Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (6): 237-250.doi: 10.19665/j.issn1001-2400.20230416
• Cyberspace Security • Previous Articles
Received:
2023-03-21
Online:
2023-12-20
Published:
2024-01-22
CLC Number:
LIU Huan, WU Gaofei. Several classes of cryptographic Boolean functions with high nonlinearity[J].Journal of Xidian University, 2023, 50(6): 237-250.
"
构造方法[ | 条件 | |
---|---|---|
f为Z8上的广义 | f(x,y)=4g(x)+(4h(x)+4g(x))y | 当g,h为negabent函数 |
negabent函数 | f(x,y)=4g(x)+(4h(x)+2g(x))y | 当g,h |
f为Z16上的广义 | f(x,y)=8g(x)+(8h(x)+8k(x)+8g(x))y | 当g,h |
negabent函数 | f(x,y)=8g(x)+(8h(x)+8k(x)+4g(x))y | 当g,g 且 |
f(x,y,z)=8g(x)+(8h(x)+4)y+(8k(x)+4)z+ (8l(x)+4)(1+y)(1+z)-4yz | 当g negabent函数,且 |
[1] |
ROTHAUS O S. On “Bent” Functions[J]. Journal of Combinatorial Theory,Series A, 1976, 20(3):300-305.
doi: 10.1016/0097-3165(76)90024-8 |
[2] | PARKER M G, POTT A. On Boolean Functions Which Are Bent and Negabent[M]. Heidelberg: Springer, 2007:9-23. |
[3] | 何业锋, 马文平. 一类具有高非线性度的密码函数[J]. 西安电子科技大学学报, 2010, 37(6):1107-1110. |
HE Yefeng, MA Wenping. One Class of Highly Nonlinear Cryptographic Functions[J]. Journal of Xidian University, 2010, 37(6):1107-1110. | |
[4] | SCHMIDT K U, PARKER M G, POTT A. Negabent Functions in the Maiorana-McFarland Class[C]// Sequences and Their Applications-SETA 2008:5203.Heidelberg:Springer, 2008:390-402. |
[5] | GANGOPADHYAY S, CHATURVEDI A. A New Class of Bent-Negabent Boolean Functions[J]. IACR Cryptology ePrint Archive, 2010, 2010:597. |
[6] |
SU W, POTT A, TANG X. Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree[J]. IEEE transactions on information theory, 2013, 59(6):3387-3395.
doi: 10.1109/TIT.2013.2245938 |
[7] |
ZHANG F, WEI Y, PASALIC E. Constructions of Bent-Negabent Functions and Their Relation to the Completed Maiorana-McFarland Class[J]. IEEE Transactions on Information Theory, 2015, 61(3):1496-1506.
doi: 10.1109/TIT.2015.2393879 |
[8] |
MANDAL B, MAITRA S, STǍNICǍ P. On the Existence and Non-Existence of Some Classes of Bent-Negabent Functions[J]. Applicable Algebra in Engineering Communication and Computing, 2022, 33(3):237-260.
doi: 10.1007/s00200-020-00444-w |
[9] |
PASALIC E, KUDIN S, POLUJAN A, et al. Vectorial Bent-Negabent Functions—Their Constructions and Bounds[J]. IEEE Transactions on Information Theory, 2023, 69(4):2702-2712.
doi: 10.1109/TIT.2022.3226571 |
[10] |
STǍNICǍ P. On Weak and Strong 2k-bent Boolean Functions[J]. IEEE Transactions on Information Theory, 2016, 62(5):2827-2835.
doi: 10.1109/TIT.2016.2539971 |
[11] |
TANG C, XIANG C, QI Y, et al. Complete Characterization of Generalized Bent and 2k-bent Boolean Functions[J]. IEEE Transactions on Information Theory, 2017, 63(7):4668-4674.
