Analysis and design of stream ciphers
Analysis and design of stream ciphers
Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On Propagation Characteristics of Resilient Functions
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '85 Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Journal of Complexity - Special issue on coding and cryptography
Design of SAC/PC(l) of order k boolean functions and three other cryptographic criteria
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Cryptographically resilient functions
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Linear codes in generalized construction of resilient functions with very high nonlinearity
IEEE Transactions on Information Theory
A construction of resilient functions with high nonlinearity
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The (n, m, t) resilient functions play an important role in the art of information security. In this correspondence, we give a new construction of (n, 1, t) resilient functions with satisfying PC(l) by using linear codes. Moreover, we deeply describe a general method for constructing of (n, m, t) resilient functions which satisfy multiple Cryptographic criteria including of satisfying PC(l), and high nonlinearity, good algebraic degree and so on. Furthermore, We still find these resilient functions are multiple-output plateaued functions. Deeply research on these functions is of great significance on the design and security analysis on the core component of Ciphers.