In this paper, we consider te Cayley graph Gf associated with a Boolean function f and we use it to investigate some of the cryptographic properties of f. We derive necessary (but not sufficient) conditions for a Boolean function to be bent. We also gind a complete characterization of the propagation characteristics of f using the topology of its associated Cayley graph Gf. Finally, some inequalities between the cardinality of the spectrum of Gf and the Hamming weight of f are obtained, and some problems are raised
Bent Boolean functions play a very significant role in the design of strong symmetric cryptosystems....
The relation between the Walsh-Hadamard transform and the auto-correlation function of Boolean funct...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
In this paper we consider the Cayley graph Gf associated with a Boolean function f and we use it to ...
In this paper we consider the Cayley graph Gf associated with a Boolean function f and we use it to ...
In this paper we consider the Cayley graph Gf associated to a Boolean function f and we use it to in...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
We prove various results on monotone Boolean functions. In particular, we prove a conjecture propose...
The article of record as published may be found at http://dx.doi.org/10.1515/jmc-2014-0030We prove v...
In this paper we define the (edge-weighted) Cayley graph associated to a generalized Boolean functio...
Cayley hash functions are a family of cryptographic hash functions constructed from the Cayley graph...
This dissertation deals with some crucial building blocks of cryptosystems in symmetric cryptography...
The article of record as published may be found at https://doi.org/10.1.1016/j.dam.2020.01.026In thi...
Boolean functions are vital components of symmetric-key ciphers such as block ciphers, stream cipher...
Bent Boolean functions play a very significant role in the design of strong symmetric cryptosystems....
The relation between the Walsh-Hadamard transform and the auto-correlation function of Boolean funct...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
In this paper we consider the Cayley graph Gf associated with a Boolean function f and we use it to ...
In this paper we consider the Cayley graph Gf associated with a Boolean function f and we use it to ...
In this paper we consider the Cayley graph Gf associated to a Boolean function f and we use it to in...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
We prove various results on monotone Boolean functions. In particular, we prove a conjecture propose...
The article of record as published may be found at http://dx.doi.org/10.1515/jmc-2014-0030We prove v...
In this paper we define the (edge-weighted) Cayley graph associated to a generalized Boolean functio...
Cayley hash functions are a family of cryptographic hash functions constructed from the Cayley graph...
This dissertation deals with some crucial building blocks of cryptosystems in symmetric cryptography...
The article of record as published may be found at https://doi.org/10.1.1016/j.dam.2020.01.026In thi...
Boolean functions are vital components of symmetric-key ciphers such as block ciphers, stream cipher...
Bent Boolean functions play a very significant role in the design of strong symmetric cryptosystems....
The relation between the Walsh-Hadamard transform and the auto-correlation function of Boolean funct...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...