Browsing Faculty of Mathematics and Natural Sciences by Journals "Designs, Codes and Cryptography"
Now showing items 1-10 of 10
-
CCZ-equivalence of bent vectorial functions and related constructions
(Peer reviewed; Journal article, 2011-01-06)We observe that the CCZ-equivalence of bent vectorial functions over F2nFn2 (n even) reduces to their EA-equivalence. Then we show that in spite of this fact, CCZ-equivalence can be used for constructing bent functions ... -
Cryptographically strong permutations from the butterfly structure
(Journal article; Peer reviewed, 2021)Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as ... -
Differentially low uniform permutations from known 4-uniform functions
(Journal article; Peer reviewed, 2021)Functions with low differential uniformity can be used in a block cipher as S-boxes since they have good resistance to differential attacks. In this paper we consider piecewise constructions for permutations with low ... -
Generalized isotopic shift construction for APN functions
(Journal article; Peer reviewed, 2021)In this work we give several generalizations of the isotopic shift construction, introduced recently by Budaghyan et al. (IEEE Trans Inform Theory 66:5299–5309, 2020), when the initial function is a Gold function. In ... -
Gold functions and switched cube functions are not 0-extendable in dimension n > 5
(Journal article; Peer reviewed, 2023)In the independent works by Kalgin and Idrisova and by Beierle, Leander and Perrin, it was observed that the Gold APN functions over \(\mathbb {F}_{2^5}\) give rise to a quadratic APN function in dimension 6 having maximum ... -
Lower bounds on the size of spheres of permutations under the Chebychev distance
(Peer reviewed; Journal article, 2011)Lower bounds on the number of permutations p of {1, 2, . . . , n} satisfying |pi − i| ≤ d for all i are given -
Partially APN functions with APN-like polynomial representations
(Journal article; Peer reviewed, 2020)In this paper we investigate several families of monomial functions with APN-like exponents that are not APN, but are partially 0-APN for infinitely many extensions of the binary field F2. We also investigate the differential ... -
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
(Journal article; Peer reviewed, 2021)Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper, we develop an MILP-based ... -
Simplicity conditions for binary orthogonal arrays
(Journal article; Peer reviewed, 2023)It is known that correlation-immune (CI) Boolean functions used in the framework of side channel attacks need to have low Hamming weights. The supports of CI functions are (equivalently) simple orthogonal arrays, when their ... -
Sparse Boolean equations and circuit lattices
(Peer reviewed; Journal article, 2011)A system of Boolean equations is called sparse if each equation depends on a small number of variables. Finding efficiently solutions to the system is an underlying hard problem in the cryptanalysis of modern ciphers. In ...