scientific article; zbMATH DE number 2009966
From MaRDI portal
Publication:4434885
zbMath1038.94525MaRDI QIDQ4434885
Willi Meier, Nicolas T. Courtois
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560345.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Boolean functionsnonlinear filteringLILI-128pseudo-random generatorsXL algorithmmultivariate equationsciphertext-only attacksCryptrecNessieAlgebraic attacks on stream ciphersfactoring multivariate polynomialsoverdefined problemsToyocrypt
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items
Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functions ⋮ Analysis of variability and degree of non-linearity of HC-128 ⋮ Algebraic construction of near-bent function with application to cryptography ⋮ The Cryptographic Power of Random Selection ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ On the maximal component algebraic immunity of vectorial Boolean functions ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test ⋮ On the annihilators of Boolean polynomials ⋮ Properties of a Family of Cryptographic Boolean Functions ⋮ Distribution Properties of Half-$$\ell $$-Sequence ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Secondary constructions of RSBFs with good cryptographic properties ⋮ On the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions ⋮ Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V ⋮ Constructing odd-variable RSBFs with optimal algebraic immunity, good nonlinearity and good behavior against fast algebraic attacks ⋮ A new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ On the algebraic immunity -- resiliency trade-off, implications for Goldreich's pseudorandom generator ⋮ A new construction of weightwise perfectly balanced Boolean functions ⋮ A lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functions ⋮ Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ The Stream Cipher HC-128 ⋮ A unified construction of weightwise perfectly balanced Boolean functions ⋮ Об одном методе построения следствий специального вида для систем булевых уравнений;On a method to construct special type corollaries for systems of Boolean equations ⋮ Algebraic Attacks against Random Local Functions and Their Countermeasures ⋮ A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacks ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited ⋮ A matrix construction of Boolean functions with maximum algebraic immunity ⋮ Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity ⋮ A new method to construct Boolean functions with good cryptographic properties ⋮ Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity ⋮ A Survey of Recent Attacks on the Filter Generator ⋮ Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity ⋮ Algebraic immunity for cryptographically significant Boolean functions: analysis and construction ⋮ Loiss: A Byte-Oriented Stream Cipher ⋮ FROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTION ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ WG: a family of stream ciphers with designed randomness properties ⋮ On the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunity ⋮ Concatenating indicators of flats for designing cryptographic functions ⋮ QUAD: A Practical Stream Cipher with Provable Security ⋮ How to Strengthen Pseudo-random Generators by Using Compression ⋮ Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks ⋮ Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks ⋮ Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables ⋮ An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity ⋮ Sequences, DFT and Resistance against Fast Algebraic Attacks ⋮ On the Number of Linearly Independent Equations Generated by XL ⋮ Parallel Generation of ℓ-Sequences ⋮ On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations ⋮ Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ Randomness and Representation of Span n Sequences ⋮ A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers ⋮ On the spectral immunity of periodic sequences restricted to binary annihilators ⋮ Construction of balanced even-variable Boolean functions with optimal algebraic immunity ⋮ Cryptanalysis of CTC2 ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ On construction of correlation-immune functions via minimal functions ⋮ Hill Climbing Algorithms and Trivium ⋮ An algorithm for the spectral immunity of binary sequence with period 2 n ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ A New Construction of Boolean Functions with Maximum Algebraic Immunity ⋮ Constructing de Bruijn Sequences Based on a New Necessary Condition ⋮ A class of rotation symmetric Boolean functions with optimum algebraic immunity ⋮ On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1} ⋮ Construction of balanced rotation symmetric Boolean functions with optimal algebraic immunity ⋮ Unnamed Item ⋮ Linear codes from vectorial Boolean functions in the context of algebraic attacks ⋮ The method for constructing uniform planar approximations of the filter generator ⋮ Algorithm 959 ⋮ On the fast algebraic immunity of threshold functions ⋮ Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers ⋮ A new construction of odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity ⋮ Stream/block ciphers, difference equations and algebraic attacks ⋮ Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ On various nonlinearity measures for Boolean functions ⋮ Statistical properties of half-\(\ell\)-sequences ⋮ A construction of 1-resilient Boolean functions with good cryptographic properties ⋮ A systematic method of constructing weightwise almost perfectly balanced Boolean functions on an arbitrary number of variables ⋮ Grain-like structures with minimal and maximal period sequences ⋮ Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers ⋮ An algebraic attack on the improved summation generator with 2-bit memory ⋮ Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Correlation