Please use this identifier to cite or link to this item: https://doi.org/10.3934/amc.2014.8.153
DC FieldValue
dc.titleConcatenations of the hidden weighted bit function and their cryptographic properties
dc.contributor.authorWang, Q.
dc.contributor.authorTan, C.H.
dc.contributor.authorStǎnicǎ, P.
dc.date.accessioned2014-12-12T07:59:43Z
dc.date.available2014-12-12T07:59:43Z
dc.date.issued2014
dc.identifier.citationWang, Q., Tan, C.H., Stǎnicǎ, P. (2014). Concatenations of the hidden weighted bit function and their cryptographic properties. Advances in Mathematics of Communications 8 (2) : 153-165. ScholarBank@NUS Repository. https://doi.org/10.3934/amc.2014.8.153
dc.identifier.issn19305338
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/116960
dc.description.abstractTo resist Binary Decision Diagrams (BDD) based attacks, a Boolean function should have a high BDD size. The hidden weighted bit function (HWBF), introduced by Bryant in 1991, seems to be the simplest function with exponential BDD size. In [28], Wang et al. investigated the cryptographic properties of the HWBF and found that it is a very good candidate for being used in real ciphers. In this paper, we modify the HWBF and construct two classes of functions with very good cryptographic properties (better than the HWBF). The new functions are balanced, with almost optimum algebraic degree and satisfy the strict avalanche criterion. Their nonlinearity is higher than that of the HWBF. We investigate their algebraic immunity, BDD size and their resistance against fast algebraic attacks, which seem to be better than those of the HWBF too. The new functions are simple, can be implemented efficiently, have high BDD sizes and rather good cryptographic properties. Therefore, they might be excellent candidates for constructions of real-life ciphers. © 2014 AIMS.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.3934/amc.2014.8.153
dc.sourceScopus
dc.subjectAlgebraic immunity
dc.subjectBDD-based attack
dc.subjectHidden weighted bit function
dc.subjectNonlinearity
dc.subjectStrict avalanche criterion
dc.typeArticle
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.3934/amc.2014.8.153
dc.description.sourcetitleAdvances in Mathematics of Communications
dc.description.volume8
dc.description.issue2
dc.description.page153-165
dc.identifier.isiut000336142900004
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.