共查询到20条相似文献,搜索用时 474 毫秒
1.
2.
3.
4.
5.
证明了代数次数为 的偶变元平衡旋转对称布尔函数不存在非零线性结构这个公开问题,给出了代数次数为 的奇变元旋转对称布尔函数不存在非零线性结构这个公开问题成立的充分条件和不成立的必要条件。 相似文献
6.
Some properties of rotation symmetric orbits were proposed in n dimensional vector space over finite field of characteristic 2,a matrix on the distributions of number pairs such as 00,01 and 11 was defined,and a new characterization of 2-resilient rotation symmetric functions was introduced.Constructions of rotation symmetric 2-resilient Boolean functions with 4t-1 number of variables were presented by modifying the support of the linear rotation symmetric functions,such as f0(x)=x1+x2+…+xn,where n=4t-1.At last,an example was demonstrated to introduce the spirit of the proposed method to construct 2-resilient rotation symmetric functions with 4t-1 number of variables. 相似文献
7.
From the motivation of algebraic attacks on stream and block ciphers,the concept of algebraic immunity(AI) of a Boolean function was introduced and studied extensively.High algebraic immunity is a necessary condition for resisting algebraic attacks.In this paper,we give some lower bounds on the algebraic immunity of Boolean functions.The results are applied to give lower bounds on the AI of symmetric Boolean functions and rotation symmetric Boolean functions.Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value「n/2」are constructed. 相似文献
8.
9.
10.
Muxiang Zhang 《Journal of Cryptology》2000,13(3):301-314
The maximum correlation of a Boolean function to all Boolean functions of a subset of its input variables is investigated.
A relationship is derived between the maximum correlation and the mutual information between the output of a balanced Boolean
function and a subset of its random input variables. For bent functions (which are never balanced), both the mutual information
and the maximum correlation are bounded and shown to be small in a strong sense.
Received 14 February 1996 and revised 15 January 2000 Online publication 19 May 2000 相似文献
11.
多输出前馈函数的一种相关分析方法 总被引:1,自引:0,他引:1
本文提出了分析多输出前馈网络的一种方法,该方法的基本思想是收集输入信息在多个输出端上的信息泄漏,从而达到更充分地利用所有泄漏的信息的目的。作为应用,利用文中给出的方法分析了一类重要的多输出前馈网络一多输出Bent函数,并用一个具体实例说明了这种方法的全过程。 相似文献
12.
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction 总被引:13,自引:0,他引:13
Carlet C. Dalai D.K. Gupta K.C. Maitra S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(7):3105-3121
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input. 相似文献
13.
14.
15.
次数最大的平衡相关免疫函数的构造 总被引:1,自引:0,他引:1
Maitra和Sarkar于1999年提出了一种递归构造n元平衡相关免疫布尔函数的方法。该文给出了一种新的递归构造方法,构造出非线性度很高的n元m阶n- m-1次的平衡相关免疫函数。与原构造方法相比,该文构造方法得到的函数性质相同,数量更大。 相似文献
16.
Jiun-Wei Horng 《Microelectronics Journal》2011,42(5):693-700
Three current-mode universal biquadratic filters each with five input terminals and one output terminal are presented. The first proposed circuit uses three multi-output second-generation current conveyors, two grounded capacitors and three resistors. This circuit offers the following advantageous features: orthogonal controllability of resonance angular frequency and quality factor, high output impedance, the versatility to synthesize all standard filter types without component matching condition and using grounded capacitors. The second proposed circuit uses three multi-output second-generation current conveyors, two grounded capacitors and two resistors. This circuit offers the following advantageous features: using minimum passive components, high output impedance, the versatility to synthesize all standard filter types without component matching condition and using grounded capacitors. The third proposed circuit uses three multi-output second-generation current conveyors, two grounded capacitors and three grounded resistors. This circuit offers the following advantageous features: the versatility to synthesize all standard filter types, high output impedance and using only grounded passive components. Each of the proposed circuits can get five kinds of filter functions by using only one current input signal. 相似文献
17.
18.
The main construction for resilient functions uses linear errorcorrecting codes; a resilient function constructed in this way is said to be linear. It has been conjectured that if a resilient function exists, then a linear function with the same parameters exists. In this note we construct infinite classes of nonlinear resilient functions from the Kerdock and Preparata codes. We also show that linear resilient functions having the same parameters as the functions that we construct from the Kerdock codes do not exist. Thus, the aforementioned conjecture is disproved.kResearch supported by NSF Grant CCR-9121051. 相似文献
19.
20.
Fernandez-Anaya G. Martinez-Garcia J.C. Kucera V. Aguilar-George D. 《Circuits and Systems II: Express Briefs, IEEE Transactions on》2004,51(5):222-227
The preservation of some control-oriented positive real properties (passivity, positivity, bounded realness, as well as input-output behavior) in multi-input multi-output transfer functions is studied, when performing substitutions (of the complex Laplace variable s) by a particular class of rational strictly positive real (SPR) functions, the so-called SPR functions of zero relative degree (SPR0 functions). We also consider here the preservation of stability properties of a class of unforced linear time-invariant systems with memoryless (possibly time-varying nonlinear) input depending on the system output. 相似文献