We defined in [21] a new multiplicative c-differential, and the corresponding c-differential uniformity and we characterized the known perfect nonlinear functions with respect to this new concept, as well as the inverse in any characteristic. The work was continued in [29], investigating the c-differential uniformity for some further APN functions. Here, we extend the concept to the boomerang uniformity, introduced at Eurocrypt ’18 by Cid et al. [16], to evaluate S-boxes of block ciphers, and investigate it in the context of perfect nonlinearity and related functions
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
Modern cryptography is deeply founded on mathematical theory and vectorial Boolean functions play an...
In this paper we define a new (output) multiplicative differential, and the corresponding c-differen...
While the classical differential uniformity (c = 1) is invariant under the CCZ-equivalence, the newl...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
Functions with low differential uniformity have relevant applications in cryptography. Recently, fun...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
In a prior paper [14], along with P. Ellingsen, P. Felke and A. Tkachenko, we defined a new (output)...
This dissertation investigates a newly defined cryptographic differential, called a c-differential, ...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
In this paper, we construct some piecewise defined functions, and study their c-differential unifor...
Building upon the observation that the newly defined [12] concept of c-differential uniformity is no...
17 USC 105 interim-entered record; under review.The article of record as published may be found at h...
17 USC 105 interim-entered record; under temporary embargo.Modifying the binary inverse function in ...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
Modern cryptography is deeply founded on mathematical theory and vectorial Boolean functions play an...
In this paper we define a new (output) multiplicative differential, and the corresponding c-differen...
While the classical differential uniformity (c = 1) is invariant under the CCZ-equivalence, the newl...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
Functions with low differential uniformity have relevant applications in cryptography. Recently, fun...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
In a prior paper [14], along with P. Ellingsen, P. Felke and A. Tkachenko, we defined a new (output)...
This dissertation investigates a newly defined cryptographic differential, called a c-differential, ...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
In this paper, we construct some piecewise defined functions, and study their c-differential unifor...
Building upon the observation that the newly defined [12] concept of c-differential uniformity is no...
17 USC 105 interim-entered record; under review.The article of record as published may be found at h...
17 USC 105 interim-entered record; under temporary embargo.Modifying the binary inverse function in ...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
Modern cryptography is deeply founded on mathematical theory and vectorial Boolean functions play an...