期刊文献+

一类Bent函数的二阶非线性度下界 被引量:5

The Lower Bound on the Second-Order Nonlinearity for a Class of Bent Functions
在线阅读 下载PDF
导出
摘要 为了防止存在有效的低次函数逼近,对于较小的正整数r,用于对称密码系统中的布尔函数应具有较高的r-阶非线性度.当r>1时,准确计算布尔函数的r-阶非线性度十分困难,已有的研究工作主要是通过分析其导函数的(r-1)-阶非线性度来确定布尔函数的r-阶非线性度下界.对于整数n≡2(mod 4),文中确定了一类由Niho指数生成的Bent函数的二阶非线性度下界.与相同变元个数的两类Bent函数和三类布尔函数相比,这类Bent函数具有更紧的二阶非线性度下界. The Boolean functions used in symmetric ciphers should have high rth-order nonlinearity to resist against the low-degree approximation cryptanalysis. For an integer r〉1, it is quite difficult to compute the rth-order nonlinearity of a Boolean function, and the known literatures mainly utilize the (r-1)th-order nonlinearity of its derivatives to deduce the lower bound on the rtb-order nonlinearity. For an integer n≡ 2 (mod4), this paper investigates the nonlinearities of the corresponding derivative functions for a class of Bent functions constructed from Niho exponents, and then determines the lower bound of the second-order nonlinearity for this class of Bent functions. Compared with two Bent functions and three classes of Boolean functions with the same number of variables, this class of Bent functions has a tighter lower bound on the second-order nonlinearity.
出处 《计算机学报》 EI CSCD 北大核心 2012年第8期1588-1593,共6页 Chinese Journal of Computers
基金 国家自然科学基金(60970115 60970116 61003267 91018008 61003268)资助~~
关键词 BENT函数 二阶非线性度 双线性函数 WALSH谱 REED-MULLER码 Bent function second-order nonlinearity bilinear function Walsh spectrum Reed-Muller codes
  • 相关文献

参考文献15

  • 1Carlet C. Boolean functions for cryptography and errorcorrecting codes//Crama Y, Hammer P eds. Boolean Meth- ods and Models. Cambridge, U. K. : Cambridge University Press, 2010:257-397.
  • 2Carlet C, Zeng X, Li C, Hu L. Further properties of several classes of Boolean functions with optimum algebraic immuni- ty. Design Codes and Cryptography, 2009, 52(3): 303-338.
  • 3Meng Q, Zhang H, Yang M, Wang Z. Analysis of affinely equivalent Boolean {unctions. Science in China Series F: Information Sciences, 2007, 50(3): 299-306.
  • 4Fourquet R, Tavernier C. An improved list decoding algorithm for the second order Reed Muller codes and its applications. Design Codes and Cryptography, 2008, 49(1) 323-340.
  • 5Elsheh E, Ben A, Hamza, Youssef A. On the nonlinearity profile of cryptographic Boolean functions. IEEE Transactions on Information Theory, 2008, 53(1).. 1767-1770.
  • 6Mesnager S. Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity. IEEE Transactions on Information Theory, 2008, 54(8) : 3656 3662.
  • 7Carlet C. Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. IEEE Transactions on Information Theory, 2008, 54(8): 1262-1272.
  • 8Sun G, Wu C. The lower bounds on the second order nonlin-earity of three classes of Boolean functions with high nonlin earity. Information Sciences, 2009, 179(3) 267-278.
  • 9Gangopadhyay S, Sarkar S, Telang R. On the lower bounds of the second order nonlinearity of some Boolean functions. Information Sciences, 2010, 180(2): 266-273.
  • 10Gode R, Gangopadhyay S. On second order nonlinearities of cubic monomial Boolean functions. Information Sciences, 2010, 180(10) 1781-1795.

同被引文献30

  • 1武传坤,王新梅.Bent函数在流密码中的应用[J].通信学报,1993,14(4):23-27. 被引量:11
  • 2Courtois,N.,and Meier,W.Algebraic attacks on stream ciphers with linear feedback[C].Advances in CryptologyEUROCRYPT 2003,Warsaw,Poland,2003,LNCS,2656:345-359.
  • 3Carlet C and Zeng X Y.Further properties of several classes of Boolean functions with optimum algebraic immunity[J].Designs,Codes and Cryptography,2009,52(3):303-338.
  • 4Carlet C.A method of construction of balanced functions with optimum algebraic immunity[C].Proceedings of the First International Workshop on Coding and Cryptography,Fujian,2007,25-43.
  • 5Li Y,Yang M,and Kan H B.Constructing and counting Boolean functions on even variables with maximum algebraic immunity[J].IEICE Transactions on Fundamentals,2010,93-A(3):640-643.
  • 6Rizomiliotis P.On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation[J].IEEE Transactions on Information Theory,2010,56(8):4014-4024.
  • 7Tu Z R and Deng Y P.A class of 1-resilient function with high nonlinearity and algebraic immunity[R].Ryptography ePrint Archive,Report,2010,2010/179.
  • 8Wang Q,Peng J,Kan H,et al..Constructions of cryptographically significant Boolean functions using primitive polynomials[J].IEEE Transactions on Information Theory,2010,56(6):3048-3053.
  • 9Sarkar S,Gangopadhyay S.On the second order nonlinearity of a cubic Maiorana-McFarland Bent Functions[J].International Journal of Foundations of Computer Science,2010,21(3):243-254.
  • 10Su S H,Tang X H.Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity[J].Designs,Codes and Cryptography,2014,71(2):183-199.

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部