doi: 10.1109/TIT.2017.2686987 |
[12] | WANG L, YU L, ZHUO Z. Further Results on 2k-bent Functions[J]. International Journal of Electronics and Information Engineering, 2021, 13(2):38-46. |
[13] | 周宇, 陈智雄, 卓泽朋, 等. (n,m)函数抗差分功耗攻击指标的研究综述[J]. 西安电子科技大学学报, 2021, 48(1):50-60. |
ZHOU Yu, CHEN Zhixiong, ZHUO Zepeng, et al. Survey of Results of(n,m)-Functions against Differential Power Attack[J]. Journal of Xidian University, 2021, 48(1):50-60. | |
[14] | WU G, LI N, ZHANG Y, et al. Several Classes of Negabent Functions over Finite Fields[J]. Science China Information Sciences, 2018, 61(3):1-3. |
[15] |
ZHOU Y, QU L. Constructions of Negabent Functions over Finite Fields[J]. Cryptography and Communications, 2017, 9(2):165-180.
doi: 10.1007/s12095-015-0167-0 |
[16] |
XIE X, LI N, ZENG X Y, et al. Several Classes of Bent Functions over Finite Fields[J]. Designs,Codes and Cryptography, 2022, 91(2):309-332.
doi: 10.1007/s10623-022-01109-0 |
[17] | 肖艳. 奇变元semibent-negabent函数的构造[D]. 湖北: 湖北大学, 2017. |
[18] |
YANG Z Y, KE P H, CHEN Z X. New Secondary Constructions of Generalized Bent Functions[J]. Chinese Journal of Electronics, 2021, 30(6):1022-1029.
doi: 10.1049/cje2.v30.6 |
[19] | MANDAL B, GANGOPADHYAY A K. A Note on Generalization of Bent Boolean Functions[J]. Advances in Mathe-matics of Communications, 2021, 15(2):329. |
[20] | CALDERÓN-GÓMEZ J E, MEDINA L A, MOLINA-SALAZAR C. Short Cycle Rotation Boolean Functions:Generators and Count[C]// 2022 Fall Eastern Sectional Meeting.Seoul:AMS, 2022:1-12. |
[21] |
MEDINA L A, SEPÚLVEDA L B, SERNA-RAPELLO C A. Walsh-Hadamard Transforms of Generalized p-ary Functions and C-finite Sequences[J]. Discrete Applied Mathematics, 2022, 315:86-96.
doi: 10.1016/j.dam.2022.03.016 |
[22] | CHATURVEDI A, GANGOPADHYAY A K. On Generalized Nega-Hadamard Transform[C]// International Conference on Heterogeneous Networking for Quality.Reliability,Security and Robustness:115.Heidelberg:Springer, 2013:771-777. |
[23] |
KAUR R, SHARMA D. Results on Generalized Negabent Functions[J]. Notes on Number Theory and Discrete Mathematics, 2018, 24(4):38-44.
doi: 10.7546/nntdm |
[24] | HODŽIĆ S, PASALIC E. Generalized Bent Functions-Some General Construction Methods and Related Necessary and Sufficient Conditions[J]. Cryptography & Communications, 2015, 7(4):469-483. |
[25] | 郑连清, 张串绒, 董庆宽. 布尔函数非线性度界的问题[J]. 西安电子科技大学学报, 2003(2):281-283. |
ZHENG Lianqing, ZHANG Cuanrong, DONG Qingkuan, et al. Study of Nonlinearity Bounds of Boolean Functions[J]. Journal of Xidian University, 2003(2):281-283. | |
[26] | MEIDL W, POLUJAN A A, POTT A. Linear Codes and Incidence Structures of Bent Functions and Their Generalizations[J]. Discrete Mathematics, 2023, 346(1):113-157. |
[27] |
MESNAGER S. Several New Infinite Families of Bent Functions and Their Duals[J]. IEEE Transactions on Information Theory, 2014, 60(7):4397-4407.
