129
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

On algebraic properties of S-boxes designed by means of disjoint linear codes

, , &
Pages 55-66 | Received 16 Jun 2014, Accepted 31 Oct 2014, Published online: 20 Dec 2014

References

  • C. Carlet and E. Prouff, On a new notion of nonlinearity relevant to multi-output pseudo- random generators, in Selected Areas in Cryptography 2003, M. Matsui and R.J. Zuccherato, eds., Lecture Notes in Computer Science, Vol. 3006, Springer, Berlin, 2003, pp. 291–305.
  • C. Carlet, K. Khoo, C. Lim, and C. Loe, On an improved correlation analysis of stream ciphers using multi-output Boolean functions and the related generalized notion of nonlinearity, Adv. Math. Commun. 2(2) (2008), pp. 201–221. doi: 10.3934/amc.2008.2.201
  • J. Cheon, Nonlinear vector resilient functions, in Advances in Cryptology – CRYPTO 2001, J. Kilian, ed., Lecture Notes in Computer Science, Vol. 2139, Springer, Berlin, 2001, pp. 485–469.
  • N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, in Advances in Cryptology – CRYPTO 2003, D. Boneh, ed., Lecture Notes in Computer Science, Vol. 2729, Springer, Berlin, 2003, pp. 176–194.
  • J. Dillon, Elementary Haddamard difference sets, Ph.D. thesis, University of Maryland, 1974.
  • C. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers, Lecture Notes in Computer Science, Vol. 561, Springer, Berlin, 1991.
  • H. Evertse, Linear structures in block ciphers, in Advances in Cryptology – EUROCRYPT’87, D. Chaum and W. L. Price, eds., Lecture Notes in Computer Science, Vol. 304, Springer, Berlin, 1987, pp. 249–266.
  • K. Gupta and P. Sarkar, Improved construction of nonlinear resilient S-boxes, IEEE Trans. Inf. Theory 51(1) (2005), pp. 339–348. doi: 10.1109/TIT.2004.839524
  • T. Johansson and E. Pasalic, A construction of resilient functions with high nonlinearity, IEEE Trans. Inf. Theory 49(2) (2003), pp. 494–501. doi: 10.1109/TIT.2002.807297
  • J. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Inf. Theory 15(1) (1969), pp. 122–127. doi: 10.1109/TIT.1969.1054260
  • W. Meier, E. Pasalic, and C. Carlet, Algebraic attacks and decomposition of Boolean functions, in Advanced in Cryptology – EUROCRYPT 2004, C. Cachin and J.L. Camenisch, eds., Lecture Notes in Computer Science, Vol. 3027, Springer, New York, 2004, pp. 474–491.
  • A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
  • E. Pasalic and S. Maitra, Linear codes in generalized construction of resilient functions with very high nonlinearity, IEEE Trans. Inf. Theory 48(8) (2002), pp. 2182–2191. doi: 10.1109/TIR.2002.800492
  • E. Pasalic, Maiorana–McFarland class: Degree optimization and algebraic properties, IEEE Trans. Inf. Theory 52(10) (2006), pp. 4581–4595. doi: 10.1109/TIT.2006.881721
  • T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Inf. Theory 30(5) (1984), pp. 776–780. doi: 10.1109/TIT.1984.1056949
  • X.-M. Zhang and Y. Zheng, Cryptographically resilient functions, IEEE Trans. Inf. Theory 43(5) (1997), pp. 1740–1747. doi: 10.1109/18.623184
  • W.-G. Zhang and E. Pasalic, Constructions of resilient S-Boxes with strictly almost optimal nonlinearity through disjoint linear codes, IEEE Trans. Inf. Theory 60(3) (2014), pp. 1638–1651. doi: 10.1109/TIT.2014.2300067
  • M. Zhang and A. Chan, Maximum correlation analysis of nonlinear S-boxes in stream ciphers, in Advances in Cryptology–CRYPTO 2000, M. Bellare, ed., Lecture Notes in Computer Science, Vol. 1880, Springer, Berlin, 2000, pp. 501–514.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.