期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
1
作者 Nahla Fatahelrahman Ibrahim Johnson Ihyeh Agbinya 《Advances in Internet of Things》 2022年第1期9-17,共9页
In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application a... In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis. 展开更多
关键词 Internet of Things Lightweight Cryptographic Scheme Vectorial boolean functions IoT Differential Cryptanalysis
下载PDF
Evolutionary Design of Boolean Functions
2
作者 WANGZhang-yi ZHANGHuan-guo +1 位作者 QINZhong-ping MENGQing-shu 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期179-182,共4页
We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-lineari... We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-linearity functions which have other good cryptographycharacteristics such as autocorrelation etc Comparing to other heuristic search techniques,evolutionary computing approach is more effective because of global search strategy and implicitparallelism. 展开更多
关键词 boolean function non-linearity evolutionary computing
下载PDF
A Study on Monotone Self-Dual Boolean Functions
3
作者 Mustafa ALTUN Marc D.RIEDEL 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2017年第1期43-52,共10页
This paper shows that monotone self-dual Boolean functions in irredundant disjuntive normal form (IDNF) do not have more variables than disjuncts. Monotone self-dual Boolean functions in IDNF with the same number of... This paper shows that monotone self-dual Boolean functions in irredundant disjuntive normal form (IDNF) do not have more variables than disjuncts. Monotone self-dual Boolean functions in IDNF with the same number of variables and disjuncts are examined. An algorithm is proposed to test whether a monotone Boolean function in IDNF with n variables and n disjuncts is self-dual. The runtime of the algorithm is O(n3). 展开更多
关键词 duality problem monotone boolean functions self-dual boolean functions
原文传递
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity 被引量:6
4
作者 潘森杉 傅晓彤 张卫国 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第2期269-275,共7页
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number of variables. The construction is based on the concatenation of two balanced functions in assoc... This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number of variables. The construction is based on the concatenation of two balanced functions in associative classes. For some n, a part of 1-resilient functions with maximum algebraic immunity constructed in the paper can achieve almost optimal nonlinearity. Apart from their high nonlinearity, the functions reach Siegenthaler's upper bound of algebraic degree. Also a class of l-resilient functions on any number n 〉 2 of variables with at least sub-optimal algebraic immunity is provided. 展开更多
关键词 stream ciphers boolean functions 1-resilient algebraic immunity algebraic degree
原文传递
A Class of Rotation Symmetric Boolean Functions with Optimum Algebraic Immunity 被引量:4
5
作者 LI Chunlei ZENG Xiangyong +1 位作者 SU Wei HU Lei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期702-706,共5页
For an odd integer n ≥ 7, this paper presented a class of n-variable rotation symmetric Boolean functions (RSBFs) with optimum algebraic immunity. The nonlinearity of the constructed functions is determined.
关键词 rotation symmetric boolean functions(RSBFs) algebraic immunity NONLINEARITY BALANCEDNESS Krawtchouk polynomial
原文传递
Analysis of affinely equivalent Boolean functions 被引量:5
6
作者 MENG QingShu ZHANG HuanGuo +1 位作者 YANG Min WANG ZhangYi 《Science in China(Series F)》 2007年第3期299-306,共8页
By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two Boolean functions are affinely equivalent and to obtain the equivalence relationship if they are... By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two Boolean functions are affinely equivalent and to obtain the equivalence relationship if they are equivalent. This is useful in studying Boolean functions and in engineering. For example, we classify all 8-variable homogeneous bent functions of degree 3 into two classes; 2) Reed-Muller codes R(4,6)/R(1,6), R(3,7)/R(1,7) are classified efficiently. 展开更多
关键词 boolean functions Reed-Muller code affinely equivalent INVARIANT
原文传递
Analyzing Boolean Functions via Solving Parametric Polynomial Systems
7
作者 HUANG Zhenyu SUN Yao LIN Dongdai 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2021年第2期792-808,共17页
In this paper,a new method to analyze Boolean functions is proposed.By this method,one can analyze the balancedness,the nonlinearity,and the input-output correlation of vectorial Boolean functions.The basic idea of th... In this paper,a new method to analyze Boolean functions is proposed.By this method,one can analyze the balancedness,the nonlinearity,and the input-output correlation of vectorial Boolean functions.The basic idea of this method is to compute the refined covers of some parametric Boolean polynomial systems which are equivalent to these problems.By a refined cover,the parameter space is divided into several disjoint components,and on each component,the parametric Boolean polynomial system has a fixed number of solutions.An efficient algorithm based on the characteristic set method to compute refined covers of parametric Boolean polynomial systems is presented.The experimental results about some instances generated from cryptanalysis show that this new method is efficient and can solve some instances which can not be solved in reasonable time by other methods. 展开更多