doi: 10.1109/TIT.2014.2320974 |
[28] |
HODŽIĆ S, PASALIC E, WEI Y. A General Framework for Secondary Constructions of Bent and Plateaued Functions[J]. Designs,Codes and Cryptography, 2020, 88(10):2007-2035.
doi: 10.1007/s10623-020-00760-9 |
[29] |
CHAABANE S, GHATTASSI A, MENSI K, et al. GIS-Based Multi-Criteria Analysis of an Eco-Innovative APOC Wastewater Treatment and Reuse System for Irrigation Purposes in the Rural Locality of Bent Saidane(NE Tunisia)[J]. Euro-Mediterranean Journal for Environmental Integration, 2022, 7(4):497-510.
doi: 10.1007/s41207-022-00329-z |
[30] |
GADOULEAU M, MARIOT L, PICEK S. Bent Functions in the Partial Spread Class Generated by Linear Recurring Sequences[J]. Designs,Codes and Cryptography, 2022, 91(1):63-82.
doi: 10.1007/s10623-022-01097-1 |
[31] |
BAPIĆ A, PASALIC E, ZHANG F R, et al. Constructing New Superclasses of Bent Functions from Known Ones[J]. Cryptography and Communications, 2022, 14(6):1229-1256.
doi: 10.1007/s12095-022-00566-7 |
[32] | 冯登国. 浅析Xiao-Massey定理的意义和作用[J]. 西安电子科技大学学报, 2021, 48(1):7-13. |
FENG Dengguo. On the Significance and Function of the Xiao-Massey Theorem[J]. Journal of Xidian University, 2021, 48(1):7-13. | |
[33] | STǍNICǍ P, GANGOPADHYAY S, CHATURVEDI A, et al. Nega-Hadamard Transform,Bent and Negabent Functions[C]// International Conference on Sequences and Their Applications.Sequences and Their Applications-SETA 2010:6338.Heidelberg:Springer, 2010:359-372. |
[34] |
CHATURVEDI A, GANGOPADHYAY S, STǍNICǍ P, et al. Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform[J]. IEEE Transactions on Information Theory, 2012, 58(6):4064-4072.
doi: 10.1109/TIT.2012.2186785 |
[1] | FENG Dengguo. On the significance and function of the Xiao-Massey theorem [J]. Journal of Xidian University, 2021, 48(1): 7-13. |
[2] | ZHOU Yu,CHEN Zhixiong,ZHUO Zepeng,DU Xiaoni. Survey of results of (n,m)-functions against differential power attack [J]. Journal of Xidian University, 2021, 48(1): 50-60. |
[3] | ZHAO Yongbin;HU Yupu;JIA Yanyan. New design of LFSR based stream ciphers to resist power attack [J]. J4, 2013, 40(3): 172-179+200. |
[4] | HE Ye-feng;MA Wen-ping. One class of highly nonlinear cryptographic functions [J]. J4, 2010, 37(6): 1107-1110. |
[5] | LIU Fu-yun;XIAO Hong;XIAO Guo-zhen. Research on finding annihilators of Boolean functions based the algebraic normal form fast transformations [J]. J4, 2009, 36(5): 890-895. |
[6] | LI Xue-lian;HU Yu-pu. Algebraic attack on symmetric Boolean functions with a high algebraic immunity [J]. J4, 2009, 36(4): 702-707. |
[7] |
CHEN Jie;HU Yu-pu;WEI Yong-zhuang.
A new fast algorithm for constructing depressed functions |
[8] |
LIU Jing-wei;WEI Bao-dian;Lü Ji-qiang;WANG Xin-mei.
Analysis of the cryptographic properties of the AES S-box [J]. J4, 2004, 31(2): 255-259. |
[9] |
ZHENG Lian-qing1;ZHANG Chuan-rong1;2;DONG Qing-kuan2;FU Xiao-tong2;XIAO Guo-zhen2.
Study of nonlinearity bounds of Boolean functions [J]. J4, 2003, 30(2): 281-283. |
|