期刊文献+

关于多输出布尔函数的第二类非线性度

On Nonlinearity of the Second Type of Multi-output Boolean Functions
下载PDF
导出
摘要 本文对多输出布尔函数的第二类非线性度进行研究,该定义是衡量抵抗最佳多输出仿射逼近攻击性能的一项重要准则.利用多输出布尔函数的Walsh变换,我们给出第二类非线性度的一种表达式,并在此基础上得到第二类非线性度的一个上界.进一步地,我们给出了当第一类非线性度达到最优时,其第二类非线性度的一个界.此外,本文还给出任意多输出布尔函数与所有多输出线性函数之间距离的均值. In this paper, nonlinearity of the second type of the multi-output Boolean functions is studied, which is an important cryptographic criterion to measure the ability on the resistance of the best multi-output affine approximation attack. By using the Walsh transform of the multi-output Boolean functions, we present an explicit representation for nonlinearity of the second type, and based on this nonlinearity, we obtain an upper bound of this type of nonlinearity. Furthermore, we give the bounds for the nonlinearity of the second type when the nonlinearity of the first type is optimal. Additionally, the average value of distances between a multi-output Boolean function and all other multi-output linear functions is provided.
作者 刘健 陈鲁生
出处 《工程数学学报》 CSCD 北大核心 2014年第1期9-22,共14页 Chinese Journal of Engineering Mathematics
基金 国家重点基础研究发展计划资助(2013CB834204)~~
关键词 多输出布尔函数 非线性度 仿射函数 BENT函数 multi-output Boolean function nonlinearity affine function Bent function
  • 相关文献

参考文献11

  • 1Rothaus O S. On "Bent" functions[J]. Journal of Combinatorial Theory, Series A, 1976, 20(3): 300-305.
  • 2Rueppel R A. Analysis and Design of Stream Ciphers[M]. Berlin: Springer-Verlag, 1986.
  • 3Ding C, Xiao G, Shan W. The Stability Theory of Stream Ciphers[M]. Berlin: Springer-Verlag, 1991.
  • 4Nyberg K. On the construction of highly nonlinear permutations[C]// Advances in Cryptology-- EUROCRYPT'92, Lecture Notes in Computer Science, 1993, 658:92-98.
  • 5Nyberg K. Perfect nonlinear S-boxes[C]// Advances in Cryptology--EUROCRYPT'91, Lecture Notes in Computer Science. 1992. 547:378-386.
  • 6Chen L S, Fu F W. On the nonlinearity of multi-output Boolean functions[J]. Acta Scientiarum Naturalium Universitatis Nankaiensis (Natural Science Edition), 2001, 34(4): 28-33.
  • 7Cusick T W, Stnic P. Cryptographic Boolean Functions and Applications[M]. San Diego: Elsevier- Academic Press, 2009.
  • 8Carlet C. Vectorial Boolean functions for cryptography[C]// Crama Y, Hammer P, Boolean Methods and Models, Cambridge University Press, Cambridge, 2010, Available: http://www-roc.inria.fr/secret/ Claude.Carlet/pubs.html.
  • 9Matsui M. Linear cryptanalysis method for DES cipher[C]// Advances in Cryptology--EUROCRYPT'93, Lecture Notes in Computer Science, 1994, 765:386-397.
  • 10Carlet C, Ding C. Nonlinearities of S-boxes[J]. Finite Fields and Their Applications, 2007, 13(1): 121-135.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部