Analysis and design of stream ciphers
Analysis and design of stream ciphers
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Nonlinearly balanced Boolean functions and their propagation characteristics
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On constructions and nonlinearity of correlation immune functions
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On cryptographic propagation criteria for Boolean functions
Information and Computation
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
On Propagation Characteristics of Resilient Functions
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On the Correlation Immune Functions and Their Nonlinearity
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Upper Bound on the Number of m-Resilient Boolean Functions
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A Note on the Construction and Upper Bounds of Correlation-Immune Functions
Proceedings of the 6th IMA International Conference on Cryptography and Coding
More correlation-immune and resilient functions over Galois fields and Galois rings
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Design of SAC/PC(l) of order k boolean functions and three other cryptographic criteria
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On cryptographic properties of the cosets of R(1, m)
IEEE Transactions on Information Theory
Modifications of Patterson-Wiedemann functions for cryptographic applications
IEEE Transactions on Information Theory
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Finite Fields and Their Applications
New construction of resilient functions with satisfying multiple cryptographic criteria
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Piecewise Constructions of Bent and Almost Optimal Boolean Functions
Designs, Codes and Cryptography
Best affine and quadratic approximations of particular classes of Boolean functions
IEEE Transactions on Information Theory
On the construction of bent vectorial functions
International Journal of Information and Coding Theory
Efficient computation of the best quadratic approximations of cubic boolean functions
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Call-by-value is dual to call-by-name: reloaded
RTA'05 Proceedings of the 16th international conference on Term Rewriting and Applications
Hi-index | 0.06 |
A practical problem in symmetric cryptography is finding constructions of Boolean functions leading to reasonably large sets of functions satisfying some desired cryptographic criteria. The main known construction, called Maiorana-McFarland, has been recently extended. Some other constructions exist, but lead to smaller classes of functions. Here, we study more in detail the nonlinearities and the resiliencies of the functions produced by all these constructions. Further we see how to obtain functions satisfying the propagation criterion (among which bent functions) with these methods, and we give a new construction of bent functions based on the extended Maiorana-McFarland's construction.