Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While …
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal …
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and …
For the first time Boolean functions on 9 variables having nonlinearity 241 are discovered, that remained as an open question in literature for almost three decades. Such functions are …
Recently algebraic attack has received a lot of attention in cryptographic literature. It has been observed that a Boolean function f, interpreted as a multivariate polynomial over GF …
Boolean functions are mathematical objects used in diverse domains and have been actively researched for several decades already. One domain where Boolean functions play …
Y Li, H Kan, S Mesnager, J Peng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article is devoted to Boolean and vectorial bent functions and their duals. Our ultimate objective is to increase such functions' corpus by designing new ones covering many …
The design of Boolean functions with properties of cryptographic significance is a hard task. In this paper, we adopt an unorthodox approach to the design of such functions. Our search …
S Kavut, MD Yücel - Information and Computation, 2010 - Elsevier
We give a new lower bound to the covering radius of the first order Reed–Muller code RM (1, n), where n∈{9, 11, 13}. Equivalently, we present the n-variable Boolean functions for …