×

Found 91 Documents (Results 1–91)

Complementary dual codes for counter-measures to side-channel attacks. (English) Zbl 1398.94209

Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international castle meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 97-105 (2015).
MSC:  94B05 94B15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic decomposition for probing security. (English) Zbl 1375.94108

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 742-763 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On o-equivalence of Niho bent functions. (English) Zbl 1400.94199

Koç, Çetin Kaya (ed.) et al., Arithmetic of finite fields. 5th international workshop, WAIFI 2014, Gebze, Turkey, September 27–28, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-319-16276-8/pbk). Lecture Notes in Computer Science 9061, 155-168 (2015).
MSC:  94C10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. (English) Zbl 1316.68010

Lecture Notes in Computer Science 9084. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). xxv, 375 p. (2015).
PDFBibTeX XMLCite
Full Text: DOI

New construction of differentially 4-uniform bijections. (English) Zbl 1347.94024

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 22-38 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Correlation-immune Boolean functions for leakage squeezing and rotating S-box masking against side channel attacks. (English) Zbl 1355.94050

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 70-74 (2013).
MSC:  94A60 94A62 94D10
PDFBibTeX XMLCite
Full Text: DOI
[Ball, L. Simeon; Blake, Ian; Blokhuis, Aart; Cioaba, Sebastian M.; Colbourn, Charles J.; Ding, Jintai; Dinitz, Jeffrey H.; Dumas, Jean-Guillaume; Ebert, Gary; Effinger, Gove; Enge, Andreas; Fan, Haining; Gong, Guang; Goss, David; Gupta, Kishan Chand; Hasan, M. Anwarul; Hinkelmann, Franziska; Hirschfeld, James W. P.; Huffman, W. Cary; Jedwab, Jonathan; Jungnickel, Dieter; Laubenbacher, Reinhard; Litsyn, Simon; Menezes, Alfred; Mullen, Gary L.; Murty, Kumar; Murty, M. Ram; Niederreiter, Harald; Pernet, Clément; Pott, Alexander; Roetteler, Martin; Schmidt, Kai-Uwe; Stevens, Brett; Storme, Leo; Takeshita, Oscar; Thas, Joseph A.; Thériault, Nicolas; Wan, Zhe-Xian; Winterhof, Arne; Gow, Roderick; Panario, Daniel; Thomson, David; Yucas, Joseph L.; Kyuregyan, Melsik; Ahmadi, Omran; Cohen, Stephen D.; Hou, Xiang-dong; Voloch, Jose Felipe; Gao, Shuhong; Liao, Qunying; Hachenberger, Dirk; Evans, Ronald J.; Rojas-Leon, Antonio; Ostafe, Alina; Garaev, Moubariz Z.; Fitzgerald, Robert; Castro, Francis; Rubio, Ivelisse; Lidl, Rudolf; Zieve, Michael E.; Carlet, Claude; Charpin, Pascale; Kholosha, Alexander; Coulter, Robert; Wang, Qiang; Fried, Michael D.; McGuire, Gary; Helleseth, Tor; Meidl, Wilfried; Shparlinski, Igor; Doche, Christophe; Giesbrecht, Mark; von zur Gathen, Joachim; Kaltofen, Erich; Lecerf, Gregoire; Odlyzko, Andrew; de Smit, Bart; Lenstra, Hendrik; Silverman, Joseph; Bernstein, Daniel J.; Lange, Tanja; Jacobson, Michael John jun.; Scheidler, Renate; Garcia, Arnaldo; Stichtenoth, Henning; Fu, Lei; Blache, Regis; Wan, Daqing]

Handbook of finite fields. (English) Zbl 1319.11001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7378-6/hbk; 978-1-4398-7382-3/ebook). xxxv, 1033 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Leakage squeezing of order two. (English) Zbl 1295.94031

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 120-139 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher-order masking schemes for S-boxes. (English) Zbl 1312.94037

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 366-384 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimal first-order masking with linear and non-linear bijections. (English) Zbl 1291.94123

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 360-377 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CCZ-equivalence of single and multi output Boolean functions. (English) Zbl 1206.94055

McGuire, Gary (ed.) et al., Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, Ireland, July 13–17, 2009. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4786-2/pbk). Contemporary Mathematics 518, 43-54 (2010).
MSC:  94A60 11T71
PDFBibTeX XMLCite

Sequences and their applications – SETA 2010. 6th international conference, Paris, France, September 13–17, 2010. Proceedings. (English) Zbl 1194.94017

Lecture Notes in Computer Science 6338. Berlin: Springer (ISBN 978-3-642-15873-5/pbk). x, 465 p. (2010).
MSC:  94-06 94A55 00B25
PDFBibTeX XMLCite
Full Text: DOI

An infinite class of balanced vectorial Boolean functions with optimum algebraic immunity and good nonlinearity. (English) Zbl 1248.94060

