197
Views
2
CrossRef citations to date
0
Altmetric
Articles

Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation

, , , &
Pages 425-444 | Received 18 Nov 2013, Accepted 24 Nov 2014, Published online: 22 Jan 2015

References

  • F. Armknecht, Improving fast algebraic attacks, Proceedings of Fast Software Encryption (2004), Delhi, India, 5–7 February 2004, pp. 65–82.
  • P. Camion, C. Carlet, P. Charpin, and N. Sendrier, On correlation-immune functions, Advances in Cryptology – CRYPTO91, 1992, pp. 86–100.
  • C. Carlet, A larger class of cryptographic Boolean functions via a study of the Maiorana-Mcfarland constructions, Proceedings of Advances in Cryptology – CRYPTO 2002, Santa Barbara, CA, Springer, Heidelberg, 18–22 August 2002, pp. 549–564.
  • C. Carlet, Boolean functions for cryptography and error correcting codes, in Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Y. Crama and P. Hammer, eds., Cambridge University Press, Cambridge, 2010, pp. 257–397. Available at http://www-rocq.inria.fr/codes/Claude.Carlet/pubs.html.
  • C. Carlet and K.Q. Feng, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, Proceedings of Advances in Cryptology – ASIACRYPT 2008, Melbourne, Australia, 7–11 December 2008, pp. 425–440.
  • S. Chee, S. Lee, D. Lee, and S.H. Sung, On the correlation immune functions and their nonlinearity, Proceedings of Advances in Cryptology – ASIACRYPT '96, Kyongju, Korea, 3–7 November 1996, pp. 232–243.
  • G. Cohen and J.P. Flori, On a generalized combinatorial conjecture involving addition mod 2k−1, Cryptology ePrint Archive Report 2011/400, 2012. Available at http://eprint.iacr.org/2011/400.pdf.
  • N.T. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, Proceedings of Advances in Cryptology – CRYPTO 2003, Santa Barbara, CA, 17–21 August 2003, pp. 345–359.
  • N.T. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, Proceedings of Cryptology – EUROCRYPT 2003, Warsaw, Poland, 4–8 May 2003, pp. 176–194.
  • J.F. Dillon, Elementary Hadamard difference sets, Ph.D. diss., University of Maryland, College Park, MD, 1974.
  • Y. Du and F. Zhang, A class of 1-resilient functions in odd variables with high nonlinearity and suboptimal algebraic immunity, IEICE Trans. Fundam. E95-A (2012), pp. 417–420. doi: 10.1587/transfun.E95.A.417
  • Q.F. Jin, Z.J. Liu, and B.F. Wu, 1-Resilient Boolean function with optimal algebraic immunity, Cryptology ePrint Archive Report 2011/549, 2011. Available at http://eprint.iacr.org/2011/549.pdf.
  • N. Li and W.F. Qi, Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity, Proceedings of Advances in Cryptology – ASIACRYPT 2006, Shanghai, China, 3–7 December 2006, pp.84–98.
  • N. Li, L. Qu, W.-F. Qi, and G. Feng, On the construction of Boolean Functions with optimal algebraic immunity, IEEE Trans. Inform. Theory 54 (2008), pp. 1330–1334. doi: 10.1109/TIT.2007.915914
  • R. Lidl and H. Niederreiter, Introduction to Finite Fields and their Applications, North-Holland, Amsterdam, 1994.
  • M.C. Liu, Y. Zhang, and D.D. Lin, Perfect algebraic immune functions, Proceedings of Advances in Cryptology – ASIACRYPT 2012, Beijing, China, 2–6 December 2012, pp. 172–189.
  • M.C. Liu, Y. Zhang, and D.D. Lin, On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation, Cryptology ePrint Archive Report 2012/498, 2012. Available at http://eprint.iacr.org/2012/498.pdf.
  • S. Maitra and E. Pasalic, Further constructions of resilient Boolean functions with very high nonlinearity, IEEE Trans. Inform. Theory 48 (2002), pp. 1825–1834. doi: 10.1109/TIT.2002.1013128
  • J. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Inform. Theory 15 (1969), pp. 122–127. doi: 10.1109/TIT.1969.1054260
  • W. Meier, E. Pasalic, and C. Carlet, Algebraic attacks and decomposition of Boolean functions, Proceedings of Advances in Cryptology – EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004, pp. 474–491.
  • E. Pasalic, Maiorana-McFarland class: Degree optimization and algebraic properties, IEEE Trans. Inform. Theory 52 (2006), pp. 4581–4594. doi: 10.1109/TIT.2006.881721
  • S. Pei, S. Tang, X. Zhang, Z. Liu, and Z. Zheng, Effects of consumption strategy on wealth distribution on scale-free networks, Phys. A 391(5) (2012), pp. 2023–2031. doi: 10.1016/j.physa.2011.10.017
  • S. Pei, S.T. Tang, S. Yan, S.J. Jiang, X. Zhang, and Z.M. Zheng, How to enhance the dynamic range of excitatory-inhibitory excitable networks, Phys. Rev. E 86(2) (2012), pp. 021909(120021909(1–7) . doi: 10.1103/PhysRevE.86.021909
  • W. Qiu, X. Zhang, H. Li, Z. Wang, Y. Zhang, and Z. Zheng, Concurrent all-cell error detection in semi-systolic multiplier using linear codes, Appl. Math. Inform. Sci. 7(3) (2013), pp. 947–954. doi: 10.12785/amis/070312
  • P. Sarkar and S. Maitra, Nonlinearity bounds and constructions of resilient Boolean functions, Proceedings of Advances in Cryptology – CRYPTO 2000, Santa Barbara, CA, 20–24 August 2000, pp. 515–532.
  • T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Inform. Theory 30 (1984), pp. 776–780. doi: 10.1109/TIT.1984.1056949
  • D. Tang, C. Carlet, and X. Tang, Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks, IEEE Trans. Inform. Theory 59 (2013), pp. 653–664. doi: 10.1109/TIT.2012.2217476
  • Z. Tu and Y. Deng, A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity, Des. Codes Cryptogr. 60 (2011), pp. 1–14. doi: 10.1007/s10623-010-9413-9
  • Z. Tu and Y. Deng, Boolean functions optimizing most of the cryptographic criteria, Discrete Appl. Math. 160 (2012), pp. 427–435. doi: 10.1016/j.dam.2011.08.006
  • T.Z. Wang, M.C. Liu, and D.D. Lin, Construction of resilient and nonlinear Boolean functions with almost perfect immunity to algebraic and fast algebraic attacks, Proceedings of Information Security and Cryptology 2012, Beijing, China, 28–30 November 2012, pp. 276–293.
  • X. Zeng, C. Carlet, J. Shan, and L. Hu, More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks, IEEE Trans. Inform. Theory57 (2011), pp. 6310–6320. doi: 10.1109/TIT.2011.2109935
  • X. Zhang, W. Li, Z. Zheng, and B. Guo, Optimized statistical analysis of software trustworthiness attributes, Sci. China Inform. Sci. 55(11) (2012), pp. 2508–2520. doi: 10.1007/s11432-012-4646-z

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.