Results 11 to 20 of about 686 (181)

Hybrid tabu search algorithm for excellent Boolean function [PDF]

open access: yes, 2022
Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation ...
Haojie XU   +3 more
core   +1 more source

Correlation-immunity study of balanced H-Boolean functions [PDF]

open access: yes, 2013
As a novel definition,E-derivative was introduced to study problems that are extremely difficult to handle in the cryptographic system.By using the way of combining derivative with E-derivative and correlation-immunity of H-Boolean functions,the ...
Wei-wei LI
core   +1 more source

Survey on approaches of stream cipher cryptanalysis [PDF]

open access: yes, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Dengguo FENG, Zhaocun ZHOU
core   +1 more source

Improved integral attack——random linear distinguish and key recovery attack [PDF]

open access: yes, 2023
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
core   +1 more source

Extended algebraic immunity of symmetric Boolean function [PDF]

open access: yes, 2014
Boolean functions with optimal algebraic immunity play an important role in stream ciphers.Based on the univariate polynomial representation of Boolean functions,a construction of Boolean functions with maximum extended algebraic immunity (EAI) is ...
Gao-fei WU   +3 more
core   +1 more source

Quantum cryptanalysis of lightweight block cipher Piccolo [PDF]

open access: yes, 2023
By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results ...
Kaibin LI   +3 more
core   +1 more source

SAT-based differential automatic search algorithm using divide-and-conquer strategy and its applications [PDF]

open access: yes, 2023
To improve the efficiency of automatic search, an algorithm for searching the optimal differential characteristics based on SAT model was proposed by combining the divide-and-conquer strategy.The search space was divided into disjoint subsets by using ...
Bin HU, Senpeng WANG, Xiao TAN
core   +1 more source

Construction and analysis of one class of cryptographic functions [PDF]

open access: yes, 2013
A novel class of n+t -variable Boolean functions G (x,y) through adding t variables while concatenating t+ 1 Boolean functions (called basic function) was constructed and the Walsh spectrum and autocorrelation coefficient of G(x,y)were given.The ...
Xu LI, Ya-qun ZHAO, Zhi-hui OU
core   +1 more source

T-D猜想上多输出布尔函数构造 Construction of Vectorial Boolean Function Based on T-D Conjecture

open access: yes, 2014
本文针对基于涂自然等人提出的组合猜想上布尔函数的构造方法和有关结论,将组合猜想和构造方法一般化,并将其推广到多输出布尔函数上去,构造出具有最优代数免疫度的多输出bent函数F,同时通过修改F构造出具有好的非线性度、最优代数度和最优代数免疫度兼具的多输出平衡布尔函数函数。 An improvement has been made on the construction method of Boolean Functions and the relevant conclusions of ...
怡然 陈
semanticscholar   +1 more source

Construction and count of resilient rotation symmetric Boolean functions with prime number variables [PDF]

open access: yes, 2013
The characteristic matrix of the resilient rotation symmetric Boolean functions(RSBF) with prime number va-riables were explored. Some properties about character ic matrix of them were given.
Jiao DU   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy