126
Views
2
CrossRef citations to date
0
Altmetric
SECTION A

Construction of balanced even-variable Boolean functions with optimal algebraic immunity

Pages 2219-2232 | Received 12 Feb 2014, Accepted 24 Sep 2014, Published online: 17 Nov 2014

References

  • A. Canteaut and M. Videau, Symmetric Boolean functions, IEEE Trans. Inf. Theory 51(8) (2005), pp. 2791–2811.
  • C. Carlet, A method of construction of balanced functions with optimum algebraic immunity, International Workshop on Coding and Cryptology, Versailles (France), 2007, pp. 25–43.
  • C. Carlet, A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers, Vietnam J. Math. 41(4) (2013), pp. 527–541.
  • C. Carlet and K. Feng, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, in Advances in Cryptology-ASIACRYPT 2008, J. Pieprzyk, ed., Lecture Notes in Computer Science, Vol. 5350, Springer, Berlin, 2008, pp. 425–440.
  • C. Carlet, X. Zeng, C. Li and L. Hu, Further properties of several classes of Boolean functions with optimum algebraic immunity, Des., Codes Cryptogr. 52(3) (2009), pp. 303–338.
  • N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, in Advances in Cryptology-CRYPTO 2003, D. Boneh, ed., Lecture Notes in Computer Science, Vol. 2729, Springer, Berlin, 2003, pp. 176–194.
  • N. Courtois, Cryptanalysis of sfinks, in ICISC 2005, D.H. Won, S. Kim, eds., Lecture Notes in Computer Science, Vol. 3935, Springer, Berlin Heidberg, 2006, pp. 261–269.
  • N. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, in EUROCRYPT 2003, E. Biham, ed., Lecture Notes in Computer Science, Vol. 2656, Springer, Berlin, 2003, pp. 345–359.
  • D. Dalai, S. Maitra and S. Sarkar, Basic theory in construction of Boolean functions with maximum possible annihilator immunity, Des., Codes Cryptogr. 40(1) (2006), pp. 41–58.
  • C. Ding, G. Xiao and W. Shan, The Stability Theory of Stream Ciphers, Lecture Notes in Computer Science, Vol. 561, Springer, Berlin, 1991, pp. 70–80.
  • M. Lobanov, Tight bound between nonlinearity and algebraic immunity, Available at http://eprint.iacr.org/2005/441.
  • F.J. MacWillams and N.J.A. Sloane, The Theory of Error Correcting Codes, North-Holland, Amsterdam, 1977.
  • W. Meier and O. Staffelbach, Fast correlation attacks on stream ciphers, in Advances in Cryptology-EUROCRYPT 1988, C.G. Gunther, ed., Lecture Notes in Computer Science, Vol. 330, Springer, Berlin, 1988, pp. 301–314.
  • W. Meier, E. Pasalic and C. Carlet, Algebraic attacks and decomposition of Boolean functions, in Advances in Cryptology-EUROCRYPT 2004, C. Cachin and J. Camenisch, eds., Lecture Notes in Computer Science, Vol. 3027, Springer, Berlin, 2004, pp. 474–491.
  • S. Mesnager, Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity, IEEE Trans. Inf. Theory 54 (2008), pp. 3656–3662.
  • W. Mihaljevic and H. Imai, Cryptanalysis of Toyocrypt-HS1 stream cipher, IEICE T. Fund. Electr. 85-A (2002), pp. 66–73.
  • D. Muller, Application of Boolean algebra to switching circuit design and to error detection, IEEE Trans. Comput. 3 (1954), pp. 6–12.
  • S. Reed, A class of multiple-error-correcting codes and the decoding scheme, IEEE Trans. Inf. Theory 4 (1954), pp. 38–49.
  • S. Sarkar and S. Maitra, Construction of rotation symmetric Boolean functions with optimal algebraic immunity, Comput. Syst. 12 (2009), pp. 267–284.
  • P. Savicky, On the bent Boolean functions that are symmetric, Eur. J. Combin. 15 (1994), pp. 407–410.
  • W. Su, X. Zeng and L. Hu, Construction of 1-resilient Boolean functions with optimum algebraic immunity, Int. J. Comput. Math. 88(2) (2011), pp. 222–238.
  • S. Su, X. Tang and X. Zeng, A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of Reed–Muller code, Des., Codes Cryptogr. 72(3) (2014), pp. 653–673.
  • Y. Sun, L. Li and B. Yang, Constructions of balanced Boolean functions with high nonlinearity and high algebraic degree, Int. J. Comput. Math. (2013), DOI:10.1080/00207160.2013.770147.
  • Q. Wang, T. Johansson and H. Kan, Some results on fast algebraic attacks and higher order nonlinearities, IET Inf. Secur. 6(1) (2012), pp. 41–46.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.