Investigations on <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e1110" altimg="si206.svg"><mml:mi>c</mml:mi></mml:math>-boomerang uniformity and perfect nonlinearity

نویسندگان

چکیده

We defined in Ellingsen et al. (2020) a new multiplicative c-differential, and the corresponding c-differential uniformity we characterized known perfect nonlinear functions with respect to this concept, as well inverse function any characteristic. Here, extend, via differential, boomerang introduced at Eurocrypt ’18 by Cid (2018), differential distinguisher of S-boxes block ciphers. investigate it context nonlinearity related functions. first characterize concept Walsh transforms. further describe for even, respectively, odd The methods are combinatorial number theoretical nature.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On generalizations of semiperfect and perfect rings

‎We call a ring $R$ right generalized semiperfect if every simple right $R$-module is an epimorphic image of a flat right $R$-module with small kernel‎, ‎that is‎, ‎every simple right $R$-module has a flat $B$-cover‎. ‎We give some properties of such rings along with examples‎. ‎We introduce flat strong covers as flat covers which are also flat $B$-covers and give characterizations of $A$-perfe...

متن کامل

Boomerang Attacks on BLAKE-32

We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang attacks on up to 8 round-reduced keyed permutation of BLAKE-32. Also, we show that boomerangs can be used as distinguishers for hash/compression functions and present such distinguishers for the compression function of BLAKE-32 reduced to 7 rounds. Since our distinguis...

متن کامل

New Results on Boomerang and Rectangle Attacks

The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount. We also present a method for using a boomerang distinguisher, which enables retrieving subkey bits on both sides of the...

متن کامل

A new characterization of group action-based perfect nonlinearity

The left-regular multiplication is explicitly embedded in the notion of perfect nonlinearity. But there exist many other group actions. By replacing translations by another group action the new concept of group action-based perfect nonlinearity has been introduced. In this paper we show that this generalized concept of nonlinearity is actually equivalent to a new bentness notion that deals with...

متن کامل

A New Tool for Assurance of Perfect Nonlinearity

Let f(x) be a mapping f : GF(p) → GF(p), where p is prime and GF(p) is the finite field with p elements. A mapping f is called differentially k-uniform if k is the maximum number of solutions x ∈ GF(p) of f(x + a) − f(x) = b, where a, b ∈ GF(p) and a = 0. A 1-uniform mapping is called perfect nonlinear (PN). In this paper, we propose an approach for assurance of perfect nonlinearity which invol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Discrete Applied Mathematics

سال: 2021

ISSN: ['1872-6771', '0166-218X']

DOI: https://doi.org/10.1016/j.dam.2021.08.002