \(2^k\)-variable rotation symmetric Boolean functions with optimal algebraic immunityAlgebraic construction of near-bent and APN functionsConstruction and enumeration of Boolean functions with maximum algebraic immunityOptimal parameters for the WG stream cipher familyCryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipherImproving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteriaHybrid classes of balanced Boolean functions with good cryptographic propertiesFurther properties of several classes of Boolean functions with optimum algebraic immunityEfficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large \(n\)Solving multiple right hand sides linear equationsOn second-order nonlinearity and maximum algebraic immunity of some bent functions in \(\mathcal{PS}^{+}\)On the immunity of rotation symmetric Boolean functions against fast algebraic attacksA new two-dimensional mutual coupled logistic map and its application for pseudorandom number generatorOn the \(k\)-error linear complexities of De Bruijn sequencesA graph theoretic approach to construct desired cryptographic Boolean functionsAn overview of distinguishing attacks on stream ciphersOn the uniqueness of a type of cascade connection representations for NFSRsNew constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functionsOn \((2^{m}+1)\)-variable symmetric Boolean functions with submaximum algebraic immunity \(2^{m - 1}\)Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacksAn algebraic attack to the Bluetooth stream cipher \textsc{E0}A new construction of odd-variable rotation symmetric Boolean functions with good cryptographic propertiesBalanced odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearityA note on two classes of Boolean functions with optimal algebraic immunityAlgebraic attacks on grain-like keystream generatorsA generic method for investigating nonsingular Galois NFSRs