关键词 boolean functions characteristic set method CORRELATION NONLINEARITY parametric boolean polynomial systems
原文传递
On the construction of odd-variable boolean functions with optimal algebraic immunity
8
作者 ZHANG Jie WEN Qiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第3期73-77,共5页
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we ge... Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we get bases with special constructions of vector space. Furthermore, through swapping some vectors of these two bases, we establish all kinds of odd-variable balanced Boolean functions with optimal algebraic immunity. 展开更多
关键词 algebraic immunity boolean functions algebraic attacks ANNIHILATORS
原文传递
Constructions of vector output Boolean functions with high generalized nonlinearity
9
作者 KE Pin-hui ZHANG Sheng-yuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第2期77-81,共5页
Carlet et al. recently introduced generalized nonlinearity to measure the ability to resist the improved correlation attack of a vector output Boolean function. This article presents a construction of vector output Bo... Carlet et al. recently introduced generalized nonlinearity to measure the ability to resist the improved correlation attack of a vector output Boolean function. This article presents a construction of vector output Boolean fimctions with high generalized nonlinearity using the e-biased sample space. The relation between the resilient order and generalized nonlinearity is also discussed. 展开更多
关键词 boolean functions correlation attack generalizednonlinearity almost resilient functions
原文传递
On the 2~m-variable symmetric Boolean functions with maximum algebraic immunity 被引量:12
10
作者 QU LongJiang LI Chao 《Science in China(Series F)》 2008年第2期120-127,共8页
The properties of the 2m-variable symmetric Boolean functions with maximum al- gebraic immunity are studied in this paper. Their value vectors, algebraic normal forms, and algebraic degrees and weights are all obtaine... The properties of the 2m-variable symmetric Boolean functions with maximum al- gebraic immunity are studied in this paper. Their value vectors, algebraic normal forms, and algebraic degrees and weights are all obtained. At last, some necessary conditions for a symmetric Boolean function on even number variables to have maximum algebraic immunity are introduced. 展开更多
关键词 algebraic immunity algebraic attack symmetric boolean function
原文传递
Construction and enumeration of Boolean functions with maximum algebraic immunity 被引量:4
11
作者 ZHANG WenYing WU ChuanKun LIU XiangZhong 《Science in China(Series F)》 2009年第1期32-40,共9页
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ... Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2]. 展开更多
关键词 CRYPTOGRAPHY algebraic attack algebraic immunity boolean function
原文传递
Some results on the algebraic immunity of Boolean functions 被引量:1
12
作者 XU Li-qing CHEN hao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第2期102-105,共4页
From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary conditio... From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed. 展开更多
关键词 algebraic attack boolean function AI symmetric boolean function rotation symmetric boolean function
原文传递
Construction of Balanced Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity 被引量:1
13
作者 ZHANG Wenying 《Wuhan University Journal of Natural Sciences》 CAS 2014年第4期301-306,共6页
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ... Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents one main result to find balanced rotation symmetric Boolean functions with maximum algebraic immunity. Through swapping the values of two orbits of rotation class of the majority function, a class of 4k+l variable Boolean functions with maximum algebraic immu- nity is constructed. The function f(x) we construct always has terms of degree n-2 independence of what ever n is. And the nonlinearity off(x) is relatively good for large n. 展开更多
关键词 boolean function algebraic attack Walsh spectrum algebraic degree algebraic immunity (AI)
原文传递
Construction of a Class of Quantum Boolean Functions Based on the Hadamard Matrix
14
作者 Jiao DU Shan-qi PANG +1 位作者 Qiao-yan WEN Jie ZHANG 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2015年第4期1013-1020,共8页
In this study, a new methodology based on the Hadamard matrix is proposed to construct quantum Boolean functions f such that f : I2n --2P2n, where I2n is an identity matrix of order 2n and P2n is a projective matrix ... In this study, a new methodology based on the Hadamard matrix is proposed to construct quantum Boolean functions f such that f : I2n --2P2n, where I2n is an identity matrix of order 2n and P2n is a projective matrix with the same order as I2n. The enumeration of this class of quantum Boolean functions is also presented. 展开更多
关键词 quantum information matrix image quantum boolean function projective matrix
原文传递
The Walsh Transform of a Class of Boolean Functions
15
作者 JIANG Niu ZHUO Zepeng +1 位作者 CHEN Guolong WANG Liting 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第6期453-458,共6页
