Abstract Given two non-weakly k-normal Boolean functions on n variables a method is proposed to construct a non-weakly (k + 1)-normal Boolean function on (n + 2)- variables. 1 Introduction A function from Fn2 into F2 is called a Boolean function on n variables. The set of all such functions is denoted by Bn. Boolean functions find extensive applications in designing stream ciphers and block ciphers. High nonlinearity and balancedness are possibly the most important properties that a Boolean function which is being used in cipher systems must possess. In case n is odd finding functions with maximum nonlinearity for n> 7 is an open question. For n even the maximum nonlinearity attainable is 2n-1-
For the first time we find Boolean functions on 9 variables having nonlinearity 241, that remained a...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...
Given two non-weakly k-normal Boolean functions on n-variables a method is proposed to construct a ...
Given two non-weakly $k$-normal Boolean functions on $n$ variables a method is proposed to construct...
AbstractDobbertin (Construction of bent functions and balanced Boolean functions with high nonlinear...
Three of the most important criteria for cryptographically strong Boolean functions are the balanced...
Boolean functions play an important role in the design and analysis of symmetric-key cryptosystems, ...
In 2005, [2] Philippe Guillot presented a new construction of Boolean functions using linear codes a...
AbstractThree important criteria for cryptographically strong Boolean functions are balance, nonline...
. Highly nonlinear Boolean functions occupy an important position in the design of secure block as w...
Three important criteria for cryptographically strong Boolean functions are balance, nonlinearity, a...
AbstractNonlinear characteristics of (Boolean) functions is one of the important issues both in the ...
Boolean functions are used as nonlinear combining functions in certain stream ciphers. A Boolean fun...
This thesis discusses new results on the design and the existence of cryptographically strong Boolea...
For the first time we find Boolean functions on 9 variables having nonlinearity 241, that remained a...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...
Given two non-weakly k-normal Boolean functions on n-variables a method is proposed to construct a ...
Given two non-weakly $k$-normal Boolean functions on $n$ variables a method is proposed to construct...
AbstractDobbertin (Construction of bent functions and balanced Boolean functions with high nonlinear...
Three of the most important criteria for cryptographically strong Boolean functions are the balanced...
Boolean functions play an important role in the design and analysis of symmetric-key cryptosystems, ...
In 2005, [2] Philippe Guillot presented a new construction of Boolean functions using linear codes a...
AbstractThree important criteria for cryptographically strong Boolean functions are balance, nonline...
. Highly nonlinear Boolean functions occupy an important position in the design of secure block as w...
Three important criteria for cryptographically strong Boolean functions are balance, nonlinearity, a...
AbstractNonlinear characteristics of (Boolean) functions is one of the important issues both in the ...
Boolean functions are used as nonlinear combining functions in certain stream ciphers. A Boolean fun...
This thesis discusses new results on the design and the existence of cryptographically strong Boolea...
For the first time we find Boolean functions on 9 variables having nonlinearity 241, that remained a...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...