首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Yuan Li 《Information Sciences》2008,178(1):280-286
In this paper, we generalize the recent counting results about rotation symmetric Boolean functions to the rotation symmetric polynomials over finite fields GF(p). By using Möbius function, we obtain some formulas for more general n, the number of variables. Some known formula in Boolean case are simplified.  相似文献   

2.
It is shown that nonlinear symmetric functions over finite fields GF(p) have no linear structures other than equal component vectors.  相似文献   

3.
The (extended) propagation criterion was defined in cryptography in order to analyze the security of cryptographic components with respect to differential cryptanalysis. In this paper, we obtain the spectral characterization of functions satisfying the (extended) propagation criterion of degree l and order k. This important problem was left open since the introduction of these functions more than ten years ago.  相似文献   

4.
In this note, we present improved upper bounds on the circuit complexity of symmetric Boolean functions. In particular, we describe circuits of size 4.5n+o(n) for any symmetric function of n variables, as well as circuits of size 3n for function.  相似文献   

5.
A constructive count of rotation symmetric functions   总被引:1,自引:0,他引:1  
In this paper we present a constructive detection of minimal monomials in the algebraic normal form of rotation symmetric Boolean functions (immune to circular translation of indices). This helps in constructing rotation symmetric Boolean functions by respecting the rules we present here.  相似文献   

6.
Studying algebraic immunity of Boolean functions is recently a very important research topic in cryptography. It is recently proved by Courtois and Meier that for any Boolean function of n-variable the maximum algebraic immunity is . We found a large subclass of Maiorana McFarland bent functions on n-variable with a proven low level of algebraic immunity . To the best of our knowledge we provide for the first time a new upper bound for algebraic immunity for a nontrivial class of Boolean functions. We also discuss that this result has some fascinating implications.  相似文献   

7.
The rth order nonlinearity of a Boolean function is an important cryptographic criterion in analyzing the security of stream as well as block ciphers. It is also important in coding theory as it is related to the covering radius of the Reed-Muller code R(r,n). In this paper we deduce the lower bounds of the second order nonlinearities of the following two types of Boolean functions:
1.
with d=22r+2r+1 and , where n=6r.
2.
, where x,yF2t,n=2t,n?6 and i is an integer such that 1?i<t,gcd(2t-1,2i+1)=1.
For some λ, the functions of the first type are bent functions, whereas Boolean functions of the second type are all bent functions, i.e., they possess the maximum first order nonlinearity. It is demonstrated that in some cases our bounds are better than the previously obtained bounds.  相似文献   

8.
The rth order nonlinearity of Boolean functions is an important cryptographic criterion associated with some attacks on stream and block ciphers. It is also very useful in coding theory, since it is related to the covering radii of Reed-Muller codes. This paper tightens the lower bounds of the second order nonlinearity of three classes of Boolean functions in the form f(x)=tr(xd) in n variables, where (1) d=2m+1+3 and n=2m, or (2) , n=2m and m is odd, or (3) d=22r+2r+1+1 and n=4r.  相似文献   

9.
研究了满足严格雪崩准则布尔函数的性质,证明了雪崩布尔函数的汉明重量只能为偶数,并且得到了雪崩布尔函数的汉明重量之集,给出了不同汉明重量的雪崩布尔函数的构造方法。改进了雪崩布尔函数个数的下界。  相似文献   

10.
11.
In this paper, we focus on a generalized complementarity problems over symmetric cone GSCCP(f,g) when the underlying functions f and g are H-differentiable. By introducing the concepts of relatively uniform Cartesian P-property, relatively Cartesian P(P0)-property, the Cartesian semimonotone (E0)-property (strictly Cartesian semimonotone (E)-property), and the relatively regular point with respect to the merit function Ψ(x), we extend various similar results proved in GCP(f,g) to generalized complementarity problems over symmetric cone GSCCP(f,g) and establish various conditions on f and g to get a solution to GSCCP(f,g).  相似文献   

