咨询与建议

限定检索结果

文献类型

  • 22 篇 期刊文献
  • 5 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 21 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 1 篇 软件工程
  • 17 篇 理学
    • 17 篇 数学

主题

  • 28 篇 vectorial boolea...
  • 5 篇 nonlinearity
  • 4 篇 apn functions
  • 3 篇 boolean function...
  • 3 篇 s-boxes
  • 2 篇 bent functions
  • 2 篇 stream ciphers
  • 2 篇 ccz-equivalence
  • 2 篇 block ciphers
  • 2 篇 power functions
  • 1 篇 internet of thin...
  • 1 篇 differential-lin...
  • 1 篇 k-rotation symme...
  • 1 篇 boolean function
  • 1 篇 correlation immu...
  • 1 篇 permutation poly...
  • 1 篇 almost perfect n...
  • 1 篇 ea-equivalence
  • 1 篇 hamming distance
  • 1 篇 autocorrelation ...

机构

  • 2 篇 univ bergen dept...
  • 1 篇 inria
  • 1 篇 tech univ budape...
  • 1 篇 suny buffalo dep...
  • 1 篇 katholieke univ ...
  • 1 篇 xian univ posts ...
  • 1 篇 ruhr univ bochum...
  • 1 篇 hunan engn res c...
  • 1 篇 state key labora...
  • 1 篇 univ sorbonne pa...
  • 1 篇 middle e tech un...
  • 1 篇 fudan univ dept ...
  • 1 篇 univ rostock ros...
  • 1 篇 indian stat inst...
  • 1 篇 telecom paristec...
  • 1 篇 univ paris 13 cn...
  • 1 篇 science and tech...
  • 1 篇 univ paris 08 la...
  • 1 篇 telecom italia s...
  • 1 篇 univ waterloo de...

作者

  • 4 篇 calderini marco
  • 3 篇 villa irene
  • 3 篇 carlet claude
  • 2 篇 budaghyan lilya
  • 2 篇 li chao
  • 2 篇 qu longjiang
  • 2 篇 mesnager sihem
  • 1 篇 bluher antonia w...
  • 1 篇 dib stephanie
  • 1 篇 lim chu-wee
  • 1 篇 jakobovic domago...
  • 1 篇 stanica pantelim...
  • 1 篇 o'reilly una-may
  • 1 篇 liu wenfen
  • 1 篇 dong deshuai
  • 1 篇 xu yuwei
  • 1 篇 aragona riccardo
  • 1 篇 pavlů jiří
  • 1 篇 nahla fatahelrah...
  • 1 篇 sala massimilian...

