Vis enkel innførsel

dc.contributor.authorKaleyski, Nikolay Stoyanov
dc.date.accessioned2022-03-22T12:05:57Z
dc.date.available2022-03-22T12:05:57Z
dc.date.created2021-12-03T15:00:03Z
dc.date.issued2021
dc.identifier.issn1936-2447
dc.identifier.urihttps://hdl.handle.net/11250/2986799
dc.description.abstractAn (n,m)-function is a mapping from \({\mathbb {F}_{2}^{n}}\) to \({\mathbb {F}_{2}^{m}}\). Such functions have numerous applications across mathematics and computer science, and in particular are used as building blocks of block ciphers in symmetric cryptography. The classes of APN and AB functions have been identified as cryptographically optimal with respect to the resistance against two of the most powerful known cryptanalytic attacks, namely differential and linear cryptanalysis. The classes of APN and AB functions are directly related to optimal objects in many other branches of mathematics, and have been a subject of intense study since at least the early 90’s. Finding new constructions of these functions is hard; one of the most significant practical issues is that any tentatively new function must be proven inequivalent to all the known ones. Testing equivalence can be significantly simplified by computing invariants, i.e. properties that are preserved by the respective equivalence relation. In this paper, we survey the known invariants for CCZ- and EA-equivalence, with a particular focus on their utility in distinguishing between inequivalent instances of APN and AB functions. We evaluate each invariant with respect to how easy it is to implement in practice, how efficiently it can be calculated on a computer, and how well it can distinguish between distinct EA- and CCZ-equivalence classes.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleInvariants for EA- and CCZ-equivalence of APN and AB functionsen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.rights.holderCopyright 2021 The Author(s)en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1
dc.identifier.doi10.1007/s12095-021-00541-8
dc.identifier.cristin1964504
dc.source.journalCryptography and Communicationsen_US
dc.source.pagenumber995-1023en_US
dc.identifier.citationCryptography and Communications. 2021, 13, 995-1023.en_US
dc.source.volume13en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal