Introduction to finite fields and their applications
Introduction to finite fields and their applications
Almost perfect nonlinear power functions on GF (2n): the Niho case
Information and Computation
The Design of Rijndael
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Essential Algebraic Structure within the AES
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Designs, Codes and Cryptography
Cryptanalysis of the data encryption standard by the method of formal coding
Proceedings of the 1982 conference on Cryptography
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Almost perfect nonlinear power functions on GF(2n): the Welch case
IEEE Transactions on Information Theory
Sequences, DFT and Resistance against Fast Algebraic Attacks
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Some lower bounds on the algebraic immunity of functions given by their trace forms
Problems of Information Transmission
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On extended algebraic immunity
Designs, Codes and Cryptography
Reducing the number of homogeneous linear equations in finding annihilators
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
On algebraic immunity and annihilators
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
A simple stream cipher with proven properties
Cryptography and Communications
Hi-index | 0.00 |
Algebraic attacks have received a lot of attention in studying security of symmetric ciphers. The function used in a symmetric cipher should have high algebraic immunity (${\cal AI}$) to resist algebraic attacks. In this paper we are interested in finding ${\cal AI}$ of Boolean power functions. We give an upper bound on the ${\cal AI}$ of any Boolean power function and a formula to find its corresponding low degree multiples. We prove that the upper bound on the ${\cal AI}$ for Boolean power functions with Inverse, Kasami and Niho exponents are $\lfloor \sqrt{n}\rfloor + \lceil \frac{n}{\lfloor \sqrt{n} \rfloor}\rceil -2$, $\lfloor \sqrt{n} \rfloor + \lceil \frac{n}{\lfloor \sqrt{n} \rfloor}\rceil$ and $\lfloor \sqrt{n} \rfloor + \lceil \frac{n}{\lfloor \sqrt{n} \rfloor}\rceil$ respectively. We also generalize this idea to Boolean polynomial functions. All existing algorithms to determine ${\cal AI}$ and corresponding low degree multiples become too complex if the function has more than 25 variables. In our approach no algorithm is required. The ${\cal AI}$ and low degree multiples can be obtained directly from the given formula.