{"title":"关于密码旋转对称布尔函数的线性结构","authors":"E. Elsheh","doi":"10.1109/ICYCS.2008.479","DOIUrl":null,"url":null,"abstract":"Due to its richness in terms of cryptographically properties along with its small search space 22n/n comparable to the whole space 22n, the class of rotation symmetric Boolean functions (RSBFs) has become the main focus on searching for a Boolean function with good properties. Additionally, there are some other characteristics these functions might have which considered failure and should be avoided. For instance, the linear structure in Boolean function other than all-zero is regarded as a weakness and the function posses this characteristic is considered fragile and should be excluded from using in the cryptographic algorithms. Therefore, in this paper we examine the existence of linear structures in RSBFs, and then we categorize them based on the number of input variables and their algebraic degree.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"On the Linear Structures of Cryptographic Rotation Symmetric Boolean Functions\",\"authors\":\"E. Elsheh\",\"doi\":\"10.1109/ICYCS.2008.479\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to its richness in terms of cryptographically properties along with its small search space 22n/n comparable to the whole space 22n, the class of rotation symmetric Boolean functions (RSBFs) has become the main focus on searching for a Boolean function with good properties. Additionally, there are some other characteristics these functions might have which considered failure and should be avoided. For instance, the linear structure in Boolean function other than all-zero is regarded as a weakness and the function posses this characteristic is considered fragile and should be excluded from using in the cryptographic algorithms. Therefore, in this paper we examine the existence of linear structures in RSBFs, and then we categorize them based on the number of input variables and their algebraic degree.\",\"PeriodicalId\":370660,\"journal\":{\"name\":\"2008 The 9th International Conference for Young Computer Scientists\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The 9th International Conference for Young Computer Scientists\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICYCS.2008.479\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The 9th International Conference for Young Computer Scientists","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICYCS.2008.479","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Linear Structures of Cryptographic Rotation Symmetric Boolean Functions
Due to its richness in terms of cryptographically properties along with its small search space 22n/n comparable to the whole space 22n, the class of rotation symmetric Boolean functions (RSBFs) has become the main focus on searching for a Boolean function with good properties. Additionally, there are some other characteristics these functions might have which considered failure and should be avoided. For instance, the linear structure in Boolean function other than all-zero is regarded as a weakness and the function posses this characteristic is considered fragile and should be excluded from using in the cryptographic algorithms. Therefore, in this paper we examine the existence of linear structures in RSBFs, and then we categorize them based on the number of input variables and their algebraic degree.