Construction and Analysis of Cryptographic Functions

From MaRDI portal
Publication:5173094

DOI10.1007/978-3-319-12991-4zbMath1367.94001OpenAlexW4211127378MaRDI QIDQ5173094

Lilya Budaghyan

Publication date: 6 February 2015

Full work available at URL: https://doi.org/10.1007/978-3-319-12991-4




Related Items (45)

Characters, Weil sums and \(c\)-differential uniformity with an application to the perturbed Gold functionAffine equivalence and non-linearity of permutations over \(\mathbb Z_n\)Differential and boomerang spectrums of some power permutationsWalsh-Hadamard transforms of generalized \(p\)-ary functions and \(C\)-finite sequencesOn the boomerang uniformity of permutations of low Carlitz rankCharacterization of almost perfect nonlinear functions in terms of subfunctionsAutocorrelations of vectorial Boolean functionsOn the symmetric properties of APN functionsSurvey on recent trends towards generalized differential and boomerang uniformitiesBent and permutational properties of Budaghyan-Carlet hexanomialsThe number of almost perfect nonlinear functions grows exponentiallyPartially APN functions with APN-like polynomial representationsOn the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN FunctionsCharacteristics of nonlinearity of vectorial functions over finite fieldsGeneralized bent Boolean functions and strongly regular Cayley graphsCryptographic functions with interesting properties from CCZ-equivalenceFurther investigations on permutation based constructions of bent functionsUsing double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fieldsThe classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functionsRevisiting some results on APN and algebraic immune functionsPartially APN Boolean functions and classes of functions that are not APN infinitely oftenAlmost perfect and planar functionsNonlinearity of k-cycle permutations on ℤnGeneralized isotopic shift construction for APN functionsOn APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structuresInvestigations on \(c\)-boomerang uniformity and perfect nonlinearityGeneralization of a class of APN binomials to Gold-like functionsON CONSTRUCTING APN PERMUTATIONS USING SUBFUNCTIONSA NOTE ON THE PROPERTIES OF ASSOCIATED BOOLEAN FUNCTIONS OF QUADRATIC APN FUNCTIONSClassification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9On an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problemGowers \(U_2\) norm as a measure of nonlinearity for Boolean functions and their generalizationsRecent results and problems on constructions of linear codes from cryptographic functionsThe \(c\)-differential behavior of the inverse function under the \textit{EA}-equivalenceLow \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function$\otimes_{\mathbf{W}}$-марковость XSL-алгоритмов блочного шифрования, связанная со свойствами слоев раундовой функцииPermutation Binomial Functions over Finite Fields\(C\)-differential bent functions and perfect nonlinearityA lower bound on the number of inequivalent APN functionsOn the differential equivalence of APN functionsRecursions for modified Walsh transforms of some families of Boolean functionsA note on the differential spectrum of a class of power mappings with Niho exponentLow \(c\)-differential uniformity for functions modified on subfieldsConstructing more quadratic APN functions with the QAM methodOn known constructions of APN and AB functions and their relation to each other




This page was built for publication: Construction and Analysis of Cryptographic Functions