The Art of Computer Programming Volumes 1-3 Boxed Set
The Art of Computer Programming Volumes 1-3 Boxed Set
A New Class of Invertible Mappings
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Linear cryptanalysis of the TSC family of stream ciphers
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New applications of t-functions in block ciphers and hash functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A new class of single cycle t-functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
On the linear complexity of nonlinearly filtered PN-sequences
IEEE Transactions on Information Theory
Permutation Polynomials Modulo 2w
Finite Fields and Their Applications
Linear weaknesses in t-functions
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Hi-index | 0.00 |
The cryptographic properties of keystreams generated by stream ciphers based on t-functions are studied. These constructions are of great interest as they allow building highly efficient and secure cryptographic primitives. The randomness of the coordinate sequences generated by such mappings is analyzed in terms of the autocorrelation function. The results derived are valid for all t-functions regardless the type of construction and indicate the existence of nonrandomness. As the problem of the efficient implementation of secure s-boxes is open, the nonlinearity of t-functions is also analyzed. It is shown how some cryptographically undesirable properties, can be solved by application of similarity transformations.