{"title":"k-bent functions: from coding theory to cryptology","authors":"N. Tokareva","doi":"10.1109/SIBIRCON.2008.4602613","DOIUrl":null,"url":null,"abstract":"In this paper we would like to give a new example of the fact that ideas of coding theory sometimes find unexpected applications in cryptology. Our example is based on new notions of k-Walsh-Hadamard transform for a Boolean function and k-bent function (here k is integer, 1 les k les m/2, m is an even number of variables), which we introduce. These notions appeared at first as geometric images of coding theory. But soon they found applications in cryptanalysis. Using these notions we study special quadratic approximations in block ciphers and prove that by using k-bent functions in a cipher it is possible to make it resistant to these approximations.","PeriodicalId":295946,"journal":{"name":"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering","volume":"140 46","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBIRCON.2008.4602613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper we would like to give a new example of the fact that ideas of coding theory sometimes find unexpected applications in cryptology. Our example is based on new notions of k-Walsh-Hadamard transform for a Boolean function and k-bent function (here k is integer, 1 les k les m/2, m is an even number of variables), which we introduce. These notions appeared at first as geometric images of coding theory. But soon they found applications in cryptanalysis. Using these notions we study special quadratic approximations in block ciphers and prove that by using k-bent functions in a cipher it is possible to make it resistant to these approximations.