首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The lower bound on the number of n-variable balanced symmetric functions over finite fields GF(p) presented by Cusick et al. in [T.W. Cusick, Y. Li, P. Staˇnicaˇ, Balanced symmetric functions over GF(p), IEEE Trans. Inform. Theory 54 (3) (2008) 1304-1307] is improved in this paper. An equivalent characterization is also presented for the general case.  相似文献   

2.
3.
Efficient characteristic set methods for computing zeros of polynomial equation systems in a finite field are proposed. The concept of proper triangular sets is introduced and an explicit formula for the number of zeros of a proper and monic triangular set is given. An improved zero decomposition algorithm is proposed to reduce the zero set of an equation system to the union of zero sets of monic proper triangular sets. The bitsize complexity of this algorithm is shown to be O(ln)O(ln) for Boolean polynomials, where nn is the number of variables and l≥2l2 is the number of equations. We also give a multiplication free characteristic set method for Boolean polynomials, where the sizes of the polynomials occurred during the computation do not exceed the sizes of the input polynomials and the bitsize complexity of algorithm is O(nd)O(nd) for input polynomials with nn variables and degree dd. The algorithms are implemented in the case of Boolean polynomials and extensive experiments show that they are quite efficient for solving certain classes of Boolean equations raising from stream ciphers.  相似文献   

4.
基于研究布尔函数在子空间的限制,得到关于Gbent函数的一个充分必要条件。给出了两类简单的正则的Gbent函数。在此基础上,通过间接构造Bent函数的方法,利用已知的Gbent函数构造出了更多的Gbent函数。  相似文献   

5.
Boolean functions are widely used because they can be used to precisely describe logical circuits. Properties of Boolean functions with respect to their applications to cryptography have been studied, but relationship between Boolean functions are rarely studied. This paper studies the independence of Boolean functions, gives necessary and sufficient conditions for judging whether two given Boolean functions are independent. Some enumeration formulae are given.  相似文献   

6.
The rth order nonlinearity of Boolean functions is an important cryptographic criterion associated with some attacks on stream and block ciphers. It is also very useful in coding theory, since it is related to the covering radii of Reed-Muller codes. This paper tightens the lower bounds of the second order nonlinearity of three classes of Boolean functions in the form f(x)=tr(xd) in n variables, where (1) d=2m+1+3 and n=2m, or (2) , n=2m and m is odd, or (3) d=22r+2r+1+1 and n=4r.  相似文献   

7.
Sarka等人在文献[1]中给出了弹性布尔函数的一种构造方法,利用该方法可以构造出非线性度、弹性阶和代数次数等密码学性质均较理想的奇数元弹性布尔函数。对其构造得到的弹性布尔函数的谱值分布进行了研究,分析了由该方法所构造得到的5元1阶和7元1阶弹性布尔函数的谱值,给出了这两类弹性布尔函数的谱值分布情形,并给出了相应谱值点的计数结果。  相似文献   

8.
A constructive count of rotation symmetric functions   总被引:1,自引:0,他引:1  
In this paper we present a constructive detection of minimal monomials in the algebraic normal form of rotation symmetric Boolean functions (immune to circular translation of indices). This helps in constructing rotation symmetric Boolean functions by respecting the rules we present here.  相似文献   

9.
Recently, S. Müller developed a generalized Atkin algorithm for computing square roots, which requires two exponentiations in finite fields GF(q) when . In this paper, we present a simple improvement to it and the improved algorithm requires only one exponentiation for half of squares in finite fields GF(q) when . Furthermore, in finite fields GF(pm), where and m is odd, we reduce the complexity of the algorithm from O(m3log3p) to O(m2log2p(logm+logp)) using the Frobenius map and normal basis representation.  相似文献   

10.
This work studies consensus strategies for networks of agents with limited memory, computation, and communication capabilities. We assume that agents can process only values from a finite alphabet, and we adopt the framework of finite fields, where the alphabet consists of the integers {0,…,p−1}{0,,p1}, for some prime number pp, and operations are performed modulo pp. Thus, we define a new class of consensus dynamics, which can be exploited in certain applications such as pose estimation in capacity and memory constrained sensor networks. For consensus networks over finite fields, we provide necessary and sufficient conditions on the network topology and weights to ensure convergence. We show that consensus networks over finite fields converge in finite time, a feature that can be hardly achieved over the field of real numbers. For the design of finite-field consensus networks, we propose a general design method, with high computational complexity, and a network composition rule to generate large consensus networks from smaller components. Finally, we discuss the application of finite-field consensus networks to distributed averaging and pose estimation in sensor networks.  相似文献   

