• Cryptographically strong permutations from the butterfly structure 

      Li, Kangquan; Li, Chunlei; Helleseth, Tor; Qu, Longjiang (Journal article; Peer reviewed, 2021)
      Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as ...
    • Differentially low uniform permutations from known 4-uniform functions 

      Calderini, Marco (Journal article; Peer reviewed, 2021)
      Functions with low differential uniformity can be used in a block cipher as S-boxes since they have good resistance to differential attacks. In this paper we consider piecewise constructions for permutations with low ...
    • Generalized isotopic shift construction for APN functions 

      Budaghyan, Lilya; Calderini, Marco; Carlet, Claude Michael; Coulter, Robert; Villa, Irene (Journal article; Peer reviewed, 2021)
      In this work we give several generalizations of the isotopic shift construction, introduced recently by Budaghyan et al. (IEEE Trans Inform Theory 66:5299–5309, 2020), when the initial function is a Gold function. In ...
    • Partially APN functions with APN-like polynomial representations 

      Budaghyan, Lilya; Kaleyski, Nikolay Stoyanov; Riera, Constanza Susana; Stănică, Pantelimon (Journal article; Peer reviewed, 2020)
      In this paper we investigate several families of monomial functions with APN-like exponents that are not APN, but are partially 0-APN for infinitely many extensions of the binary field F2. We also investigate the differential ...
    • Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK 

      Sadeghi, Sadegh; Rijmen, Vincent Stefaan; Bagheri, Nasour (Journal article; Peer reviewed, 2021)
      Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper, we develop an MILP-based ...