The Judgment of Algebraic Immunity and Resilience of Balanced H Boolean Functions

Article Preview

Abstract:

Using the derivative of the Boolean function and the e-derivative defined by ourselves as main research tools, we study the relationship among e-derivative, algebraic immunity and resilience of balanced H Boolean functions.We get some theorems which connect algebraic immunity, annihilators, resilience, derivative and e-derivative of balanced H Boolean functions together. Besides, we also get the judgment of algebraic immunity and resilience for three classes of balanced Boolean functions by the e-derivative.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

195-200

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] W. Meier, E. Pasalic, C. Carle . Algebraic attacks and decomposition of Boolean functions. In Advances in Cryptology-EUROCRYPT 2004. LNCS 3027, Berlin: Springer-Verlag, 2004. 474-491.

DOI: 10.1007/978-3-540-24676-3_28

Google Scholar

[2] Ding C, Xiao G, Shan W. The stability theory of stream ciphers,. LNCS. Berlin: Springer-Verlag, 1991, vol. 561.

Google Scholar

[3] C. Carlet, Boolean functions for cryptography and error correcting codes, chapter of the monography, in Boolean Models and Methods in Mathematics, Computer Science and Engineering, P. Hammer and Y. Crama, Eds. Cambridge U.K.: Cambridge University Press, 2010, pp.257-397.

DOI: 10.1017/cbo9780511780448.011

Google Scholar

[4] J. Huang, Z. Wang. The relationship between correlation immune and weight of H Boolean functions,. Journal on Communications, Vol. 33(2): 110-118 (2012). (In Chinese).

Google Scholar

[5] Q. Wen, X. Niu , Y. Yang. The Boolean Functions in modern cryptology. Beijing: Science Press (2000).

Google Scholar

[6] G. Xiao, J. Massey. A Spectral Characterization of Correlation-Immune Combining Functions,. IEEE Trans. on Inform. Theory. Vol. 34(3): 569-571(1988).

DOI: 10.1109/18.6037

Google Scholar

[7] S. Li, B. Zeng, Y. Lian, et al. Logical functions in cryptography. Beijing: China National Computer Software and Technology Service Corporation Press (2003).

Google Scholar

[8] Q. Wen, J. Zhang, X. Niu, Y. Yang. "Review of Boolean Functions of Modern Cryptography. Telecommunication Science, Vol. 20(12): 43-46 (2004). (In Chinese).

Google Scholar

[9] W. Li, Z. Wang, J. Huang. The e-derivative of boolean functions and its application in the fault detection and cryptographic system,. Kybernetes, Vol. 40(5-6): 905-911 (2011).

DOI: 10.1108/03684921111142458

Google Scholar

[10] L. He, Z. Wang, W. Li. Algorithm of reducing the balanced H-Boolean function correlation-measure and research on correlation issue. Journal on Communications, Vol. 31(2): 93-99 (2011). (In Chinese).

Google Scholar

[11] Y. Ding, Z. Wang, J. Ye. Initial-value problem of the Boolean function's primary function and its application in cryptographic system,. Kybernetes, Vol. 39(6): 900-906 (2010).

DOI: 10.1108/03684921011046663

Google Scholar