期刊文献+

向量Bent函数的进一步研究

A Further Research on Vectorial Bent Functions
下载PDF
导出
摘要 向量Bent函数在密码学,编码理论和序列设计等领域应用广泛,是一个重要的研究课题。文章旨在通过对向量Bent函数的研究,得出新的向量Bent函数的构造方法。首先通过对Carlet给出的Bent函数的经典非直和构造的研究,将其推广到向量Bent函数上,并给出构造后函数的谱值公式。然后将布尔函数的级联构造方法推广到向量布尔函数上,通过研究函数间的谱值关系,给出级联4个函数得到的向量布尔函数为向量Bent函数的条件。最后得到3类向量Bent函数的二次构造。 Vectorial Bent function is widely used in cryptography,coding theory,sequence design and other fields,and is an important research topic.This paper aims to obtain a new construction method of vectorial Bent function by studying vectorial Bent function.First,by studying the construction of classical indirect sums of Bent functions given by Carlet,we extend it to vectorial Bent functions,and give the spectral value formula of the constructed functions.Then,the concatenation method of Bent function is extended to vectorial Bent function.By studying the relationship between the spectral values of functions,the condition that vectorial Boolean function obtained by concatenating four functions is vectorial Bent function is given.Finally,the quadratic constructions of three classes of vectorial Bent functions are obtained.
作者 李泽耀 卓泽朋 LI Zeyao;ZHUO Zepeng(School of Mathematical Sciences,Huaibei Normal University,235000,Huaibei,Anhui,China)
出处 《淮北师范大学学报(自然科学版)》 CAS 2023年第3期1-5,共5页 Journal of Huaibei Normal University:Natural Sciences
基金 国家自然科学基金项目(61902140) 安徽省重点研发项目(202004a05020043) 淮北师范大学自然科学结余经费资助项目(2023ZK0321)。
关键词 (n m)函数 向量Bent函数 Walsh-Hadamard变换 二次构造 级联构造方法 (n,m)function vectorial Bent function Walsh-Hadamard transform secondary construction concatenation method
  • 相关文献

参考文献4

二级参考文献22

  • 1常祖领,陈鲁生,符方伟.PS类Bent函数的一种构造方法[J].电子学报,2004,32(10):1649-1653. 被引量:7
  • 2孟庆树,张焕国,王张宜,覃中平,彭文灵.Bent函数的演化设计[J].电子学报,2004,32(11):1901-1903. 被引量:16
  • 3张文英,武传坤,于静之.密码学中布尔函数的零化子[J].电子学报,2006,34(1):51-54. 被引量:16
  • 4N. T. Courtois, W. Meier. Algebraic attacks on stream ciphers with linear feedback [ A ]. Advances in Cryptology-EUROCRYPT 2003 [ C ]. LNCS 2656, Berlin: Springer-Verlag, 2003, pp. 346 - 359.
  • 5W. Meier, E. Pasalic, and C. Carlet. Algebraic attacks and decomposition of Boolean functions[ A]. In Advances in Cryptology-EUROCRYPT, 2004[ C]. LNCS 3027, Berlin: SpringerVerlag, 2004, pp. 474 - 491.
  • 6C. Carlet, D. K. Dalai, K. C. Gupta, and S. Maitra. Algebraic immunity for cryptographically significant Boolean functions: analysis and comtruction [ J ].IEEE. Trans. Inform. Theory, 2006,52(7) :3105 - 3121.
  • 7O. S. Rothaus. On bent functions [ J ]. Combin. Theory Ser A, 1976,20:300 - 305.
  • 8T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications [ J ].IEEE Trans. Inform. Theory, 1984,30(5) :776 - 780.
  • 9G. Xiao, J. Massey. A spectral characterization of correlationimmune functions [ J]. IEEE Trans Inform. Theory, 1988,34 (3) :569 - 571.
  • 10Rothaus O S. On Bent Function[J]. Journal of Combinatorial Theory: Series A, 1976, 20(3): 300-305.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部