The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions.This paper is devoted to study the Walsh transform of a class of Boolean functions defined as g(x)=f(x)Tr^(n)_(1)(x... The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions.This paper is devoted to study the Walsh transform of a class of Boolean functions defined as g(x)=f(x)Tr^(n)_(1)(x)+h(x)Tr^(n)_(1)(δx),by making use of the known conclusions of Walsh transform and the properties of trace function,and the conclusion is obtained by generalizing an existing result. 展开更多
关键词 boolean function Walsh transform trace function
原文传递
ON THE DEGREE OF COMPLETENESS OF CRYPTOGRAPHIC FUNCTIONS 被引量:1
16
作者 Liu Jian Chen Lusheng 《Journal of Electronics(China)》 2014年第5期489-495,共7页
This paper discusses the degree of completeness of cryptographic functions, which is one of the cryptographic criteria should be considered in the design of stream ciphers. We establish the relationships between the d... This paper discusses the degree of completeness of cryptographic functions, which is one of the cryptographic criteria should be considered in the design of stream ciphers. We establish the relationships between the degree of completeness and other cryptographic criteria. For resilient Boolean functions, a method to enhance the degree of completeness is proposed, while the nonlinearity and the algebraic degree do not decrease. Moreover, two constructions of resilient functions are provided, which have optimal degree of completeness, high nonlinearity, and high algebraic degree. 展开更多
关键词 Degree of completeness Multi-output boolean functions NONLINEARITY Resiliency Linear structures
下载PDF
The structure of canalizing functions 被引量:1
17
作者 Zhiqiang LI Daizhan CHENG 《控制理论与应用(英文版)》 EI 2010年第3期375-381,共7页
The structure of a canalizing function is discussed. Using a new matrix product, namely semitensor product, the logical function is expressed in its matrix form. From its matrix expression, a criterion is obtained to ... The structure of a canalizing function is discussed. Using a new matrix product, namely semitensor product, the logical function is expressed in its matrix form. From its matrix expression, a criterion is obtained to test whether a logical function is a canalizing function. Then a formula is obtained to calculate the number of canalizing functions. Moreover, an algorithm is presented to generate canalizing functions. Finally, some results obtained are extended to seminested canalizing functions. 展开更多
关键词 Canalizing function boolean function Seminested canalizing function
下载PDF
ON CONSTRUCTION OF A CLASS OF NONLINEAR RESILIENT FUNCTIONS 被引量:1
18
作者 Liu Wenfen LiShiqu Dept. ofAppl. Math., Inform ation Engineering Institute, Zhengzhou 450002. 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1999年第3期251-258,共8页
In this paper the decom position form ula of Walsh spectrum of boolean functions is used to constructa class ofnonlinear resilient functions.
关键词 boolean function Walsh spectrum resilientfunction.
下载PDF
Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Parti
19
作者 Peng Gao Marek Perkowski +1 位作者 Yiwei Li Xiaoyu Song 《Computers, Materials & Continua》 SCIE EI 2022年第3期4545-4561,共17页
After Google reported its realization of quantum supremacy,Solving the classical problems with quantum computing is becoming a valuable research topic.Switching function minimization is an important problem in Electro... After Google reported its realization of quantum supremacy,Solving the classical problems with quantum computing is becoming a valuable research topic.Switching function minimization is an important problem in Electronic Design Automation(EDA)and logic synthesis,most of the solutions are based on heuristic algorithms with a classical computer,it is a good practice to solve this problem with a quantum processer.In this paper,we introduce a new hybrid classic quantum algorithm using Grover’s algorithm and symmetric functions to minimize small Disjoint Sum of Product(DSOP)and Sum of Product(SOP)for Boolean switching functions.Our method is based on graph partitions for arbitrary graphs to regular graphs,which can be solved by a Grover-based quantum searching algorithm we proposed.The Oracle for this quantum algorithm is built from Boolean symmetric functions and implemented with Lattice diagrams.It is shown analytically and verified by simulations on a quantum simulator that our methods can find all solutions to these problems. 展开更多
关键词 boolean symmetric function lattice diagrams Grover’s searching algorithm
下载PDF
Neural Networks for Logic Circuits 被引量:2
20
作者 Liu Yongcai (School of Computer Engineering and Science) 《Advances in Manufacturing》 SCIE CAS 1998年第2期60-63,共4页
Bushnell and the author proposed the neural networks for NOT, AND, OR, NAND, NOR, XOR and XNOR gates. Using these neural networks, the neural networks of any logic circuits can be constructd. From this, the consistent... Bushnell and the author proposed the neural networks for NOT, AND, OR, NAND, NOR, XOR and XNOR gates. Using these neural networks, the neural networks of any logic circuits can be constructd. From this, the consistent signals in the logic circuits will be transformed into the global minimal points of a quadratic pseudo Boolean function. Thus the neural network application in the field of circuit modeling and automatic test pattern generation can be widened. 展开更多
关键词 neural network Hopfield network quadratic pseudo boolean function k tree
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部