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). Lecture Notes in Computer Science 5557, 1-11 (2009).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

A method of construction of balanced functions with optimum algebraic immunity. (English) Zbl 1160.94009

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 25-43 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations (invited paper). (English) Zbl 1206.94059

Golomb, Solomon W. (ed.) et al., Sequences and their applications – SETA 2008. 5th international conference, Lexington, KY, USA, September 14–18, 2008 Proceedings. Berlin: Springer (ISBN 978-3-540-85911-6/pbk). Lecture Notes in Computer Science 5203, 345-367 (2008).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. (English) Zbl 1206.94060

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 425-440 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial covering sequences: a method for designing classes of cryptographic functions. (English) Zbl 1207.94049

Chaumine, Jean (ed.) et al., Algebraic geometry and its applications. Dedicated to Gilles Lachaud on his 60th birthday. Proceedings of the first SAGA conference, Papeete, France, May 7–11, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-279-342-3/hbk). Series on Number Theory and Its Applications 5, 366-387 (2008).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Generalized correlation analysis of vectorial Boolean functions. (English) Zbl 1186.94429

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 382-398 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Arithmetic of finite fields. First international workshop, WAIFI 2007, Madrid, Spain, June 21–22, 2007. Proceedings. (English) Zbl 1121.11002

Lecture Notes in Computer Science 4547. Berlin: Springer (ISBN 978-3-540-73073-6/pbk). xi, 355 p. (2007).
MSC:  11-06 11Txx 00B25
PDFBibTeX XMLCite
Full Text: DOI

On immunity profile of Boolean functions. (English) Zbl 1152.94408

Gong, Guang (ed.) et al., Sequences and their applications – SETA 2006. 4th international conference, Beijing, China, September 24–28, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-44523-4/pbk). Lecture Notes in Computer Science 4086, 364-375 (2006).
MSC:  94A60 06E30 94C10
PDFBibTeX XMLCite
Full Text: DOI

Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. (English) Zbl 1140.94320

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 147-164 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the higher order nonlinearities of algebraic immune functions. (English) Zbl 1129.94015

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 584-601 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On bent and highly nonlinear balanced/resilient functions and their algebraic immunities. (English) Zbl 1125.94014

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 1-28 (2006).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

On highly nonlinear S-boxes and their inability to thwart DPA attacks. (English) Zbl 1153.94359

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 49-62 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks and decomposition of Boolean functions. (English) Zbl 1122.94041

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 474-491 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On a new notion of nonlinearity relevant to multi-output pseudo-random generators. (English) Zbl 1081.94017

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 291-305 (2004).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Vectorial functions and covering sequences. (English) Zbl 1119.94006

Mullen, Gary L. (ed.) et al., Finite fields and applications. 7th international conference, \({\mathbb{F}}_{q^7}\), Toulouse, France, May 5–9, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21324-4/pbk). Lecture Notes in Computer Science 2948, 215-248 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite

On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions. (English) Zbl 1029.94023

Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13-17, 2001. London: Springer. Discrete Mathematics and Theoretical Computer Science. 131-144 (2002).
MSC:  94A60 06E30
PDFBibTeX XMLCite

An upper bound on the number of \(m\)-resilient Boolean functions. (English) Zbl 1065.94541

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 484-496 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction. (English) Zbl 1026.94518

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 549-564 (2002).
MSC:  94A55 68P25 94A60 94C10
PDFBibTeX XMLCite
Full Text: Link

On cryptographic complexity of Boolean functions. (English) Zbl 1021.94524

Mullen, Gary L. (ed.) et al., Finite fields with applications to coding theory, cryptography and related areas. Proceedings of the 6th international conference on finite fields and applications, Oaxaca, México, May 21-25, 2001. Berlin: Springer. 53-69 (2002).
MSC:  94A60 06E30
PDFBibTeX XMLCite

Bent, resilient functions and the numerical normal form. (English) Zbl 1001.06009

Barg, Alexander (ed.) et al., Codes and association schemes. DIMACS workshop, DIMACS Center, Princeton, NJ, USA, November 9-12, 1999. Providence, RI: AMS, American Mathematical Society. DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 56, 87-96 (2001).
MSC:  06E30 11T71 94A60
PDFBibTeX XMLCite

On generalized bent and \(q\)-ary perfect nonlinear functions. (English) Zbl 1010.94549

Jungnickel, Dieter (ed.) et al., Finite fields and applications. Proceedings of the fifth international conference on finite fields and applications \(F_q5\), University of Augsburg, Germany, August 2-6, 1999. Berlin: Springer. 81-94 (2001).
MSC:  94A55 11T30 94A60
PDFBibTeX XMLCite

Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions. (English) Zbl 1082.94510

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 507-522 (2000).
MSC:  94A60 06E30
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software