期刊文献+

具有最大代数免疫阶的布尔函数的新构造 被引量:2

New Construction of Boolean Function with Maximum Algebraic Immunity
在线阅读 下载PDF
导出
摘要 针对密码学中布尔函数的构造需求,利用布尔函数的代数标准型,分析了布尔函数不存在次数低于m的非零零化子的充分条件,得到布尔函数达到最大代数免疫阶的条件,从而构造了一类具有最高代数免疫阶的布尔函数,并对所构造函数的平衡性和计数问题进行了分析。 Focusing on algebraic normal form and the construction requirements of Boolean function,the conditions that Boolean function f does not exist annihator with deg(f)≤m are analysed and the sufficient conditions satisfied by Boolean function f with maximum algebraic immunity are obtained.Therefore a class of Boolean functions with optimal algebraic immunity are constructed,and the balanceness and count of the constructed functions are discussed.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期704-708,共5页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家自然科学基金(60573026) 安徽省自然科学研究项目(KJ2010B059) 安徽科技学院引进人才项目(ZRC2008169)资助
关键词 布尔函数 代数标准型 代数免疫阶 Boolean function algebraic normal form algebraic immunity
作者简介 E-mail: caohao2000854@ 163. com
  • 相关文献

参考文献11

  • 1Courtois N T, Klimov A, Patarin J, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equations // Preneel B. Euro2000. Bruges: Springer, 2000 : 392-407.
  • 2Courtois N T. Higher order correlation attacks: XL algorithm and cryptanalysis of Toyocrypt [ EB/OL ].(2003-02-13). http: //eprint. iacr. org/2002/087, pdf.
  • 3Courtois N T, Willi M. Algebraic attacks on stream ciphers with linear feedback // Boneh D. Euro2003. Berlin: Springer, 2003 : 345-359.
  • 4Courtois N T. Algebraic attacks on combiners with memory and several outputs [ EB/OL]. (2004-10-18). http: //eprint. iacr. org/2003/125, pdf.
  • 5Frederik A, Matthiac K. Algebraic attacks on combiners with memory//Boneh D. Advances in Cryptology-Crypto 2003. Berlin: Springer, 2003:162-175.
  • 6张卫国,丁勇,张宁,肖国镇.代数免疫布尔函数的一个特征[J].北京邮电大学学报,2007,30(5):55-57. 被引量:9
  • 7Dalai D K, Maitra S, Sarkar S. Basic theory in construction of boolean functions with maximum possible annihator immunity [EB/OL]. (2005-06-15). http: // eprint, iacr. org/2005/229, pdf.
  • 8莫骄,温巧燕.具有最高代数免疫阶的布尔函数的构造[J].北京邮电大学学报,2009,32(4):73-76. 被引量:5
  • 9曹浩,魏仕民,徐精明.零化多项式与仿射空间关系研究[J].计算机工程,2009,35(20):137-139. 被引量:3
  • 10Cao Hao, Wei Shimin, Zhuo Zepeng. Several algorithms to find annihilators of boolean function // ISDPE2007. Washington: IEEE Computer Society, 2007 : 341-343.

二级参考文献28

  • 1张文英,武传坤,于静之.密码学中布尔函数的零化子[J].电子学报,2006,34(1):51-54. 被引量:16
  • 2Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback [ C ]//Advances in Cryptology-EU- ROCRYPT 2003. Warsaw: Springer Verlag, 2003: 345-359.
  • 3Carlet C, Dalai D K, Gupta K C, et al. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction[J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.
  • 4Carlet C. On the higher order nonlinearities of algebraic immune functions[C]// Proceedings of CRYPTO 2006. Santa Barbara: Springer Verlag, 2006: 584-601.
  • 5Dalai D K, Gupta K C, Maitra S. Results on algebraic immunity for cryptographically significant Boolean functions [ C] // Indocrypt 2004. Chennai : Springer Verlag, 2004 : 92-106.
  • 6Dalai D K, Gupta K C, Maitra S. Cryptographically significant Boolean functions: construction and analysis in terms of algebraic immunity [ C] //Workshop on Fast Software Encryption, FSE 2005. Paris: Springer-Vet- lag, 2005: 98-111.
  • 7Li Na, Qu Long3iang, Qi Wenfeng, et al. On the construction of Boolean functions with optimal algebraic im- munity[J]. IEEE Transactions on Information Theory, 2008, 54(3): 1330-1334.
  • 8Li Na, Qi Wenfeng. Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity[J]. IEEE Transactions on Information Theory, 2006, 52(5) : 2271-2273.
  • 9Li Na, Qi Wenfeng. Construction and analysis of Boolean functions of 2t + 1 variables with maximum algebraic immunity[C]//Proceedings of Asiacrypt 2006. Shanghai: Springer Verlag, 2006: 84-98.
  • 10Courtois N, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback[C]//Proc. of the Int'l Conf. on the Theory and Applications of Cryptographic Techniques. Warsaw, Poland: [s. n.], 2003.

共引文献14

同被引文献14

  • 1Canteaut A. Invited Talk: Open Problems Related to Algebraic Attacks on Stream Ciphers[C]//Proc. of International Conference on Coding and Cryptography. Berlin, Germany: Springer-Verlag, 2005: 120-134.
  • 2Carlet C, Dalai D K, Maitra S, et al. Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity[C]//Proc. of IEEE International Symposium on Information Theory. [S. l.]: IEEE Press, 2006: 734-738.
  • 3Charpin C. Normal Boolean Functions[J]. Journal of Complexity, 2004, 20(2-3): 245-265.
  • 4Zheng Yuliang, Zhang Xiaomo, Imai H. Restriction, Terms and Nonlinearity of Boolean Functions[J]. Theoretical Computer Science, 1999, 226(1-2): 207-223.
  • 5Rizomiliotis P. On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation[J]. IEEE Trans. on Information Theory, 2010, 56(8): 4014-4024.
  • 6Limniotis K, Kolokotronis N, Kalouptsidis N. Modifying Boolean Functions to Ensure Maximum Algebraic Immu- nity[EB/OL]. (2012-03-01). http://ePrint.iacr.org/2012/046.
  • 7张卫国,丁勇,张宁,肖国镇.代数免疫布尔函数的一个特征[J].北京邮电大学学报,2007,30(5):55-57. 被引量:9
  • 8李雪莲,胡予濮.对具有高代数免疫度布尔函数的新型代数攻击[J].西安电子科技大学学报,2009,36(4):702-707. 被引量:4
  • 9莫骄,温巧燕.具有最高代数免疫阶的布尔函数的构造[J].北京邮电大学学报,2009,32(4):73-76. 被引量:5
  • 10陈银冬,陆佩忠.偶数变元代数免疫最优布尔函数的构造方法[J].通信学报,2009,30(11):64-70. 被引量:5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部