نتایج جستجو برای: vectorial boolean function
تعداد نتایج: 1234290 فیلتر نتایج به سال:
This paper describes a technique for analyzing the stochastic structure of the vectorial capacity using moment–generating functions. In such formulation, for an infectious disease transmitted by a vector, we obtain the generating function for the distribution of the number of infectious contacts (e.g., infectious bites from mosquitoes) between vectors and humans after a contact to a single infe...
A function F:Fpn→Fpm, is a vectorial s-plateaued if for each component Fb(μ)=Trn(bF(x)),b∈Fpm⁎ and μ∈Fpn, the Walsh transform value |Fbˆ(μ)| either 0 or pn+s2. In this paper, we explore relation between (vectorial) functions partial geometric difference sets. Moreover, establish link three-valued cross-correlation of p-ary sequences functions. Using link, provide partition F3n into Conversely, ...
Boolean functions used in cryptographic applications have to satisfy various cryptographic criteria. Although the choice of the criteria depends on the cryptosystem in which they are used, there are some properties (balancedness, nonlinearity, high algebraic degree, correlation immunity, propagation criteria) which a cryptographically strong Boolean function ought to have. We study the above me...
Algebraic immunity has been proposed as an important property of Boolean functions. To resist algebraic attack, a Boolean function should possess high algebraic immunity. It is well known now that the algebraic immunity of an n-variable Boolean function is upper bounded by ⌈ n 2 ⌉ . In this paper, for an odd integer n, we present a construction method which can efficiently generate a Boolean fu...
Abstract. Semiparametric model is a statistical model consisting of both parametric and nonparametric components, which can be looked on as a mixture model. The theoretical properties of this model have been studied extensively, such as large-sample property. However, most researches are based on scalar value, in which the dimension of the observation is one at each moment. In the fields of spa...
We investigate S-boxes defined by pairs of Orthogonal Cellular Automata (OCA), motivated the fact that such CA always define bijective vectorial Boolean functions, and could thus be interesting for design block ciphers. In particular, we perform an exhaustive search all nonlinear OCA diameter $$d=4$$ $$d=5$$ , which generate size $$6\times 6$$ $$8\times 8$$ respectively. Surprisingly, these tur...
In this paper a Boolean minimization algorithm is considered and implemented as an applet in Java. The application is based on the Quine-McCluskey simplification technique with some modifications. The given application can be accessed on line since it is posted on the World Wide Web (WWW), with up to four variables, at the URL http://www.csam.montclair.edu/∼antoniou/bs. After extensive testing,...
In recent years, Differential Fault Analysis (DFA) has been proven as the most efficient technique to attack any block cipher by introducing a computational error. In this paper, a new Substitution Permutation Network (SPN) type architecture is proposed which has better resistance against DFA as compared to Advanced Encryption Standard (AES). The proposed architecture is similar to AES except r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید