Introduction to algorithms
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Designs, Codes and Cryptography
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Information Security and Cryptology --- ICISC 2008
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
Constructing symmetric boolean functions with maximum algebraic immunity
IEEE Transactions on Information Theory
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Constructions of cryptographically significant boolean functions using primitive polynomials
IEEE Transactions on Information Theory
On extended algebraic immunity
Designs, Codes and Cryptography
IEEE Transactions on Information Theory
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Open problems related to algebraic attacks on stream ciphers
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
On the algebraic immunity of symmetric boolean functions
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Cryptography and Communications
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
IEEE Transactions on Information Theory
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
IEEE Transactions on Information Theory
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables
IEEE Transactions on Information Theory
On the Construction of Boolean Functions With Optimal Algebraic Immunity
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The algebraic immunity of cryptographic Boolean functions with odd number of variables is studied in this paper. Proper modifications of functions with maximum algebraic immunity are proved that yield new functions whose algebraic immunity is also maximum. Several results are provided for both the multivariate and univariate representation, and their applicability is shown on known classes of Boolean functions. Moreover, new efficient algorithms to produce functions of guaranteed maximum algebraic immunity are developed, which further extend and generalize well-known constructions in this area. It is shown that high nonlinearity as well as good behavior against fast algebraic attacks are also achievable in several cases.