语言

  • 27 篇 英文
检索条件"主题词=vectorial boolean functions"
28 条 记 录,以下是11-20 订阅
排序:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2023年 第10期69卷 6700-6710页
作者: Piccione, Enrico Andreoli, Samuele Budaghyan, Lilya Carlet, Claude Dhooghe, Siemen Nikova, Svetla Petrides, George Rijmen, Vincent Univ Bergen N-5007 Bergen Norway Univ Bergen Selmer Ctr Secure Commun Dept Informat N-5007 Bergen Norway Univ Bergen Selmer Ctr Secure Commun N-5007 Bergen Norway Univ Bergen Dept Informat N-5007 Bergen Norway Univ Paris 08 Dept Math F-93200 St Denis France Katholieke Univ Leuven B-3000 Leuven Belgium Katholieke Univ Leuven Res Grp COSIC Cryptog & Comp Secur ESAT B-3000 Leuven Belgium Katholieke Univ Leuven Dept Elect Engn B-3000 Leuven Belgium Univ Cyprus CY-1678 Nicosia Cyprus
Threshold implementation is a method based on secret sharing to secure cryptographic ciphers (and in particular S-boxes) against differential power analysis side-channel attacks which was proposed by Nikova, Rechberge... 详细信息
来源: 评论
Deciding EA-equivalence via invariants
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES boolean functions AND SEQUENCES 2022年 第2期14卷 271-290页
作者: Kaleyski, Nikolay Univ Bergen Dept Informat Bergen Norway
We define a family of efficiently computable invariants for (n, m)-functions under EA-equivalence, and observe that, unlike the known invariants such as the differential spectrum, algebraic degree, and extended Walsh ... 详细信息
来源: 评论
Generalized isotopic shift construction for APN functions
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2021年 第1期89卷 19-32页
作者: Budaghyan, Lilya Calderini, Marco Carlet, Claude Coulter, Robert Villa, Irene Univ Bergen Dept Informat PB 7803 N-5020 Bergen Norway Univ Paris 08 LAGA St Denis France Univ Delaware Dept Math Sci Newark DE 19716 USA
In this work we give several generalizations of the isotopic shift construction, introduced recently by Budaghyan et al. (IEEE Trans Inform Theory 66:5299-5309, 2020), when the initial function is a Gold function. In ... 详细信息
来源: 评论
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of boolean functions
收藏 引用
Advances in Internet of Things 2022年 第1期12卷 9-17页
作者: Nahla Fatahelrahman Ibrahim Johnson Ihyeh Agbinya Faculty of Computer Science and Information Technology Sudan University of Science and Technology (SUST) Khartoum Sudan School of Information Technology and Engineering Melbourne Institute of Technology Melbourne Victoria Australia
In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of boolean cryptographic function Application a... 详细信息
来源: 评论
On the boomerang uniformity of some permutation polynomials
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES boolean functions AND SEQUENCES 2020年 第6期12卷 1161-1178页
作者: Calderini, Marco Villa, Irene Univ Bergen Dept Informat PB 7803 N-5020 Bergen Norway
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials, one for the uppe... 详细信息
来源: 评论
Low c-differential and c-boomerang uniformity of the swapped inverse function
收藏 引用
DISCRETE MATHEMATICS 2021年 第10期344卷 112543-112543页
作者: Stanica, Pantelimon Naval Postgrad Sch Appl Math Dept Monterey CA 93943 USA
Modifying the binary inverse function in a variety of ways, like swapping two output points has been known to produce a 4-differential uniform permutation function. Recently, in [21] it was shown that this swapped ver... 详细信息
来源: 评论
NEW CONSTRUCTIONS OF vectorial boolean functions WITH GOOD CRYPTOGRAPHIC PROPERTIES
收藏 引用
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE 2012年 第3期23卷 749-760页
作者: Dong, Deshuai Qu, Longjiang Fu, Shaojing Li, Chao Natl Univ Def Technol Coll Sci Changsha 410073 Hunan Peoples R China Natl Univ Def Technol Sch Comp Sci Changsha 410073 Hunan Peoples R China
vectorial boolean functions play an important role in cryptography. How to construct vectorial boolean functions with good cryptographic properties is a nice problem that worth to be investigated. In this paper we pre... 详细信息
来源: 评论
On (2n/3-1)-Resilient (n, 2)-functions
On (2n/3-1)-Resilient (n, 2)-Functions
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Krotov, Denis S. Sobolev Inst Math Novosibirsk 630090 Russia
A {00,01,10,11}-valued function on the vertices of the n-cube is called a t-resilient (n,2)-function if it has the same number of 00s, 01s, 10s and 11s among the vertices of every subcube of dimension t. The Friedman ... 详细信息
来源: 评论
Constructions with high algebraic degree of differentially 4-uniform (n, n-1)-functions and differentially 8-uniform (n, n-2)-functions
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES boolean functions AND SEQUENCES 2018年 第4期10卷 611-628页
作者: Alsalami, Yousuf Khalifa Univ Sci & Technol Dept Elect & Comp Engn Abu Dhabi U Arab Emirates
Quadratic differentially 4-uniform (n, n - 1)-functions are given in Carlet J. Adv. Math. Commun. 9(4), 541-565 (2015) where a question is raised of whether non-quadratic differentially 4-uniform (n, n - 1)- functions... 详细信息
来源: 评论
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of vectorial functions
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2018年 第1期64卷 367-383页
作者: Xu, Yuwei Carlet, Claude Mesnager, Sihem Wu, Chuankun Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Univ Paris 08 Dept Math F-93526 St Denis France Univ Paris 13 CNRS LAGA UMR 7539 Sorbonne Paris Cite F-93430 Villetaneuse France Telecom ParisTech F-75013 Paris France Beijing Acorn Network Technol Co Ltd Beijing 100191 Peoples R China
This paper is composed of two main parts related to the nonlinearity of vectorial functions. The first part is devoted to maximally nonlinear (n, m) functions (the so-called bent vectorial functions), which contribute... 详细信息
来源: 评论