期刊文献+

偶变元MAI旋转对称布尔函数 被引量:5

Rotation symmetric Boolean functions in even-variable with maximum algebraic immunity
在线阅读 下载PDF
导出
摘要 代数免疫度是布尔函数的一个重要密码学指标。给出了具有最大代数免疫度的偶数元旋转对称布尔函数的两种构造方法。进一步地,研究了特殊情形时所构造的旋转对称布尔函数的非线性度,当n≥18时,构造3得到的MAI旋转对称布尔函数的非线性度优于已知构造的偶数元MAI旋转对称布尔函数的非线性度。 Algebraic immunity has been considered as one of significant properties for Boolean functions. Two constructions of rotation symmetric Boolean functions (RSBFs) in even-variable with maximum algebraic immunity(MAI) were proposed. Furthermore, the nonlinearity of constructed RSBFs were investigated under special cases of Construction 2. When n ≥ 18, the constructed MAI RSBFs by using Construction 3 have higher nonlinearity than that of all known MAI RSBFs in even-variable.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2012年第4期85-89,共5页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(61070215 61103192)
关键词 布尔函数 旋转对称对布尔函数 代数免疫度 非线性度 Boolean functions rotation symmetric Boolean functions algebraic immunity nonlinearity
  • 相关文献

参考文献12

  • 1Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback[ C ]// Eurocrypt 2003, LNCS 2656, Springer- Vcrlag, 2003:345 -359.
  • 2Meier W, Pasalic E, Carlet C. Algebraic attacks and decomposition of Boolean functions [ C ]// EUROCRYPT 2004, LNCS 3027,2004 : 474 -491.
  • 3Fu S J, Li C, Matsuura K, et al. Construction of rotation symmetric Boolean functions with maximum algebraic immunity [ C ]///CANS 2009, LNCS 5888,2009:402 -412.
  • 4Sarkar S, Maitra S. Construction of rotation symmetric Boolean functions with optimal algebraic immunity [ J ]. Computation Systems, 2009, 12(3) : 267 -284.
  • 5Fu S J, Li C, Matsuura K, et al. Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity[ J]. Science in China (F), accepted.
  • 6Carlet C. A method of construction of balanced functions with optimum algebraic immunity [ C ] // Proceedings of the International Workshop on Coding and Cryptography, Fujiang, China, June, 2007.
  • 7Dalai D K, Maitra S, Sarkar S. Basic theory in construction of Boolean functions with maximum possible annihilator immunity[J]. Des. Codes Cryptogr. , 2006, 40:41 -58.
  • 8Li N, Qu L J. On the construction of Boolean functions with optimal algebraic immunity [ J ]. IEEE Transactions on Information Theory, 2008, 53 (3) : 1330 - 1334.
  • 9Cadet C, Feng K Q. An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity [ C ]//Asiacrypt 2008, LNCS 5350, 2008:425 -440.
  • 10Qu L J, Feng K Q, Liu F, et al. Construction symmetric Boolean functions with maximum algebraic immunity [ J ]. IEEE Transactions on Information Theory, 2009, 55 (5): 2406 - 2412.

同被引文献40

  • 1Courtois N T, Meier W. Algebraic attacks on stream ciphers with linear feedback [ C ]//Advances in Cryptology- EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Springer Berlin Heidelberg, 2003, 2656: 345- 359.
  • 2Dinur I, Shamir A. Cube attack on tweakable black box polynomials [ C ]//Advances in Cryptology-EUROCRYPT 2009, Springer Berlin Heidelberg, 2009 : 278 - 299.
  • 3Mroczkowski P, Szmidt J. The cube attack on stream cipher Trivium and quadraticity tests [ J ]. Fundamenta Informaticae, 2012, 114(3) : 309 -318.
  • 4Fouque P A, Vannet T. Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks [ EB/OL ]. (2013 - 12 - 14 ) [ 2014 - 05 - 06 ]. http ://fse2013. spins. ntu. edu. sg: 80.
  • 5Dinur I, Shamir A. Breaking Grain-128 with dynamic cube attacks [ C ]//Fast Software Encryptian, Springer Berlin Heidelberg, 2011 : 167 - 187.
  • 6Abdul-Latip S F, Reyhanitabar M R, Susilo W, et al. Extended cubes: enhancing the cube attack by extracting low- degree non-hnear equations[ C]//Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York: Association for Computing Machinery, 2011 : 296 -305.
  • 7Zhao X J, Wang T, Guo S Z. Improved side channel cube attacks on PRESENT[ EB/OL]. (2011 - 04 - 10) [ 2013 - 06 -09]. http://eprint, iacr. org/2011/165.
  • 8Dinur I, Shamir A. Side channel cube attacks on block ciphers[EB/OL]. (2009 - 03 - 20) [2013 - 04 - 16]. http ://eprint. iaer. org/2009/127.
  • 9Abdul-Latip S F, Reyhanitabar M R, Susilo W, et al. Fault analysis of the KATAN family of block ciphers [ C ]// Information Security Practice and Experience, Springer Berlin Heidelberg, 2012: 319- 336.
  • 10Aumasson J P, Dinur I, Meier W, et al. Cube testers and key recovery attacks on reduced-round MD6 and Trivium [ C ]// Fast Software Encryption, Springer Berlin Heidelberg, 2009: 1 -22.

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部