• No results found

boolean functions

Recent  Results  on  Balanced  Symmetric  Boolean  Functions

Recent Results on Balanced Symmetric Boolean Functions

... symmetric boolean functions up to 128 ...symmetric functions of degree less than or equal to 7(excluding the trivial cases) only exist for eight variables ...balanced functions seems to be ...

9

The Complexity of Boolean Functions   Ingo Wegener pdf

The Complexity of Boolean Functions Ingo Wegener pdf

... of Boolean functions f n ∈ B n may be computed by (a sequence of) circuits while not all sequences f n ∈ B n can be computed by a computer or a Turing ...

469

Minimization of Boolean Functions Using Genetic Algorithm

Minimization of Boolean Functions Using Genetic Algorithm

... of Boolean functions is one of basic Boolean algebra ...storing Boolean function and basic operations will be ...KEYWORDS: Boolean Functions, SOP, Minimization, Factoring, ...

5

Higher Order-Nonlinearities on Two Classes of
          Boolean Functions

Higher Order-Nonlinearities on Two Classes of Boolean Functions

... two Boolean functions is the number of places where functional value of functions does not ...match. Boolean function of algebraic degree one or less is said to be ...

6

State of the ART in Boolean Functions Cryptographic Assessment

State of the ART in Boolean Functions Cryptographic Assessment

... in Boolean functions representation and cryptographic assessment that should be considered as a starting point in cryptographic algorithm design and analysis, namely block ciphers, stream ciphers, and also ...

7

Linear read once and related Boolean functions

Linear read once and related Boolean functions

... read-once functions are equivalent to 1-decision ...canalyzing functions, as a subclass of canalyzing functions, which appear to be important in biological applica- tions ...canalyzing ...

19

On  Hardware  Implementation  of  Tang-Maitra  Boolean  Functions

On Hardware Implementation of Tang-Maitra Boolean Functions

... of Boolean functions recently introduced by Tang and Maitra (IEEE-TIT 64(1): 393 402, ...of functions has very good cryptographic properties, the exact hardware requirement is an immediate concern as ...

16

Characterizations  on  Algebraic  Immunity  for  Multi-Output  Boolean  Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

... According to Definition 7, we can learn that if the LFSR-based stream cipher is equidistant, there is no need to involve all the initial state bits of the LFSR in the augmented function. For instance, assume the length of ...

14

Boolean  Functions  with  Multiplicative  Complexity 3   and 4

Boolean Functions with Multiplicative Complexity 3 and 4

... Boolean functions can be partitioned into those f for which f (0) = 0 and those f for which f (0) = 1. One set can be mapped bijectively into the other by the transformation g(x) = f (x) + 1. A function f ...

13

On  the  Classification  of  Finite  Boolean  Functions  up  to  Fairness

On the Classification of Finite Boolean Functions up to Fairness

... These functions roughly correspond to the Mil- lionaire’s Problem ...XOR-embedded functions are ...certain functions, any real world adversary can be simulated in the ideal ...finite Boolean ...

20

The  Number  of  Boolean  Functions  with  Multiplicative  Complexity 2

The Number of Boolean Functions with Multiplicative Complexity 2

... 10. Meltem S¨ onmez Turan and Ren´ e Peralta. The multiplicative complexity of boolean functions on four and five variables. In Thomas Eisenbarth and Erdin¸ c ¨ Ozt¨ urk, editors, Lightweight Cryptography ...

19

Linear read once and related Boolean functions

Linear read once and related Boolean functions

... read-once functions. We also showed the existence of positive threshold Boolean functions of n variables, which are not linear read-once and for which the specication number is at its lowest bound, n ...

19

A  note  on  generalized  bent  criteria  for  Boolean  functions

A note on generalized bent criteria for Boolean functions

... of Boolean functions with respect to the action of uni- tary transforms obtained by taking tensor products of the Hadamard kernel, denoted by H , and the nega– Hadamard kernel, denoted by ...

6

Blocks of Monotone Boolean Functions of Rank 5

Blocks of Monotone Boolean Functions of Rank 5

... In [4–6] for the construction of the new codes for cryptosystems proposed to use a monotone Boolean functions (MBFs). It is necessary to carry out the MBFs analysis methods which are insufficiently ...

8

On Boolean functions, symmetric cryptography and algebraic coding theory

On Boolean functions, symmetric cryptography and algebraic coding theory

... Most modern block ciphers are built using components whose cryptographic strength is evaluated in terms of the resistance offered to attacks on the whole cipher. In partic- ular, linear and differential properties of ...

147

Matrix characterization of symmetry groups of boolean functions

Matrix characterization of symmetry groups of boolean functions

... A b s t r a c t . We studies symmetry groups of boolean functions and construct new way of description of this problem in matrices language. Some theorems about constructions of symmetry groups with using ...

13

On  the  Resistance  of  Prime-variable  Rotation  Symmetric  Boolean  Functions  against  Fast  Algebraic  Attacks

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks

... Abstract Boolean functions used in stream ciphers should have many cryptographic properties in order to help resist different kinds of cryptanalytic ...of Boolean functions against fast ...

14

The second-order nonlinearity of a          class of Boolean functions

The second-order nonlinearity of a class of Boolean functions

... When Boolean functions are used in stream or block ciphers their nonlinearities play an important role with respect to the security of the considered ...

6

Boolean  functions  for  homomorphic-friendly  stream  ciphers

Boolean functions for homomorphic-friendly stream ciphers

... our functions in a much more drastic way than for classical stream ciphers, we highlight three families of functions: direct sum of monomials, threshold functions, and XOR-Threshold ...of ...

14

Blocks of Monotone Boolean Functions

Blocks of Monotone Boolean Functions

... In 1897 R. Dedekind has published article [1] in which the number of elements of a free distributive lattice with four generators has been found. The number ψ(n) of elements of a free distributive lattice with n ...

7

Show all 10000 documents...

Related subjects