Abstract The (fast) algebraic immunity, including (standard) algebraic immunity and the resistance against fast algebraic attacks, has been considered as an important cryptographic property for Boolean functions used in stream ciphers. This paper is on the determination of the (fast) algebraic immunity of a special class of Boolean functions, called Boolean power functions. An n-variable Boolean power function f can be represented as a monomial trace function over finite field F2n, f(x) = Trn1 (λxk), where λ ∈ F2n and k is the coset leader of cyclotomic coset Ck modulo 2 n − 1. To determine the (fast) algebraic immunity of Boolean power functions one may need the arithmetic in F2n, which may be not computationally efficient compared with t...
AbstractIn this paper, we construct a class of 2k-variable Boolean functions which have optimal alge...
In this paper, we study sufficient conditions to improve the lower bound on the algebraic immunity o...
Motivated by the impact of fast algebraic attacks on stream ciphers, and recent constructions using ...
In this study, the authors investigate the resistance of Boolean functions against fast algebraic at...
Nowadays, the resistance against algebraic attacks and fast algebraic attacks are considered as an i...
Abstract. It has been noted recently that algebraic (annihilator) immunity alone does not provide su...
Abstract. In the last decade, algebraic and fast algebraic attacks are regarded as the most successf...
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The algebraic immun...
In this paper we investigate the algebraic immunity of some well known cryptographic functions to de...
Abstract. In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identi...
A perfect algebraic immune function is a Boolean function with perfect immunity against algebraic an...
In the last decade, algebraic and fast algebraic attacks are regarded as the most successful attacks...
AbstractAlgebraic immunity (AI) is a new cryptographic criterion proposed against algebraic attacks....
Abstract Boolean functions used in stream ciphers should have many cryptographic properties in order...
In this correspondence, first we give a decomposition of symmetric Boolean functions, then we show t...
AbstractIn this paper, we construct a class of 2k-variable Boolean functions which have optimal alge...
In this paper, we study sufficient conditions to improve the lower bound on the algebraic immunity o...
Motivated by the impact of fast algebraic attacks on stream ciphers, and recent constructions using ...
In this study, the authors investigate the resistance of Boolean functions against fast algebraic at...
Nowadays, the resistance against algebraic attacks and fast algebraic attacks are considered as an i...
Abstract. It has been noted recently that algebraic (annihilator) immunity alone does not provide su...
Abstract. In the last decade, algebraic and fast algebraic attacks are regarded as the most successf...
In this paper, we analyze the algebraic immunity of symmetric Boolean functions. The algebraic immun...
In this paper we investigate the algebraic immunity of some well known cryptographic functions to de...
Abstract. In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identi...
A perfect algebraic immune function is a Boolean function with perfect immunity against algebraic an...
In the last decade, algebraic and fast algebraic attacks are regarded as the most successful attacks...
AbstractAlgebraic immunity (AI) is a new cryptographic criterion proposed against algebraic attacks....
Abstract Boolean functions used in stream ciphers should have many cryptographic properties in order...
In this correspondence, first we give a decomposition of symmetric Boolean functions, then we show t...
AbstractIn this paper, we construct a class of 2k-variable Boolean functions which have optimal alge...
In this paper, we study sufficient conditions to improve the lower bound on the algebraic immunity o...
Motivated by the impact of fast algebraic attacks on stream ciphers, and recent constructions using ...