Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

[图书][B] Hadamard matrices and their applications

KJ Horadam - 2012 - books.google.com
In Hadamard Matrices and Their Applications, KJ Horadam provides the first unified account
of cocyclic Hadamard matrices and their applications in signal and data processing. This …

Perfect nonlinear S-boxes

K Nyberg - Workshop on the Theory and Application of of …, 1991 - Springer
A perfect nonlinear S-box is a substitution transformation with evenly distributed directional
derivatives. Since the method of differential cryptanalysis presented by E. Biham and A …

[图书][B] Bent functions: results and applications to cryptography

N Tokareva - 2015 - books.google.com
Bent Functions: Results and Applications to Cryptography offers a unique survey of the
objects of discrete mathematics known as Boolean bent functions. As these maximal …

[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …

Literature survey on nonlinear components and chaotic nonlinear components of block ciphers

I Hussain, T Shah - Nonlinear Dynamics, 2013 - Springer
In the modern era of secure communication, it is important to create uncertainty in the
original data in order to avoid unauthorized entities to extract or manipulate information …

GAC—the criterion for global avalanche characteristics of cryptographic functions

XM Zhang, Y Zheng - J. UCS The Journal of Universal Computer Science …, 1996 - Springer
We show that some widely accepted criteria for cryptographic functions, including the strict
avalanche criterion (SAC) and the propagation criterion, have various limitations in …

Heuristic design of cryptographically strong balanced Boolean functions

W Millan, A Clark, E Dawson - … '98: International Conference on the Theory …, 1998 - Springer
Advances in the design of Boolean functions using heuristic techniques are reported. A
genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …

Symmetric boolean functions

A Canteaut, M Videau - IEEE Transactions on information …, 2005 - ieeexplore.ieee.org
We present an extensive study of symmetric Boolean functions, especially of their
cryptographic properties. Our main result establishes the link between the periodicity of the …