期刊文献+

关于布尔函数串的一些性质

Some properties of Boolean function string
下载PDF
导出
摘要 布尔函数是密码学中的一类重要函数,被广泛应用于密码体制和密码协议的构造中.布尔函数的密码性质在一定程度上决定密码体制的安全性.而通过布尔函数串做递归构造是研究布尔函数的一个重要方法.我们研究布尔函数串,并给出了布尔函数串的一些性质. Boolean function,widely applied to cryptographic systems and protocol construction, is a class of important functions. The cryptographic properties of the functions determine security of many symmetric eryptographic systems to a certain extent. By Boolean function, string recursive construction is an important method of research Boolean ftmction. This paper shows results about the properties of Boolean function string.
作者 屈仁春
出处 《西南民族大学学报(自然科学版)》 CAS 2012年第5期721-723,共3页 Journal of Southwest Minzu University(Natural Science Edition)
关键词 布尔函数 布尔函数串 零化子 Boolean function Boolean function string annihilator
  • 相关文献

参考文献6

  • 1MEIER W, PASALIC E, CARLET C. Algebraic attacks and decomposition of Boolean functions. In: Advances in Cryptology-EUROCRYPT2004, LNCS3027. Berlin, Heidelberg; Springer, 2004.
  • 2CARLET C, DALAI D K, GUPTA K C, et al. Algebraic immunity for cryptographically significant Boolean functions: Analysis and construetion[J].IEEE Trans on Information Theory, 2006, 52(7): 3105-3121.
  • 3COURTOIS N. Efficient algorithm for solving overdefined Systems of multivariate polynomial equation[J]. IEEE Transactions on Information Theory, 2000, 24:1807-1823.
  • 4COURTOIS N, MEIER W. Algebraic attacks on stream ciphers with linear feedback, In: Biham E, ed. Advances in Cryptology--Eurocrypt 2003. LNCS 2656, Berlin: Springer-Verlag, 2003.
  • 5张文英,武传坤,于静之.密码学中布尔函数的零化子[J].电子学报,2006,34(1):51-54. 被引量:16
  • 6张龙,吴文玲,温巧燕.流密码代数攻击的研究现状及其展望[J].通信学报,2006,27(1):91-98. 被引量:6

二级参考文献37

  • 1PATARIN J.Hidden fields equations (hfe) and isomorphisms of polynomials (IP):two new families of asymmetric algorithms[A].Advances in Cryptology-Eurocrypt'96[C].Berlin:Springer-Verlag,1996.33-48
  • 2KIPNIS A,PATARIN J,GOUBIN L.Unbalanced oil and vinegar signature schemes[A].Advances in Cryptology-Eurocrypt 1999[C].Berlin:Springer-Verlag,1999.206-222.
  • 3COURTOIS N T,PIEPRZYK J.Cryptanalysis of block ciphers with overdefined systems of equations[A].Advances in CryptologyAsiacrpt 2002[C].Berlin:Springer-Verlag,2002.267-287.
  • 4COURTOIS N T.Higher order correlation attacks,XL algorithm and cryptanalysis of Toyocrypt[A].Information Security and Cryptology 2002[C].Berlin:Springer-Verlag,2003.182-199.
  • 5ARMKNECHT F.A linearization attack on the bluetooth key stream generator[EB/OL].http://eprint.iacr.org/ 2002 /191,2002.
  • 6COURTOIS N T,MEIER W.Algebraic attacks on stream ciphers with linear feedback[A].Advances in Cryptology-Eurocrypt 2003[C].Berlin:Springer-Verlag,2003.345-359.
  • 7COURTOIS N T,KLIMOV A,PATARIN J,et al.Efficient algorithms for solving overdefined systems of multivariate polynomial equations[A].Advances in Cryptology-Eurocrypt 2000[C].Berlin:Springer-Verlag,2000.392-407.
  • 8KIPNIS A,SHAMIR A.Cryptanalysis of the hfe public key cryptosystem by relinearization[A].Advances in CryptologyCrypto'99[C].Berlin:Springer-Verlag,1999.19-30.
  • 9ADAMS W W,LOUSTAUNAU P.An introduction to grobner bases[M].USA:AMS,1994.
  • 10SUGITA M,KAWAZOE M,IMAI H.Relation between XL algorithm and grobner bases algorithms [EB/OL].http://eprint.iacr.org/2004/112,2004.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部