Show simple item record

dc.contributor.authorCalderini, Marco
dc.contributor.authorVilla, Irene
dc.date.accessioned2021-05-25T10:38:01Z
dc.date.available2021-05-25T10:38:01Z
dc.date.created2021-01-10T15:15:53Z
dc.date.issued2020
dc.identifier.issn1936-2447
dc.identifier.urihttps://hdl.handle.net/11250/2756241
dc.description.abstractThe boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials, one for the upper part of the cipher and one for the lower part, and it exploits the dependency of these two differentials. At Eurocrypt’18, Cid et al. introduced a new tool, called the Boomerang Connectivity Table (BCT), that permits to simplify this analysis. Next, Boura and Canteaut introduced an important parameter for cryptographic S-boxes called boomerang uniformity, that is the maximum value in the BCT. Very recently, the boomerang uniformity of some classes of permutations (in particular quadratic functions) have been studied by Li, Qu, Sun and Li, and by Mesnager, Tang and Xiong. In this paper we further study the boomerang uniformity of some non-quadratic differentially 4-uniform functions. In particular, we consider the case of the Bracken-Leander cubic function and three classes of 4-uniform functions constructed by Li, Wang and Yu, obtained from modifying the inverse functions.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleOn the Boomerang Uniformity of some Permutation Polynomialsen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.rights.holderCopyright 2020 The Authorsen_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.doihttps://doi.org/10.1007/s12095-020-00439-x
dc.identifier.cristin1868338
dc.source.journalCryptography and Communicationsen_US
dc.source.pagenumber1161–1178en_US
dc.identifier.citationCryptography and Communications. 2020, 12, 1161–1178en_US
dc.source.volume12en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal