In this paper we describe applications of functions from GF(2) m onto GF(2)" in the design of encryption algorithms. If such a function is to be useful it must satisfy a set of criteria, the actual definition of which depends on the type of encryption technique involved. This in turn means that it i
โฆ LIBER โฆ
Covering Sequences of Boolean Functions and Their Cryptographic Significance
โ Scribed by C. Carlet; Yu. Tarannikov
- Book ID
- 110332320
- Publisher
- Springer
- Year
- 2002
- Tongue
- English
- Weight
- 135 KB
- Volume
- 25
- Category
- Article
- ISSN
- 0925-1022
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Enumerating Boolean functions of cryptog
โ
Chris Mitchell
๐
Article
๐
1990
๐
Springer
๐
English
โ 803 KB
Further enumerating boolean functions of
โ
Yi XianYang; Baoan Guo
๐
Article
๐
1995
๐
Springer
๐
English
โ 280 KB
Open problems about enumerating Boolean functions of cryptographic significance are (partially) solved in this paper.
Cryptographic Boolean Functions and Appl
โ
Cusick, Thomas W.
๐
Article
๐
2009
๐
Elsevier
๐
English
โ 184 KB
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a
Constructions of Cryptographically Signi
โ
Qichun Wang; Jie Peng; Haibin Kan; Xiangyang Xue
๐
Article
๐
2010
๐
IEEE
๐
English
โ 190 KB
Algebraic immunity for cryptographically
โ
Carlet, C.; Dalai, D.K.; Gupta, K.C.; Maitra, S.
๐
Article
๐
2006
๐
IEEE
๐
English
โ 443 KB
Comments on "Constructions of Cryptograp
โ
Carlet, C.
๐
Article
๐
2011
๐
IEEE
๐
English
โ 248 KB