搜索结果: 1-6 共查到“军队指挥学 algebraic degree”相关记录6条 . 查询时间(0.078 秒)
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Block cipher Cryptanalysis Interpolation attack
2019/7/15
Symmetric cryptographic primitives with low multiplicative complexity have been proposed to improve the performance of emerging applications such as secure Multi-Party Computation. However, primitives...
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
secret-key cryptography Large Symmetric Group
2017/3/6
We present a construction of bent function fa,Sfa,S with n=2mn=2m variables for any nonzero vector a∈Fm2a∈F2m and subset SS of Fm2F2m satisfying a+S=Sa+S=S. We give the simple expression of the dual b...
On the (non-)existence of APN $(n,n)$-functions of algebraic degree $n$
almost perfect nonlinear almost bent Boolean function
2016/2/23
In this paper, we study the problem of existence of almost perfect nonlinear (APN) functions of algebraic degree n over \ftwon. We characterize such functions by means of derivatives and power moments...
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity
Algebraic immunity nonlinearity metaheuristics simulated annealing
2013/2/21
Using simulated annealing, we derive several equivalence classes of balanced Boolean functions with optimum algebraic immunity, fast algebraic resistance, and maximum possible algebraic degree. For nu...
On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
secret-key cryptography
2012/3/26
We present a study on the algebraic degree of iterated permutations seen as multivari- ate polynomials. Our main result shows that this degree depends on the algebraic degree of the inverse of the per...
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
2-round Substitution-Permutation 3-round Feistel Networks Algebraic Degree
2010/2/20
We study algebraic degree profile of reduced-round block cipher schemes.
We show that the degree is not maximal with elementary combinatorial
and algebraic arguments. We discuss on how it can be tur...