期刊文献+

寻找布尔函数低次零化子的算法 被引量:1

Algorithms of Finding Low Degree Annihilators of Boolean unctions
原文传递
导出
摘要 文章给出了寻找布尔函数低次零化子的几个算法。在分析布尔函数的代数次数与特征矩阵关系的基础上,算法利用布尔函数与其零化子的取值关系来寻找其低次零化子。利用这些算法可以得到布尔函数的所有低次零化子,也可用到其中若干个,利用算法1还可以计算任意一个布尔函数的代数免疫度。 Several algorithms of finding lower degree annihilators of Boolean function are described in this paper. On the basis of analyzing the relationship of algebraic degree and characteristic matrix of Boolean function, and by making use of the support sets of Boolean function and its annihilators, the algorithms get lower degree annihilators of Boolean functions. By these algorithms, one can get all or several annihilators. The algebraic immunity of Boolean functions can be computed by algorithm 1.
出处 《信息安全与通信保密》 2007年第6期198-199,202,共3页 Information Security and Communications Privacy
关键词 布尔函数 零化子 特征矩阵 Boolean function annihilator characteristic matrix
  • 相关文献

参考文献7

  • 1[1]Nicolas Courtois.Higher order correlation attacks.XL algorithm and Cryptanalysis of Toyocrypt.ICISC 2002,LNCS 2587,Springer,2002.182-199.
  • 2[2]Nicolas Courtois,Willi Meier.Algebraic attacks on stream ciphers with linear feedback[A].Advances in Eurocrypt 2003:INCS 2656[C],Springer,2003.346-359.
  • 3[3]Nicolas Courtois.Fast algebraic attacks on stream ciphers with linear feedback[A].Advances in Crypto 2003:INCS 2729[C],Springer,2003.176-194.
  • 4[4]Nicolas Courtois.Algebraic attacks on combiners with memory and several outputs.http://eprint.iacr.org/,No.2003/125.
  • 5[5]Meier W,Pasalic E,Carlet C.Algebraic attacks and decomposition of Boolean functions.Advances in Eurocrypt 2004,LNCS3027,2004.474~491.
  • 6[6]Dalai D K,Maitra S.Reducing the number of homogeneous linear equations in findng annihilators,in:http://eprint.iacr.org/.No.2006/032.
  • 7冀会芳,刘文芬,李世取.布尔函数的代数免疫度与特征矩阵关系的研究[J].河南师范大学学报,2006,34(3):1-4.

同被引文献8

  • 1谭俊中.带记忆组合生成器的代数攻击[J].信息安全与通信保密,2007,29(5):158-160. 被引量:1
  • 2Courtois N T, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback[C]// Adcances in Cryptology-EUROCRYPT 2003. [s.l.]: Springer- Verlag, 2003.
  • 3Mihaljevie M, Imai H. Cryptanalysis of Toyocrypt- HIS Stream Cipher[J]. IEICE Transactions on Fundamentals, 2002, E85-A: 66-73.
  • 4Saarinen M J O, Daemen J, Rijmen V. Cryptanalysis of LILI-128[C]//Fast Software Encryption 2002.[s.l.]:Springer-Verlag, 2002.
  • 5Dalai D K, Maitra S, Sarkar S. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity[J]. Design, Codes and Cryptography, 2006, 40(01): 41-58.
  • 6Na Li, Wen-Feng Qi. Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity[C]//Asiacrypt 2006, Volumn 4284 of Lecture Notes in Computer Science. [s.l.]: Springer-Verlag, 20061 84-98.
  • 7Meier W, Pasalic E, Carlet C. Algebraic Attacks and Decomposition of Boolean Functions[C]//Advances in Cryptology-EUROCRYPT 2004, Volum 3027 of Lecture Notes in Computer Science. [s.l.]: Springer- Verlag, 2004: 474-491.
  • 8Armknecht F, Carlet C, Gaborit P, et al. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks[e]//Eurocrypt 2006, Volumn 4004 in LNCS. [s.l.]: Sponger Verlag, 2006: 147-164.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部