期刊文献+

Some results on the algebraic immunity of Boolean functions 被引量:1

Some results on the algebraic immunity of Boolean functions
原文传递
导出
摘要 From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed. From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期102-105,共4页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (10871068,61021004) DNRF-NSFC Joint (11061130539)
关键词 algebraic attack Boolean function AI symmetric Boolean function rotation symmetric Boolean function algebraic attack, Boolean function, AI, symmetric Boolean function, rotation symmetric Boolean function
  • 相关文献

参考文献20

  • 1Carlet C. Boolean functions for cryptography and error correcting codes. Cambridge, UK: Cambridge University Press, 2007.
  • 2Armknecht F, Krause M. Algebraic attacks on combiners with memory. Advances in Crytography: Proceedings of the 23rd Annual International Cryptology Conference (Crypto'03), Aug 17-21, 2005, Santa Barbara, CA, USA. LNCS 2729. Berlin, Germany: Springer-Verlag, 2003:162-175.
  • 3Armknecht F. Improving fast algebraic attacks. Proceedings of the Fast Sottware Encryptinn Workshop (FEC'04), Feb 5-7, 2004, New Delhi, India. LNCS 3017. Berlin, Germany: Springer-Verlag, 2004:65-82.
  • 4Canteaut A. Open problems related to algebraic attacks on stream ciphers. Proceedings of the International Workshop on Coding and Cryptography (WCC'05), Mar 14-18, 2005, Bergen, Norway: LNCS 3969. Berlin, Germany: Springer-Verlag, 2005:120-134.
  • 5Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. Advances in Cryptology: Proceedings of the 22nd International Conference on the Theory and Applications of Cryptographic Techniques (Euroerypt'03), May 4-8, 2003. Warsaw, Poland. LNCS 2656. Berlin, Germany: Springer-Verlag, 2003:345-359.
  • 6Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. Advances in Crytography: Proceedings of the 23rd Annual Intemationai Cryptology Conference (Crypto'03), Aug 17-21, 2005, Santa Barbara, CA, USA. LNCS 2729. Berlin, Germany: Springer-Verlag, 2003:176-194.
  • 7Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdetermined systems of equations. Advances in Cryptology:Proceedings of the 8th International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt'02), Dec 1-5, 2002. Queenstown, New Zealand. LNCS 2501. Berlin, Germany: Springer-Verlag, 2002:267-287.
  • 8Meier W, Pasalie C, Carlet C. Algebraic attacks and decomposition of Boolean functions. Advances in Cryptology: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027.Berlin, Germany: Springer-Verlag, 2004:474-491.
  • 9Armknecht F. On the existence of low-degree equations for algebraic attacks Cryptology ePrint Archive, Report 2004/185.
  • 10Carlet C, Dalai D K, Gupta K C, et al. Algebraic immunity for cryptographically significant Boolean functions analysis and construction. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.

同被引文献6

  • 1HUTTON M, SshiIecher J.Improving FPGA performance and area using an adaptive logic module[C].Berlin Heidelberg: J Becker, 2004 : 135-144.
  • 2KAVUT S,YUCEL M D.9-variable Boolean functions with nonlinearity 242 in the generalized rotation symmetric class[J]. Information and Computation, 2010,208(4): 341- 350.
  • 3GANGOPADHYAY S,SARKAR S.Telang R.On the lower bounds of the second order nonlinearities of some Boolean functions[J].lnformation Science, 2010,180(2) : 266-273.
  • 4CHASKHKM A V.Local complexity of Boolean functions[J]. Discrete Applied Mathematics[J].2004,135(1): 55-64.
  • 5COUCEIRO M, MARICHAL J L.Locally monotone Boolean and pseudo-Boolean functions[J].Discrete Applied Mathe- matics, 2012,160(12) : 1651 - 1660.
  • 6徐建博,戴紫彬,李伟,苏阳.面向序列密码的抽取与插入单元可重构设计研究[J].电子技术应用,2011,37(7):65-67. 被引量:9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部