118
Views
5
CrossRef citations to date
0
Altmetric
Section A

Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition

, , , &
Pages 451-462 | Received 17 Aug 2013, Accepted 24 Mar 2014, Published online: 14 May 2014

References

  • M. Albrecht, Algebraic Attacks on the Courtois Toy Cipher, Cryptologia 32(3) (2008), pp. 220–276. doi: 10.1080/01611190802058139
  • F. Armknecht and M. Krause, Constructing Single- and Multi-Output Boolean Functions with Maximal Algebraic Immunity, Automata, Languages and Programming, Lecture Notes in Computer Science, Vol. 4052, Venice, Italy, 2006, pp. 180–191.
  • P. Berger and M. Minier, Two algebraic attacks against the F-FCSRs using the IV mode, Progress in Cryptology-INDOCRYPT 2005, Lecture Notes in Computer Science, Vol. 3797, Bangalore, India, 2005, pp. 143–154.
  • C. Carlet, Vectorial Boolean functions for cryptography, in Boolean Methods and Models, E.Y. Crama and P. Hammer, eds., Cambridge University Press, Cambridge, 2009, pp. 398–469.
  • C. Carlet and K. Feng, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, Advances in Cryptology-ASIACRYPT 2008, Lecture Notes in Computer Science, Vol. 5350, Melbourne, Australia, 2008, pp. 425–440.
  • C. Carlet and K. Feng, An infinite class of balanced vectorial Boolean functions with optimal algebraic immunity and good nonlinearity, Coding and Cryptology, Lecture Notes in Computer Science, Vol. 5557, Zhangjiajie, China, 2009, pp. 1–11. doi: 10.1007/978-3-642-01877-0_1
  • C. Carlet and P. Gaborit, Hyper-bent functions and cyclic codes, J. Comb. Theory, Ser. A 113(3) (2006), pp. 466–482. doi: 10.1016/j.jcta.2005.04.008
  • P. Charpin and G. Gong, Hyperbent functions, Kloosterman sums, and Dickson polynomials, IEEE Trans. Inf. Theory 54(9) (2008), pp. 4230–4238. doi: 10.1109/TIT.2008.928273
  • N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology – CRYPTO 2003, Lecture Notes in Computer Science, Vol. 2729, Santa Barbara, CA, 2003, pp. 176–194.
  • N. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-EUROCRYPT 2003, Lecture Notes in Computer Science, Vol. 2656, Springer Berlin Heidelberg, 2003, pp. 345–359.
  • N. Courtois, G. Bard, and D. Wagner, Algebraic and slide attacks on KeeLoq, Fast Software Encryption (2008), Lecture Notes in Computer Science, Vol. 5086, Lausanne, Switzerland, 2008, pp. 97–115.
  • K. Feng and J. Yang, Vectorial Boolean Functions with Good Cryptographic Properties, Int. J. Found. Comput Sc. 22(6) (2011), 1271–1282. doi: 10.1142/S0129054111008702
  • K. Feng, Q. Liao, and J. Yang, Maximal values of generalized algebraic immunity, Designs, Codes Cryptogr. 50(2) (2009), 243–252. doi: 10.1007/s10623-008-9228-0
  • W. Meier, E. Pasalic, and C. Carlet, Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology – EUROCRYPT 2004, Lecture Notes in Computer Science, Vol. 3027, Interlaken, Switzerland, 2004, pp. 474–491.
  • G. Sun, A class of vectorial Boolean functions with optimum algebraic immunity, Energy Procedia 13 (2011), pp. 317–326. doi: 10.1016/S1876-6102(14)00454-8
  • Z. Tu and Y. Deng, A conjecture about binary strings and its applications on constructing boolean functions with optimal algebraic immunity, Designs, Codes Cryptogr. 60(1) (2011), pp. 1–14. doi: 10.1007/s10623-010-9413-9
  • A.M. Youssef and G. Gong, Hyper-Bent Functions, Advances in Cryptology – EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Innsbruck, Austria, 2001, pp. 406–419.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.