attacks on combination generators ⋮ Cryptanalysis of WG-7: a lightweight stream cipher ⋮ Constructing even-variable RSBFs with higher nonlinearity, optimal AI and almost optimal FAI ⋮ Functions without short implicants. I: Lower estimates of weights ⋮ Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis ⋮ Constructions of balanced odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity ⋮ Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity ⋮ Basic theory in construction of Boolean functions with maximum possible annihilator immunity ⋮ Boolean functions of an odd number of variables with maximum algebraic immunity ⋮ On the linear complexity of feedforward clock-controlled sequence ⋮ Fast near collision attack on the Grain v1 stream cipher ⋮ Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction ⋮ Quaternary cryptographic bent functions and their binary projection ⋮ CAR30: a new scalable stream cipher with rule 30 ⋮ Secondary constructions of Boolean functions with maximum algebraic immunity ⋮ Improved multi-pass fast correlation attacks with applications ⋮ On the algebraic immunity of direct sum constructions ⋮ On a method of derivation of lower bounds for the nonlinearity of Boolean functions ⋮ On the algebraic immunity of multiplexer Boolean functions ⋮ Algebraic attacks on a class of stream ciphers with unknown output function ⋮ A characterization of balanced Boolean functions with optimal algebraic immunity ⋮ Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ A family of weightwise (almost) perfectly balanced Boolean functions with optimal algebraic immunity ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ Construction of weightwise perfectly balanced Boolean functions with high weightwise nonlinearity ⋮ A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers ⋮ Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree ⋮ New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity ⋮ Cryptographic properties of the hidden weighted bit function ⋮ Characterization of robust immune symmetric Boolean functions ⋮ Boolean functions optimizing most of the cryptographic criteria ⋮ On the relation between the MXL family of algorithms and Gröbner basis algorithms ⋮ On designated-weight Boolean functions with highest algebraic immunity ⋮ A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost ⋮ On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity ⋮ Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions ⋮ A combinatorial condition and Boolean functions with optimal algebraic immunity ⋮ A note on determine the greatest common subfamily of two NFSRs by Gröbner basis ⋮ On the construction of multi-output Boolean functions with optimal algebraic immunity ⋮ On extended algebraic immunity ⋮ On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks ⋮ Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function ⋮ A note on the algebraic immunity of the Maiorana-McFarland class of bent functions ⋮ Balanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunity ⋮ A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity ⋮ Concatenations of the hidden weighted bit function and their cryptographic properties ⋮ A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation ⋮ The Tu-Deng conjecture holds almost surely ⋮ A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function ⋮ Enhanced Boolean functions suitable for the filter model of pseudo-random generator ⋮ Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks ⋮ Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Constructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearity ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions ⋮ Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\) ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ AFSRs synthesis with the extended Euclidean rational approximation algorithm ⋮ A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code ⋮ A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity ⋮ Balanced \(2^k\)-variable rotation symmetric Boolean functions with optimal algebraic immunity ⋮ Algebraic construction of near-bent and APN functions ⋮ Construction and enumeration of Boolean functions with maximum algebraic immunity ⋮ Optimal parameters for the WG stream cipher family ⋮ Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher ⋮ Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria ⋮ Hybrid classes of balanced Boolean functions with good cryptographic properties ⋮ Further properties of several classes of Boolean functions with optimum algebraic immunity ⋮ Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large \(n\) ⋮ Solving multiple right hand sides linear equations ⋮ On second-order nonlinearity and maximum algebraic immunity of some bent functions in \(\mathcal{PS}^{+}\) ⋮ On the immunity of rotation symmetric Boolean functions against fast algebraic attacks ⋮ A new two-dimensional mutual coupled logistic map and its application for pseudorandom number generator ⋮ On the \(k\)-error linear complexities of De Bruijn sequences ⋮ A graph theoretic approach to construct desired cryptographic Boolean functions ⋮ An overview of distinguishing attacks on stream ciphers ⋮ On the uniqueness of a type of cascade connection representations for NFSRs ⋮ New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions ⋮ On \((2^{m}+1)\)-variable symmetric Boolean functions with submaximum algebraic immunity \(2^{m - 1}\) ⋮ Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks ⋮ An algebraic attack to the Bluetooth stream cipher \textsc{E0} ⋮ A new construction of odd-variable rotation symmetric Boolean functions with good cryptographic properties ⋮ Balanced odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity ⋮ A note on two classes of Boolean functions with optimal algebraic immunity ⋮ Algebraic attacks on grain-like keystream generators ⋮ A generic method for investigating nonsingular Galois NFSRs