Please use this identifier to cite or link to this item:
https://doi.org/10.3934/amc.2014.8.153
DC Field | Value | |
---|---|---|
dc.title | Concatenations of the hidden weighted bit function and their cryptographic properties | |
dc.contributor.author | Wang, Q. | |
dc.contributor.author | Tan, C.H. | |
dc.contributor.author | Stǎnicǎ, P. | |
dc.date.accessioned | 2014-12-12T07:59:43Z | |
dc.date.available | 2014-12-12T07:59:43Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | Wang, Q., Tan, C.H., Stǎnicǎ, P. (2014). Concatenations of the hidden weighted bit function and their cryptographic properties. Advances in Mathematics of Communications 8 (2) : 153-165. ScholarBank@NUS Repository. https://doi.org/10.3934/amc.2014.8.153 | |
dc.identifier.issn | 19305338 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/116960 | |
dc.description.abstract | To resist Binary Decision Diagrams (BDD) based attacks, a Boolean function should have a high BDD size. The hidden weighted bit function (HWBF), introduced by Bryant in 1991, seems to be the simplest function with exponential BDD size. In [28], Wang et al. investigated the cryptographic properties of the HWBF and found that it is a very good candidate for being used in real ciphers. In this paper, we modify the HWBF and construct two classes of functions with very good cryptographic properties (better than the HWBF). The new functions are balanced, with almost optimum algebraic degree and satisfy the strict avalanche criterion. Their nonlinearity is higher than that of the HWBF. We investigate their algebraic immunity, BDD size and their resistance against fast algebraic attacks, which seem to be better than those of the HWBF too. The new functions are simple, can be implemented efficiently, have high BDD sizes and rather good cryptographic properties. Therefore, they might be excellent candidates for constructions of real-life ciphers. © 2014 AIMS. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.3934/amc.2014.8.153 | |
dc.source | Scopus | |
dc.subject | Algebraic immunity | |
dc.subject | BDD-based attack | |
dc.subject | Hidden weighted bit function | |
dc.subject | Nonlinearity | |
dc.subject | Strict avalanche criterion | |
dc.type | Article | |
dc.contributor.department | TEMASEK LABORATORIES | |
dc.description.doi | 10.3934/amc.2014.8.153 | |
dc.description.sourcetitle | Advances in Mathematics of Communications | |
dc.description.volume | 8 | |
dc.description.issue | 2 | |
dc.description.page | 153-165 | |
dc.identifier.isiut | 000336142900004 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.