Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

C Carlet, DK Dalai, KC Gupta… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It
has been observed that a Boolean function f used as a cryptographic primitive, and …

Search for Boolean functions with excellent profiles in the rotation symmetric class

S Kavut, S Maitra, MD Yucel - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
For the first time Boolean functions on 9 variables having nonlinearity 241 are discovered,
that remained as an open question in literature for almost three decades. Such functions are …

[HTML][HTML] Rotation symmetric Boolean functions—Count and cryptographic properties

P Stănică, S Maitra - Discrete Applied Mathematics, 2008 - Elsevier
Rotation symmetric (RotS) Boolean functions have been used as components of different
cryptosystems. This class of Boolean functions are invariant under circular translation of …

Results on algebraic immunity for cryptographically significant Boolean functions

DK Dalai, KC Gupta, S Maitra - … on Cryptology in India, Chennai, India …, 2005 - Springer
Recently algebraic attack has received a lot of attention in cryptographic literature. It has
been observed that a Boolean function f, interpreted as a multivariate polynomial over GF …

Results on rotation symmetric bent and correlation immune Boolean functions

P Stănică, S Maitra, JA Clark - International Workshop on Fast Software …, 2004 - Springer
Recent research shows that the class of Rotation Symmetric Boolean Functions (RSBFs), ie,
the class of Boolean functions that are invariant under circular translation of indices, is …

[BOK][B] Further constructions of resilient Boolean functions with very high nonlinearity

S Maitra, E Pasalic - 2002 - Springer
One well known method of generating key stream sequences for stream ciphers is to
combine the outputs of several Linear Feedback Shift Registers (LFSR) using a combining …

Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity

DK Dalai, KC Gupta, S Maitra - International Workshop on Fast Software …, 2005 - Springer
Algebraic attack has recently become an important tool in cryptanalysing different stream
and block cipher systems. A Boolean function, when used in some cryptosystem, should be …

On the secondary constructions of resilient and bent functions

C Carlet - Coding, Cryptography and Combinatorics, 2004 - Springer
We first give a survey of the known secondary constructions of Boolean functions, permitting
to obtain resilient functions achieving the best possible trade-offs between resiliency order …

A generic enterprise resource ontology

FG Fadel, MS Fox, M Gruninger - Proceedings of 3rd IEEE …, 1994 - ieeexplore.ieee.org
The complexity of planning and scheduling is determined by the degree to which activities
contend for resources. Accordingly this requires any application to have the ability to reason …