[BOOK][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

9-variable Boolean functions with nonlinearity 242 in the generalized rotation symmetric class

S Kavut, MD Yücel - Information and Computation, 2010 - Elsevier
We give a new lower bound to the covering radius of the first order Reed–Muller code RM
(1, n), where n∈{9, 11, 13}. Equivalently, we present the n-variable Boolean functions for …

[HTML][HTML] A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions

C Carlet, G Gao, W Liu - Journal of Combinatorial Theory, Series A, 2014 - Elsevier
We study more in detail the relationship between rotation symmetric (RS) functions and
idempotents, in univariate and bivariate representations, and deduce a construction of bent …

Intrinsic resiliency of S-boxes against side-channel attacks–best and worst scenarios

C Carlet, E de Chérisey, S Guilley… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Constructing S-boxes that are inherently resistant against side-channel attacks is an
important problem in cryptography. By using an optimal distinguisher under an additive …

On the lower bounds of the second order nonlinearities of some Boolean functions

S Gangopadhyay, S Sarkar, R Telang - Information Sciences, 2010 - Elsevier
The rth order nonlinearity of a Boolean function is an important cryptographic criterion in
analyzing the security of stream as well as block ciphers. It is also important in coding theory …

Systematic constructions of rotation symmetric bent functions, 2-rotation symmetric bent functions, and bent idempotent functions

S Su, X Tang - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
Rotation symmetric bent functions and their generation two-rotation symmetric bent functions
are two classes of cryptographically significant Boolean functions. However, few …

High-meets-low: construction of strictly almost optimal resilient Boolean functions via fragmentary Walsh spectra

WG Zhang - IEEE Transactions on Information Theory, 2019 - ieeexplore.ieee.org
This paper considers the construction of resilient Boolean functions on an odd number of
variables with strictly almost optimal (SAO) nonlinearity. Through introducing the …

Third-order nonlinearities of a subclass of Kasami functions

R Gode, S Gangopadhyay - Cryptography and Communications, 2010 - Springer
The r th-order nonlinearity, where r≥ 1, of an n-variable Boolean function f, denoted by nl r
(f), is defined as the minimum Hamming distance of f from all n-variable Boolean functions of …

Using easy coefficients conjecture for rotation symmetric Boolean functions

TW Cusick - Information Sciences, 2024 - Elsevier
A Boolean function in n variables is rotation symmetric (RS) if it is invariant under powers of
ρ (x 1,…, xn)=(x 2,…, xn, x 1). An RS function is called monomial rotation symmetric (MRS) if …

Systematic methods of constructing bent functions and 2-rotation symmetric bent functions

S Su - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
In this paper, we first present two systematic constructions of bent functions by modifying the
truth tables of Rothaus's bent function and Maiorana-McFarland's bent function respectively …