Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Constructions of bent functions and difference sets
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A study of correlation-immune, resilient and related cryptographic functions
A study of correlation-immune, resilient and related cryptographic functions
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curves and Resilient Functions
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Bounds for Resilient Functions and Orthogonal Arrays
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
The bit extraction problem or t-resilient functions
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
SFCS '92 Proceedings of the 33rd Annual Symposium on Foundations of Computer Science
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Cryptographically resilient functions
IEEE Transactions on Information Theory
A Brief Outline of Research on Correlation Immune Functions
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Improved Construction of Nonlinear Resilient S-Boxes
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The rainbow attack on stream ciphers based on maiorana-mcfarland functions
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Generalized correlation analysis of Vectorial Boolean functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.00 |
In this paper we provide a new generalized construction method of highly nonlinear t-resilient functions, F : F2n → F2m. The construction is based on the use of linear error correcting codes together with multiple output bent functions. Given a linear [u, m, t + 1] code we show that it is possible to construct n-variable, m-output, t-resilient functions with nonlinearity 2n-1 - 2⌈n+u-m-1/2⌉ for n ≥ u + 3m. The method provides currently best known nonlinearity results.