Analysis and design of stream ciphers
Analysis and design of stream ciphers
Products of linear recurring sequences with maximum complexity
IEEE Transactions on Information Theory
Fast correlation attacks on stream ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Nonlinearly balanced Boolean functions and their propagation characteristics
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On constructions and nonlinearity of correlation immune functions
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Covering radius of the Reed-Muller code R(1,7)—a simpler proof
Journal of Combinatorial Theory Series A
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Correlation Immune Functions and Their Nonlinearity
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
Proceedings of the 7th IMA International Conference on Cryptography and Coding
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
More correlation-immune and resilient functions over Galois fields and Galois rings
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On the covering radius of R(1, m) in R(3, m)
IEEE Transactions on Information Theory
On the norm and covering radius of the first-order Reed-Muller codes
IEEE Transactions on Information Theory
A Brief Outline of Research on Correlation Immune Functions
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Primitive Polynomials over GF(2) - A Cryptologic Approach
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
New Results on Correlation Immunity
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
On Propagation Characteristics of Resilient Functions
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Nonlinear Vector Resilient Functions
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On Resilient Boolean Functions with Maximal Possible Nonlinearity
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Autocorrelation Properties of Correlation Immune Boolean Functions
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Construction of Cryptographically Important Boolean Functions
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Evolving Boolean Functions Satisfying Multiple Criteria
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Upper Bound on the Number of m-Resilient Boolean Functions
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Efficient Implementation of "Large" Stream Cipher Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Minimum Distance between Bent and Resilient Boolean Functions
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Equivalence classes of Boolean functions for first-order correlation
IEEE Transactions on Information Theory
On the value distributions of Walsh spectrums of quadratic Plateaued functions
Computers and Electrical Engineering
Extending the resynchronization attack
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Boolean functions optimizing most of the cryptographic criteria
Discrete Applied Mathematics
Results on algebraic immunity for cryptographically significant boolean functions
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Construction of 1-resilient boolean functions with very good nonlinearity
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
The rainbow attack on stream ciphers based on maiorana-mcfarland functions
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
On algebraic immunity and annihilators
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Characterisations of extended resiliency and extended immunity of s-boxes
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Finite Fields and Their Applications
Hi-index | 0.06 |
In this paper we investigate the relationship between the nonlinearity and the order of resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for Reed-Muller codes as applied to resilient functions, which also generalizes the well known Xiao-Massey characterization. As a consequence, a nontrivial upper bound on the nonlinearity of resilient functions is obtained. This result coupled with Siegenthaler's inequality leads to the notion of best possible trade-off among the parameters: number of variables, order of resiliency, nonlinearity and algebraic degree. We further show that functions achieving the best possible trade-off can be constructed by the Maiorana-McFarland like technique. Also we provide constructions of some previously unknown functions.