期刊文献+

相关免疫函数阶的判别方法 被引量:6

Some Methods for Judging the order of Correlation-immune Functions
原文传递
导出
摘要 在密码学中,为了抵抗相关攻击,要求选用的布尔函数具有相关免疫性,高阶的相关免疫函数都是一阶的,一阶的却不一定是高阶的,本文给出了三种判断一阶相关免疫函数是否为二阶或更高阶的新方法. The Boolean functions in cryptography must be correlated and immune so as to resist correlated attack. Higher order correlation-immune functions is of one-order, while not so as. This paper presents three new methods to judge whether a one-order correlation-immune function is a higher order one.
出处 《应用数学学报》 CSCD 北大核心 2009年第3期445-453,共9页 Acta Mathematicae Applicatae Sinica
基金 国家自然科学基金(10571045) 河南省创新型科技人才队伍建设工程资助项目
关键词 相关免疫函数 正交矩阵(正交表) 广义Hadamard积 对偶距离 correlation-immune functions orthogonal array generalized Hadamard product dual distance
  • 相关文献

参考文献3

二级参考文献6

共引文献17

同被引文献29

  • 1张文英,武传坤,刘祥忠.代数免疫阶最高的Boole函数的构造和计数[J].中国科学(F辑:信息科学),2009,39(7):687-693. 被引量:8
  • 2Sarkar P,Maitra S.Construction of nonlinear Boolean fimctions with important cryptographic properties[C]//Advances in Cryptolpgy-Eurocrypto' 2000.Berlin: Springer-Verlag, 2000: 485-506.
  • 3Maitra S, Sarkar P.Nonlinearity bounds and constructions of re- silient boolean functions[C]//Advance in Cryptology-Crytpo' 2000.Berlin: Springer-Verlag, 2000: 515-532.
  • 4Maity S, Maitra S.Minimum distance between bent and 1-resilient Boolean functions[C]//LNCS 2888: FSE2004,2004:141-160.
  • 5Liu W M,Youssef A.On the existence of (10,2,7,488) resilient functions[J].IEEE Transactions on information theory,2009, 55( 1 ) :411-412.
  • 6Siegenthaler T. Correlation-immunity of no-nlinearcombining functions for cryptographic applications [ J ] .IEEE Transactions on Information Theory, 1984,30(5): 776-780.
  • 7Filiol E. Fontaine C. Highly nonlinear balanced Booleanfunctions with good correlation immunity [ C ]//Ad-vances in Cryptology-EUROCRYPT ’98. Berlin : Spring-er-Verlag, 1998.
  • 8Courtois N, Meier W. Algebraic attacks on streamciphers with linear feedback [ C ] //Berlin : Biham Eed.Advances in Cryptology Eurocrypt 2003. LNCS :Springer-Verlag, 2003 : 346-359.
  • 9Canteaut A. Open problems related to algebraic attackson stream ciphers [ C J//WCC2005. Berlin: Springer,2006: 120-134.
  • 10Pieprzyk J, Qu Chenxin. Fast hashing and rotationsymmetric functions [ J ]. Journal Universal ComputerScience, 1999, 5(1) : 20-31.

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部