12.
We examine the computational power of modular counting, where the modulus m is not a prime power, in the setting of polynomials in Boolean variables over Z m . In particular, we say that a polynomial P weakly represents a Boolean function f (both have n variables) if for any inputs x and y in {0,1}n, we have whenever . Barrington et al. (1994) investigated the minimal degree of a polynomial representing the OR function in this way, proving an upper bound of O(n 1/ r ) (where r is the number of distinct primes dividing m) and a lower bound of . Here, we show a lower bound of when m is a product of two primes and in general. While many lower bounds are known for a much stronger form of representation of a function by a polynomial (Barrington et al. 1994, Tsai 1996), very little is known using this liberal (and, we argue, more natural) definition. While the degree is known to be for the generalized inner product because of its high communication complexity (Grolmusz 1995), our bound is the best known for any function of low communication complexity and any modulus not a prime power. received 29 September 1994  相似文献   

13.
This paper analyses the ‘m out of n oblivious transfer’, presented at the ACISP 2002 Conference. It is shown that the schemes presented in the paper fail to satisfy the requirements of the oblivious transfer.  相似文献   

14.
15.
This paper analyzes (r|p)-centroid(r|p)-centroid problems on networks with vertex and edge demand under a binary choice rule. Bilevel programming models are presented for the discrete problem class. Furthermore, NP-hardness proofs for the discrete and continuous (1|p)-centroid(1|p)-centroid problem on general networks with edge demand only are provided. Nevertheless, an efficient algorithm to determine a discrete (1|p)-centroid(1|p)-centroid of a tree network with vertex and edge demand can be derived.  相似文献   

16.
文章详细描述了在192-bit素域上椭圆曲线公钥密码体制ECC(EllipticCurvepublickeyCryptography)在IntelMCS51微处理器系列智能卡上的实现过程。采用了Generalized-Mersenne素数作基域GF(p)(p=2192-264-1),利用模数的特殊形式及椭圆曲线的特殊参数,实现了GF(p)上ECC的全部过程,并且建立了软件库。运行速度表明ECC在计算资源受限、低功耗微处理器上实现是可行的。  相似文献   

17.
A Lie group G, generated by two one-parameter subgroups is said to be uniformly finitely generated by them if there exists a positive integer N such that every element of G can be expressed as a product of at most N elements chosen alternately from the two one-parameter subgroups. In this paper we construct pairs of generators of so(n) whose one-parameter subgroups uniformly finitely generate SO(n) and as a consequence, we put an upper bound on the number of switches required to join any two points on a manifold M trajectories of two particular vector fields on M.  相似文献   

18.
We study a problem of lower bounds on straight line drawings of planar graphs. We show that at least 1.235·n points in the plane are required to draw each n-vertex planar graph with edges drawn as straight line segments (for sufficiently large n). This improves the previous best bound of 1.206·n (for sufficiently large n) due to Chrobak and Karloff [Sigact News 20 (4) (1989) 83-86]. Our contribution is twofold: we improve the lower bound itself and we give a significantly simpler and more straightforward proof.  相似文献   

19.
We improve some lower bounds which have been obtained by Strassen and Lipton. In particular there exist polynomials of degree n with 0–1 coefficients that cannot be evaluated with less than n/(4logn) nonscalar multiplications/divisions. The evaluation of p(x) δ=0ne2πixδ requires at least n(12 log n) multiplications/divisions and at least n/(8logn) nonscalar multiplications/divisions. We specify polynomials with algebraic coefficients that require 12n multiplications/divisions.  相似文献   

20.
In this paper we consider a class of stochastic nonlinear Volterra integral equation. The problem of LP(R0 (p ? 1) stability in the mean m (m ? 1) is examined.In Section 2, the random Banach fixed-point theorem is used to establish the existence and uniqueness of solutions of the system in some general Banach spaces. These results are then used to study the LP(R0) (p ? 1) stability in the mean m (m ? 1) of the system.For illustration, an example of the visually induced height orientation of the fly (Musca domestica) is considered.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号