While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f : Fn → F2 by affine functions. Usually, it is assumed that all the input vectors to a Boolean function are equiprobable while mounting affine approximation attack or fast correlation attacks. In this paper we consider a more general case when each component of the input vector to f is independent and identically distributed Bernoulli variates with the parameter p. Since our scope is within the area of cryptography, we initiate an analysis of cryptographic Boolean functions under the previous considerations and derive expression of the analogue of Walsh-Hadamard transform and nonlinearity in the case under consideration. We observe tha...
In this thesis, we study a type of affine equivalence for the monomial rotation-symmetric (MRS) Bool...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...
While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f...
We study the main cryptographic features of Boolean functions (balancedness, nonlinearity, algebraic...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
International audienceWe study the main cryptographic features of Boolean functions (balanced-ness, ...
Boolean functions are the mathematical basis of modern cryptographic algorithms. However, in practic...
International audienceWe study the main cryptographic features of Boolean functions (balanced-ness, ...
Nonlinear Boolean functions are considered for a long time to construct symmetric cryptosystems. In ...
International audienceBoolean functions are usually studied under the assumption that each input bit...
Cryptographic boolean functions via group Hadamard matrices For any integers n,m, 2n> m> n we ...
International audienceBoolean functions are usually studied under the assumption that each input bit...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
For any integers n,m, 2n \u3e m \u3e n we construct a set of boolean functions on Vm, say {f1(z),.....
In this thesis, we study a type of affine equivalence for the monomial rotation-symmetric (MRS) Bool...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...
While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f...
We study the main cryptographic features of Boolean functions (balancedness, nonlinearity, algebraic...
The work is focused on Boolean functions. At first, it describes the ways Boolean functions are repr...
International audienceWe study the main cryptographic features of Boolean functions (balanced-ness, ...
Boolean functions are the mathematical basis of modern cryptographic algorithms. However, in practic...
International audienceWe study the main cryptographic features of Boolean functions (balanced-ness, ...
Nonlinear Boolean functions are considered for a long time to construct symmetric cryptosystems. In ...
International audienceBoolean functions are usually studied under the assumption that each input bit...
Cryptographic boolean functions via group Hadamard matrices For any integers n,m, 2n> m> n we ...
International audienceBoolean functions are usually studied under the assumption that each input bit...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
For any integers n,m, 2n \u3e m \u3e n we construct a set of boolean functions on Vm, say {f1(z),.....
In this thesis, we study a type of affine equivalence for the monomial rotation-symmetric (MRS) Bool...
In this paper, we present four product operations to construct cryptographic boolean functions from ...
Abstract: Boolean functions used in cryptographic applications have to satisfy various cryptographic...