Enumerating Boolean functions of cryptog
โ
Chris Mitchell
๐
Article
๐
1990
๐
Springer
๐
English
โ 803 KB
In this paper we describe applications of functions from GF(2) m onto GF(2)" in the design of encryption algorithms. If such a function is to be useful it must satisfy a set of criteria, the actual definition of which depends on the type of encryption technique involved. This in turn means that it i