Algebraic immunity of vectorial boolean functions and boolean groebner bases

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algebraic Immunity Hierarchy of Boolean Functions

Algebraic immunity of Boolean functions is a very important concept in recently introduced algebraic attacks of stream cipher. For a n-variable Boolean function f , the algebraic immunity AIn(f) takes values in {0, 1, . . . , d2 e}. For every k in this range, denote Bn,k the set of all n-variable Boolean functions with algebraic immunity k, and we know that Bn,k is always non-empty. According t...

متن کامل

Vectorial Boolean Functions for Cryptography

To appear as a chapter of the volume " Boolean Methods and Models " ,

متن کامل

Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition

In this paper, we construct a class of vectorial Boolean functions over F2n with high algebraic immunity based on the decomposition of the multiplicative group of F2n . By viewing F2n as G1G2 ∪ {0} (where G1 and G2 are subgroups of F2n , (#G1,#G2) = 1 and #G1 × #G2 = 2 − 1), we give a generalized description for constructing vectorial Boolean functions with high algebraic immunity. Moreover, wh...

متن کامل

Algebraic Immunity of Boolean Functions Analysis and Construction

In this paper, we first analyse the method of finding algebraic immunity of a Boolean function. Given a Boolean function f on n-variables, we identify a reduced set of homogeneous linear equations by solving which one can decide whether there exist annihilators of f at a specific degree. Moreover, we analyse how an affine transformation on the input variables of f can be exploited to achieve fu...

متن کامل

Generalized Correlation Analysis of Vectorial Boolean Functions

We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, linear approximations based on composing the vector output with any Boolean functions have higher bias than those based on the usual correlation attack. In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical and Applied Cybersecurity

سال: 2020

ISSN: 2708-1397,2664-2913

DOI: 10.20535/tacs.2664-29132020.1.209431