Abstract. Correlation-immunity is a cryptographic criterion on Boolean functions arising from correlation attacks on combining functions. When it comes to filtering functions, the status of correlation-immunity lacks study in itself and, if it is commonly accepted as a requirement for nonlinear filter generators, this is for other concerns. We revisit the concept of correlation-immunity and clear up its meaning for filtering functions. We summarize existing criteria similar to correlation-immunity and attacks in two different models, showing that such criteria are not relevant in both models. We also derive a precise property to avoid correlations due to the filter function only, which appears to be a bit looser than correlation-immunity. W...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
Nonlinear Boolean functions play an important role in the design of block ciphers, stream ciphers an...
) Jennifer Seberry ? , Xian-Mo Zhang ?? and Yuliang Zheng ??? Department of Computer Science, T...
AbstractThree correlation theorems for Boolean functions are presented with applications to cryptana...
The strength of any conventional cipher system relies on the underlying cryptographic Boolean functi...
Abstract. Motivated by the security of the nonlinear filter generator, the concept of correlation wa...
This dissertation investigates correlation immunity, avalanche features, and the bent cryptographic ...
A Boolean function is called correlation immune if every input is independent of the output, when t...
We show the use of a reconfigurable computer in computing the correlation immunity of Boolean functi...
Contains fulltext : 143724.pdf (publisher's version ) (Open Access)GECCO '15 : the...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
We show the use of a reconfigurable computer in computing the correlation immunity of Boolean functi...
Abstract. In this paper we extend the conditional correlation attack ([LCPP96]) against the nonlinea...
Abstract. We investigate the security of n-bit tom-bit vectorial Boolean functions in stream ciphers...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
Nonlinear Boolean functions play an important role in the design of block ciphers, stream ciphers an...
) Jennifer Seberry ? , Xian-Mo Zhang ?? and Yuliang Zheng ??? Department of Computer Science, T...
AbstractThree correlation theorems for Boolean functions are presented with applications to cryptana...
The strength of any conventional cipher system relies on the underlying cryptographic Boolean functi...
Abstract. Motivated by the security of the nonlinear filter generator, the concept of correlation wa...
This dissertation investigates correlation immunity, avalanche features, and the bent cryptographic ...
A Boolean function is called correlation immune if every input is independent of the output, when t...
We show the use of a reconfigurable computer in computing the correlation immunity of Boolean functi...
Contains fulltext : 143724.pdf (publisher's version ) (Open Access)GECCO '15 : the...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
We show the use of a reconfigurable computer in computing the correlation immunity of Boolean functi...
Abstract. In this paper we extend the conditional correlation attack ([LCPP96]) against the nonlinea...
Abstract. We investigate the security of n-bit tom-bit vectorial Boolean functions in stream ciphers...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
This article is devoted to problems of cryptanalysis. Cryptographic analysis results, got from using...
Nonlinear Boolean functions play an important role in the design of block ciphers, stream ciphers an...