Results 141 to 148 of about 1,097 (148)
Some of the next articles are maybe not open access.

Construction of Boolean Function with Maximum Algebraic Immunity

Advanced Materials Research, 2012
To resist algebraic attacks, a high algebraic immunity is now an important criteria for Boolean functions used in stream ciphers. In recent years, several constructions of Boolean functions with maximum algebraic immunity (MAI) have been investigated. In this survey paper, we review the recent constructions of Boolean functions with MAI, and classify ...
Xiao Wen Xiong, Ai Guo Wei, Kai Yin
openaire   +1 more source

Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks

2006
We show in this paper how to apply well known methods from sparse linear algebra to the problem of computing the immunity of a Boolean function against algebraic or fast algebraic attacks. For an n-variable Boolean function, this approach gives an algorithm that works for both attacks in O(n2nD) complexity and O(n2n) memory. Here and d corresponds to
openaire   +1 more source

On the Fast Algebraic Immunity of Majority Functions

2019
In different contexts such as filtered LFSR, Goldreich’s PRG, and FLIP stream ciphers, the security of a cryptographic primitive mostly depends on the algebraic properties of one Boolean function. Since the Seventies, more and more efficient attacks have been exhibited in this context, related to more and more general algebraic properties, such as the ...
openaire   +1 more source

A Process Algebra Model of the Immune System

2004
Current models of the immune system have proven capable of reproducing the dynamics of the immune system response. However, they lack of formalisms (including semantics) to understand general laws of immune system behaviour. This paper introduces a process algebra with which we can model the immune system and make this model subjected to formal ...
openaire   +1 more source

On Axtended Algebraic Immunity of Boolean Functions

Journal of Electronics & Information Technology, 2011
Xiao-wen Xiong, Long-jiang Qu, Chao Li
openaire   +1 more source

Home - About - Disclaimer - Privacy