Perfect nonlinear functions are used to construct DES-like cryptosystems that are resistant to differential attacks. We present generalized DES-like cryptosystems where the XOR operation is replaced by a general group action. The new cryptosystems, when combined with G-perfect nonlinear functions (similar to classical perfect nonlinear functions with one XOR replaced by a general group action), allow us to construct systems resistant to modified differential attacks. The more general setting enables robust cryptosystems with parameters that would not be possible in the classical setting. We construct several examples of G-perfect nonlinear functions, both Z2 -valued and Za2 -valued. Our final constructions demonstrate G-perfect nonlinear pl...
International audienceNonlinear functions, also called S-Boxes, are building blocks for symmetric cr...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
International audienceDue to implementation constraints the XOR operation is widely used in order to...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
VK: Kaisa Nyberg; Nyberg, K.; CRYPTOIn the late 1980s the importance of highly nonlinear functions i...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
It is well known that there does not exist a Boolean function f: Z_2^m ightarrow Z_2^n satisfying bo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
International audienceNonlinear functions, also called S-Boxes, are building blocks for symmetric cr...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
International audienceDue to implementation constraints the XOR operation is widely used in order to...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
VK: Kaisa Nyberg; Nyberg, K.; CRYPTOIn the late 1980s the importance of highly nonlinear functions i...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
It is well known that there does not exist a Boolean function f: Z_2^m ightarrow Z_2^n satisfying bo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
International audienceNonlinear functions, also called S-Boxes, are building blocks for symmetric cr...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...