Cryptography and Communications最新文献

筛选
英文 中文
Probabilistic estimation of the algebraic degree of Boolean functions 布尔函数代数度的概率估计
Cryptography and Communications Pub Date : 2023-08-12 DOI: 10.1007/s12095-023-00660-4
Ana Sălăgean, Percy Reyes-Paredes
{"title":"Probabilistic estimation of the algebraic degree of Boolean functions","authors":"Ana Sălăgean, Percy Reyes-Paredes","doi":"10.1007/s12095-023-00660-4","DOIUrl":"https://doi.org/10.1007/s12095-023-00660-4","url":null,"abstract":"Abstract The algebraic degree is an important parameter of Boolean functions used in cryptography. When a function in a large number of variables is not given explicitly in algebraic normal form, it is usually not feasible to compute its degree, so we need to estimate it. We propose a probabilistic test for deciding whether the algebraic degree of a Boolean function f is below a certain value k . If the degree is indeed below k , then f will always pass the test, otherwise f will fail each instance of the test with a probability $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> , which is closely related to the average number of monomials of degree k of the polynomials which are affine equivalent to f . The test has a good accuracy only if this probability $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> of failing the test is not too small. We initiate the study of $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> by showing that in the particular case when the degree of f is actually equal to k , the probability will be in the interval (0.288788, 0.5], and therefore a small number of runs of the test will be sufficient to give, with very high probability, the correct answer. Exact values of $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> for all the polynomials in 8 variables were computed using the representatives listed by Hou and by Langevin and Leander.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134977707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions 密码学布尔函数设计的元启发式算法综述
Cryptography and Communications Pub Date : 2023-07-29 DOI: 10.1007/s12095-023-00662-2
Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
{"title":"A survey of metaheuristic algorithms for the design of cryptographic Boolean functions","authors":"Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek","doi":"10.1007/s12095-023-00662-2","DOIUrl":"https://doi.org/10.1007/s12095-023-00662-2","url":null,"abstract":"Abstract Boolean functions are mathematical objects used in diverse domains and have been actively researched for several decades already. One domain where Boolean functions play an important role is cryptography. There, the plethora of settings one should consider and cryptographic properties that need to be fulfilled makes the search for new Boolean functions still a very active domain. There are several options to construct appropriate Boolean functions: algebraic constructions, random search, and metaheuristics. In this work, we concentrate on metaheuristic approaches and examine the related works appearing in the last 25 years. To the best of our knowledge, this is the first survey work on this topic. Additionally, we provide a new taxonomy of related works and discuss the results obtained. Finally, we finish this survey with potential future research directions.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135444409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bounds on the differential uniformity of the Wan-Lidl polynomials Wan-Lidl多项式微分均匀性的界
Cryptography and Communications Pub Date : 2023-03-18 DOI: 10.1007/s12095-023-00634-6
Li-An Chen, Robert S. Coulter
{"title":"Bounds on the differential uniformity of the Wan-Lidl polynomials","authors":"Li-An Chen, Robert S. Coulter","doi":"10.1007/s12095-023-00634-6","DOIUrl":"https://doi.org/10.1007/s12095-023-00634-6","url":null,"abstract":"We study the differential uniformity of the Wan-Lidl polynomials over finite fields. A general upper bound, independent of the order of the field, is established. Additional bounds are established in settings where one of the parameters is restricted. In particular, we establish a class of permutation polynomials which have differential uniformity at most 5 over fields of order 3 mod 4, irrespective of the field size. Computational results are also given.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135244738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On recovering block cipher secret keys in the cold boot attack setting 在冷启动攻击设置下恢复分组密码密钥的研究
Cryptography and Communications Pub Date : 2023-02-13 DOI: 10.1007/s12095-022-00625-z
