搜索结果: 1-15 共查到“军事学 properties”相关记录61条 . 查询时间(0.201 秒)
A family of boolean functions with good cryptographic properties
Boolean functions linear codes Reed-Solomon codes
2019/2/28
In 2005, [2] Philippe Guillot presented a new construction of Boolean functions using linear codes as an extension of Maiorana-McFarland's construction of bent functions. In this paper, we study a new...
Algebraic normal form of a bent function: properties and restrictions
Boolean function bent function linear function
2018/12/3
Maximally nonlinear Boolean functions in nn variables, where n is even, are called bent functions. There are several ways to represent Boolean functions. One of the most useful is via algebraic normal...
Some Properties of Modular Addition
modular addition partitions differential cryptanalysis
2018/11/20
In this paper we study a problem which emerged during an attempt to apply a differential cryptanalysis method to the <> algorithm. We obtained a general formula of distribution in the differenc...
On the Security Properties of e-Voting Bulletin Boards
bulletin board e-voting, liveness persistence
2018/6/6
In state-of-the-art e-voting systems, a bulletin board (BB) is a critical component for preserving election integrity and availability. Although it is common in the literature to assume that a BB is a...
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
black-box separation simulatable attack tamper-resilience
2018/6/5
In this work, we show negative results on the tamper-resilience of a wide class of cryptographic primitives with uniqueness properties, such as unique signatures, verifiable random functions, signatur...
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes
AES BFs
2018/5/11
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance...
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
RSA homomorphic encryption homomorphic threshold
2018/3/5
In contrast to related work which encrypts and acts on each bit of the input separately, our protocol compares multiple input bits simultaneously within a single ciphertext. Compared to the related pr...
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box
AES MixColumns key-recovery attack
2017/12/19
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attacks for this model have been proposed in literature, the most recent ones at Crypto’16 and FSE’17. Bot...
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$
Boolean function Sbox APN
2016/12/9
The existence of Almost Perfect Nonlinear (APN) permutations operating on an even number of variables was a long-standing open problem, until an example with six variables was exhibited by Dillon et a...
When Are Three Voters Enough for Privacy Properties?
secure electronic voting security verification vote privacy
2016/7/15
Protocols for secure electronic voting are of increasing societal importance. Proving rigorously their security is more challenging than many other protocols, which aim at authentication or key exchan...
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n
Stream ciphers fast algebraic attacks time complexity
2016/7/7
Although several methods for estimating the resistance of a random Boolean function against (fast) algebraic attacks were proposed, these methods are usually infeasible in practice for relative large ...
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
key management block ciphers counter mode
2016/6/20
This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the 獵ryptoPro Key Meshing?(CPKM) re-keying method that was previously used with the GOS...
Cryptographic Properties of Addition Modulo $2^n$
Modular addition Boolean function Component Boolean function
2016/2/24
The operation of modular addition modulo a power of
two is one of the most applied operations in symmetric cryptography.
For example, modular addition is used in RC6, MARS and
Twofish block ciphers...
The paper describes improved analysis techniques for basis reduction that
allow one to prove strong complexity bounds and reduced basis guarantees for traditional
reduction algorithms and some of th...
The graph of minimal distances of bent functions and its properties
Boolean functions bent functions the minimal distance
2016/1/27
A notion of the graph of minimal distances of bent functions is introduced. It is an
undirected graph (V , E) where V is the set of all bent functions in 2k variables and (f, g) ∈ E
if the Hamming d...