Analysis and design of stream ciphers
Analysis and design of stream ciphers
Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Structure in the S-boxes of the DES
Proceedings on Advances in cryptology---CRYPTO '86
The strict avalanche criterion: spectral properties of boolean functions and an extended definition
CRYPTO '88 Proceedings on Advances in cryptology
Counting functions satisfying a higher order strict avalanche criterion
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Linear structures in blockciphers
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Constructions of bent functions and difference sets
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Boolean functions satisfying a higher order strict avalanche criterion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Information leakage of boolean functions and its relationship to other cryptographic criteria
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes
Designs, Codes and Cryptography
Covering Sequences of Boolean Functions and Their Cryptographic Significance
Designs, Codes and Cryptography
Highly nonlinear balanced boolean functions with good local and global avalanche characteristics
Information Processing Letters
Protective Data Transformations in ACSs on the Basis of a New Primitive
Automation and Remote Control
Avalanche Characteristics of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
On the Symmetric Property of Homogeneous Boolean Functions
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Propagation Characteristics of Resilient Functions
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Autocorrelation Properties of Correlation Immune Boolean Functions
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Connections among nonlinearity, avalanche and correlation immunity
Theoretical Computer Science - Algorithms,automata, complexity and games
Boolean Functions with Five Controllable Cryptographic Properties
Designs, Codes and Cryptography
Journal of Complexity - Special issue on coding and cryptography
New construction of resilient functions with satisfying multiple cryptographic criteria
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Aperiodic propagation criteria for Boolean functions
Information and Computation
Discrete Applied Mathematics - Special issue: Coding and cryptography
Rotation symmetric Boolean functions-Count and cryptographic properties
Discrete Applied Mathematics
Discrete Applied Mathematics - Special issue: Coding and cryptography
Aperiodic propagation criteria for Boolean functions
Information and Computation
Auto-correlations and new bounds on the nonlinearity of boolean functions
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Design of SAC/PC(l) of order k boolean functions and three other cryptographic criteria
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Boolean functions satisfying higher order propagation criteria
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Enumeration of 9-variable rotation symmetric boolean functions having nonlinearity 240
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
On cross-correlation indicators of an S-box
Frontiers of Computer Science in China
Frequency/Time hopping sequences with large linear complexities
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
New cryptographic applications of boolean function equivalence classes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Complexity-theoretical approaches to the design and analysis of cryptographical boolean functions
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
On boolean functions with generalized cryptographic properties
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Partially perfect nonlinear functions and a construction of cryptographic boolean functions
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Probabilistic algebraic attacks
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Propagation characteristics of x→ x-1 and Kloosterman sums
Finite Fields and Their Applications
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions
Information Processing Letters
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
The autocorrelation distribution of balanced Boolean function
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
The relation between the Walsh-Hadamard transform and the auto-correlation function of Boolean functions is used to study propagation characteristics of these functions. The Strict Avalanche Criterion and the Perfect Nonlinearity Criterion are generalized in a Propagation Criterion of degree k. New properties and constructions for Boolean bent functions are given and also the extension of the definition to odd values of n is discussed. New properties of functions satisfying higher order SAC are derived. Finally a general framework is established to classify functions according to their propagation characteristics if a number of bits is kept constant.