Gustavo Banegas, Ricardo Villanueva-Polanco
{"title":"On recovering block cipher secret keys in the cold boot attack setting","authors":"Gustavo Banegas, Ricardo Villanueva-Polanco","doi":"10.1007/s12095-022-00625-z","DOIUrl":"https://doi.org/10.1007/s12095-022-00625-z","url":null,"abstract":"Abstract This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover’s quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40 % of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135906260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
G-codes, self-dual G-codes and reversible G-codes over the ring Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m g码,环上自对偶g码和可逆g码Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amssyb} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m
Cryptography and Communications Pub Date : 2021-05-03 DOI: 10.1007/s12095-021-00487-x
S. Dougherty, J. Gildea, Adrian Korban, S. Șahinkaya
{"title":"G-codes, self-dual G-codes and reversible G-codes over the ring Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m","authors":"S. Dougherty, J. Gildea, Adrian Korban, S. Șahinkaya","doi":"10.1007/s12095-021-00487-x","DOIUrl":"https://doi.org/10.1007/s12095-021-00487-x","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"23 1","pages":"601 - 616"},"PeriodicalIF":0.0,"publicationDate":"2021-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86158811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The c-differential behavior of the inverse function under the EA-equivalence 反函数在 EA 等价性下的 c 微分行为
Cryptography and Communications Pub Date : 2021-01-07 DOI: 10.1007/s12095-020-00466-8
P. Stănică, Aaron Geary
{"title":"The c-differential behavior of the inverse function under the EA-equivalence","authors":"P. Stănică, Aaron Geary","doi":"10.1007/s12095-020-00466-8","DOIUrl":"https://doi.org/10.1007/s12095-020-00466-8","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"3 1","pages":"295 - 306"},"PeriodicalIF":0.0,"publicationDate":"2021-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141201918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Self-dual codes over F2×(F2+vF2)documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times 更正:自对偶代码超过f2x (F2+vF2)documentclass[12pt]{minimal} uspackage {amsmath} uspackage {wasysym} uspackage {amsfonts} uspackage {amssymb} uspackage {amssyb} uspackage {mathrsfs} uspackage {upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times
Cryptography and Communications Pub Date : 2020-12-22 DOI: 10.1007/s12095-020-00464-w
Refia Aksoy, Fatma Çalışkan
{"title":"Correction to: Self-dual codes over F2×(F2+vF2)documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times ","authors":"Refia Aksoy, Fatma Çalışkan","doi":"10.1007/s12095-020-00464-w","DOIUrl":"https://doi.org/10.1007/s12095-020-00464-w","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"274 1","pages":"361 - 362"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75780846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the EA-classes of known APN functions in small dimensions 关于小维度中已知 APN 函数的 EA 类
Cryptography and Communications Pub Date : 2020-04-06 DOI: 10.1007/s12095-020-00427-1
Marco Calderini
{"title":"On the EA-classes of known APN functions in small dimensions","authors":"Marco Calderini","doi":"10.1007/s12095-020-00427-1","DOIUrl":"https://doi.org/10.1007/s12095-020-00427-1","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":"821 - 840"},"PeriodicalIF":0.0,"publicationDate":"2020-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The subfield codes of several classes of linear codes 几类线性码的子字段码
Cryptography and Communications Pub Date : 2020-04-04 DOI: 10.1007/s12095-020-00432-4
Xiaoqiang Wang, Dabin Zheng
{"title":"The subfield codes of several classes of linear codes","authors":"Xiaoqiang Wang, Dabin Zheng","doi":"10.1007/s12095-020-00432-4","DOIUrl":"https://doi.org/10.1007/s12095-020-00432-4","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"124 21","pages":"1111 - 1131"},"PeriodicalIF":0.0,"publicationDate":"2020-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The subfield codes of several classes of linear codes 几类线性码的子字段码
Cryptography and Communications Pub Date : 2020-04-04 DOI: 10.1007/s12095-020-00432-4
Xiaoqiang Wang, Dabin Zheng
{"title":"The subfield codes of several classes of linear codes","authors":"Xiaoqiang Wang, Dabin Zheng","doi":"10.1007/s12095-020-00432-4","DOIUrl":"https://doi.org/10.1007/s12095-020-00432-4","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"124 17","pages":"1111 - 1131"},"PeriodicalIF":0.0,"publicationDate":"2020-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信