期刊文献+

有限域上低差分置换的计算与构造

Calculation and Construction of Permutations with Low Differential Uniformity over Finite Fields
原文传递
导出
摘要 低差分置换是对称密码算法的重要组件,最近屈等先后提出了优先函数、优先布尔函数的概念,并用之构造4-差分置换.构造了一些具有较少项数的优先布尔函数,将交换法中的布尔函数推广为F2n到F4的映射,进一步研究了广义的交换构造,构造了三类新的4-差分置换,并计算了它们的非线性度. Permutations with low differential uniformity is an important component of the cipher algorithm. Recently, Qu et al. has put forward the concepts of preferred function(PF) and preferred Boolean function(PBF) one after another, and constructed differentially 4-uniform permutations. In this thesis, we construct some new PBFs with few items, and further study the generalized switching method, that is, to replace the Boolean function in the switching method by a mapping from F2n to F4. Finally, three new differentially 4-uniform permutations are constructed and their nonlinearity are also computed.
出处 《数学的实践与认识》 北大核心 2016年第7期174-180,共7页 Mathematics in Practice and Theory
基金 国家自然科学基金(61272484 11531002)
关键词 优先布尔函数 交换法 4-差分置换 非线性度 preferred boolean function switching method differentially 4-uniform permutations nonlinearity
  • 相关文献

参考文献7

  • 1Budaghyan L, and Carlet C. Constructing new APN functions from known ones. Finite Fields and Their Applications[J]. 2009, 15(2): 150-159.
  • 2Edel Y and Pott A. A new almost perfect nonlinear function which is not quadratic [J]. Advances in Mathematical Communications, 2009, 3(1): 59-81.
  • 3Qu L J, Tan Y, Tan C, H and Li C. Constructing Differentially 4-Uniform Permutations over via the Switching Method. IEEE Trans[J]. On Inform. Theory, 2013, 59(7): 4675-4686.
  • 4Qu L J, Tan Y, Li C and Gong G. More Constrcutions of Differentially 4-Uniform Permutations on [J]. Design Codes and Cryptography, DOI 10.1007/s10623-014-0006-x.
  • 5Bracken C, and Leander G. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree [J]. Finite Fields and Their Applications, 2010, 16(4): 231-242.
  • 6Lidl R, and Niederreiter H. Finite Fields[M]. Cambridge University Press, V2, 1997.
  • 7李超,屈龙江,周悦.密码函数的安全性指标分析[M].北京:科学出版社,2011:1-15.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部