期刊文献+

布尔函数全局雪崩特征的两个新指标 被引量:1

Two New Indicators of Global Avalanche Characteristics between Two Boolean Functions
原文传递
导出
摘要 ZHANG Xian-Mo和ZHENG Yu-liang提出单个函数f的全局雪崩特征的概念,并且给出单个函数雪崩特征的平方和指标σf与绝对指标Δf的上下界。周宇等将上面的概念作了推广,提出了两个函数f和g全局雪崩特征的概念。他们给出了两个函数全局雪崩特征的平方和指标σf,g与绝对指标Δf,g。进而定义两个新指标:λf(指g遍历所有n元布尔函数时,σf,g取得的最小值)和βf(指g遍历所有n元布尔函数时,Δf,g取得的最小值)。得到了λf的值,给出了λf和βf的上界和下界。 ZHANG Xian-Mo and ZHENG Yu-liang suggested the notion of global avalanche characteristics of single Boolean function f, and introduced the sum of squares indicatorσf and the absolute indicator Af. ZHOU Yu et al. generalized the above notions. The notion of global avalanche characteristics of two Boolean function f and g is proposed, and the sum of squares indicatorσf,g and absolute indicator △f,k gof global avalanche characteristics of two Boolean function f and g are defined. Given n- variable function f, λf, which is minimum value of σf.g, where g is any n-variable Boolean function , is defined. βf, which is minimum value of △f.g, where g is any n-variable Boolean function ,is defined. These are two new indicators. f is computed. The lower and the upper bounds of △f and βf are given.
出处 《通信技术》 2014年第6期651-653,共3页 Communications Technology
基金 国家自然科学基金(No.61309034) 中国电子科技集团创新人才项目(No.JJQN201332)~~
关键词 布尔函数 WALSH谱 全局雪崩特征 平方和指标 绝对指标 boolean function walsh spectrum global avalanche characteristics sum of squares indicator absolute indicator
  • 相关文献

参考文献9

  • 1ADAMS C M, TRVARES S E. Generating and Counting Binary Bent Sequences [ J ]. IEEE Transactions on Infor- mation Theory, 1990,36 (05) : 1170-1173.
  • 2WEBSTER A F. Plaintext/Ciphertext Bit Dependencies in Cryptographic System[ D ]. Ontario, Canada: Department of Electrical Engeneering, Queen' s University, 1985.
  • 3PRENEEL B, LEEKWIJC K, LINDEN LV, et al. Propa- gation Characteristics of Boolean Functions [ C ]//Ad- vances in Cryptology- EUROCRYPT' 90. Berlin: Springer -Verlag, 1991 : 155-165.
  • 4ZHANG X M, ZHENG Y L. GAC-the Criterion for Glob- al Avalanche Characteristics of Cryptographic Functions [J]. Journal for Universal Computer Science, 1995, 1 (05) :316-333.
  • 5ZHOU Yu,XIE Min,XIAO Guo-zben. On the Global Av- alanche Characteristics between Two Boolean Functions and the Higher Order Nonlinearity [ J ]. Information Sci- ences,2010, 180(02) :256-265.
  • 6王林,谯通旭,赵伟,刘瑶.关于完全非线性函数的非线性度的界[J].信息安全与通信保密,2011,9(11):66-67. 被引量:4
  • 7谯通旭,祝世雄,王运兵,申兵.单圈T函数序列与M序列研究[J].信息安全与通信保密,2013,11(1):36-39. 被引量:4
  • 8谯通旭,王运兵,谢上明,董新锋,张文政.具有最大代数免疫度函数的研究[J].通信技术,2013,46(11):86-89. 被引量:4
  • 9ZHOU Yu. On the Distribution of Autocorrelation Value of Balanced Boolean Functions [ J ]. Advances in Mathemat- ics of Communications, 2013,7 (03) : 335-347.

二级参考文献20

  • 1BIHAM E, SHAMIR A. Differential Cryptanalysis of DES-like Cryptosystems[J]. J. Cryptology, 1991, 4 (1): 3-72.
  • 2MATSUI M. Linear Cryptanalysis Method for DES Cipher[C]. Advances in Cryptology-EUROCRYPT'93. Berlin: Springer, 1994: 386-397.
  • 3CARLET C, DING C. Highly Nonlinear Mappings[J]. J. Complexity, 2004(20): 05-244.
  • 4CUSICK T W, DING C, RENVALL A. Stream Ciphers and Number Theory[C]. Amsterdam: North-Holland Mathematical Library, 1998.
  • 5SAMUELSON P A. How Deviant Can You Be?[J]. Journal of the American Statistical Association, 1968(63): 1522-1525.
  • 6KLIMOV A, SHAMIR A. Cryptographic Application of T-functions[C]//The Ninth Workshop on Selected Areas in Cryptography-SAC 2003. Berlin: Springer-Verlag, 2004: 248-261.
  • 7ZHANG Wenying, WU Chuan-Kun. The Algebraic Normal Form, Linear Complexity and k-Error Complexity of Single-Cycle T-functions[C]//The fourth International Conference on Sequences and Their Applications 2006- SETA2006. Berlin: Springer-Verlag, 2006: 391-401.
  • 8LIDL R, NIEDERREITER H. Finite Fields[M].[s.l.]: Addison-Wesley Publishing Company, 1983 : 398-399.
  • 9KUROSAWA K, SATO F, SAKATA T, et al. A Relationship Between Linear Complexity and k-error Linear Complexity[J]. IEEE Transactions on Information Theory, 2000, 46(2): 694-698.
  • 10GAMES R A, CHAN A H. A Fast Algorithm for Determining the Complexity of a Binary Seqence with Period 2"[J]. IEEE Transactions on Information Theory, 1983, 29(1): 144-146.

共引文献6

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部