11.
Yuan Li 《Information Sciences》2008,178(1):280-286
In this paper, we generalize the recent counting results about rotation symmetric Boolean functions to the rotation symmetric polynomials over finite fields GF(p). By using Möbius function, we obtain some formulas for more general n, the number of variables. Some known formula in Boolean case are simplified.  相似文献   

12.
13.
Set functions appear as a useful tool in many areas of decision making and operations research, and several linear invertible transformations have been introduced for set functions, such as the Möbius transform and the interaction transform. The present paper establish similar transforms and their relationships for bi-set functions, i.e. functions of two disjoint subsets. Bi-set functions have been recently introduced in decision making (bi-capacities) and game theory (bi-cooperative games), and appear to open new areas in these fields.  相似文献   

14.
The (extended) propagation criterion was defined in cryptography in order to analyze the security of cryptographic components with respect to differential cryptanalysis. In this paper, we obtain the spectral characterization of functions satisfying the (extended) propagation criterion of degree l and order k. This important problem was left open since the introduction of these functions more than ten years ago.  相似文献   

15.
n元一阶相关免疫对称函数的构造等价于方程∑Cin-1xi=∑Cin-1xi+1在二元域上的求解。通过求解与其等价的方程C0n-1y0+∑(Cin-1-Ci-1n-1)yi=0构造了一阶相关免疫对称函数,并在两种情形下给出了具体的构造和计数。  相似文献   

16.
Hardware implementation of multiplication in finite field GF(2m) based on sparse polynomials is found to be advantageous in terms of space-complexity as well as the time-complexity. In this paper, we present a new permutation method to construct the irreducible like-trinomials of the form (x + 1)m + (x + 1)n + 1 for the implementation of efficient bit-parallel multipliers. For implementing the multiplications based on such polynomials, we have defined a like-polynomial basis (LPB) as an alternative to the original polynomial basis of GF(2m). We have shown further that the modular arithmetic for the binary field based on like-trinomials is equivalent to the arithmetic for the field based on trinomials. In order to design multipliers for composite fields, we have found another permutation polynomial to convert irreducible polynomials into like-trinomials of the forms (x2 + x + 1)m + (x2 + x + 1)n + 1, (x2 + x)m + (x2 + x)n + 1 and (x4 + x + 1)m + (x4 + x + 1)n + 1. The proposed bit-parallel multiplier over GF(24m) is found to offer a saving of about 33% multiplications and 42.8% additions over the corresponding existing architectures.  相似文献   

17.
魏万银  杜小妮  李芝霞  万韫琦 《计算机科学》2017,44(6):174-176, 188
基于Gray映射和Ding-广义分圆理论,在Z4上构造了一类周期为pq的四元广义分圆序列。在有限域Fr(r≥5为奇素数)上研究了新序列对应的傅里叶谱序列,并依据傅里叶谱序列的重量确定了新序列的线性复杂度。结果表明,新序列具有良好的线性复杂度性质,能够抗击B-M算法的攻击,是密码学意义上性质良好的伪随机序列。  相似文献   

18.
n元m阶相关免疫对称函数的构造等价于方程[i=0n-2Cin-2xi=i=0n-2Cin-2xi+1]在二元域上的求解。通过对该方程及其等价方程解的关系讨论,给出了构造奇数元二阶相关免疫对称函数的算法。  相似文献   

19.
In this note, we present improved upper bounds on the circuit complexity of symmetric Boolean functions. In particular, we describe circuits of size 4.5n+o(n) for any symmetric function of n variables, as well as circuits of size 3n for function.  相似文献   

20.
A deterministic polynomial time algorithm is presented for finding the distinct-degree factorization of multivariate polynomials over finite fields. As a consequence, one can count the number of irreducible factors of polynomials over finite fields in deterministic polynomial time, thus resolving a theoretical open problem of Kaltofen from 1987.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号