Analysis and design of stream ciphers
Analysis and design of stream ciphers
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Designs, Codes and Cryptography
Nonlinearly balanced Boolean functions and their propagation characteristics
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On constructions and nonlinearity of correlation immune functions
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On Resilient Boolean Functions with Maximal Possible Nonlinearity
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
On the Correlation Immune Functions and Their Nonlinearity
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
More correlation-immune and resilient functions over Galois fields and Galois rings
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On cryptographic properties of the cosets of R(1, m)
IEEE Transactions on Information Theory
Modifications of Patterson-Wiedemann functions for cryptographic applications
IEEE Transactions on Information Theory
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Finite Fields and Their Applications
Journal of Complexity - Special issue on coding and cryptography
Journal of Complexity - Special issue on coding and cryptography
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
Designs, Codes and Cryptography
Discrete Applied Mathematics - Special issue: Coding and cryptography
Discrete Applied Mathematics - Special issue: Coding and cryptography
Constructions of almost optimal resilient Boolean functions on large even number of variables
IEEE Transactions on Information Theory
New constructions for resilient and highly nonlinear boolean functions
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
On the value distributions of Walsh spectrums of quadratic Plateaued functions
Computers and Electrical Engineering
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Geometric and design-theoretic aspects of semibent functions II
Designs, Codes and Cryptography
Call-by-value is dual to call-by-name: reloaded
RTA'05 Proceedings of the 16th international conference on Term Rewriting and Applications
Results on algebraic immunity for cryptographically significant boolean functions
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
The rainbow attack on stream ciphers based on maiorana-mcfarland functions
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A note on vectorial bent functions
Information Processing Letters
Hi-index | 0.06 |
Thanks to a new upper bound, we study more precisely the nonlinearities of Maiorana-McFarland's resilient functions. We characterize those functions with optimum nonlinearities and we give examples of functions with high nonlinearities. But these functions have a peculiarity which makes them potentially cryptographically weak. We study a natural super-class of Maiorana-McFarland's class whose elements do not have the same drawback and we give examples of such functions achieving high nonlinearities.