Differentially uniform mappings for cryptography
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Codes, Bent Functions and Permutations Suitable For DES-likeCryptosystems
Designs, Codes and Cryptography
On Z_4-Linear Goethals Codes and KloostermanSums
Designs, Codes and Cryptography - Special issue on designs and codes—a memorial tribute to Ed Assmus
On Cryptographically Significant Mappings over GF(2n)
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On the Connection between Kloosterman Sums and Elliptic Curves
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Affinity of permutations of F2n
Discrete Applied Mathematics - Special issue: Coding and cryptography
Some results concerning cryptographically significant mappings over GF(2n)
Designs, Codes and Cryptography
On EA-equivalence of certain permutations to power mappings
Designs, Codes and Cryptography
A new APN function which is not equivalent to a power mapping
IEEE Transactions on Information Theory
New classes of almost bent and almost perfect nonlinear polynomials
IEEE Transactions on Information Theory
On Almost Perfect Nonlinear Functions Over
IEEE Transactions on Information Theory
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials
IEEE Transactions on Information Theory
Propagation characteristics of x→ x-1 and Kloosterman sums
Finite Fields and Their Applications
Results on rotation-symmetric S-boxes
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, a proof is given that there does not exist a linearized polynomial $L(x)\in\mathbb{F}_{2^n}[x]$ such that x 驴驴驴1驴+驴L(x) is a permutation on $\mathbb{F}_{2^n}$ when n驴驴驴5, which is proposed as a conjecture in Li and Wang (Des Codes Cryptogr 58(3):259---269, 2011). As a consequence of this result, if a permutation is EA-equivalent to the inverse function over $\mathbb{F}_{2^n}$ , then it is affine equivalent to the inverse mapping when n驴驴驴5.