Carlet, 1993 - Google Patents
Partially-bent functionsCarlet, 1993
- Document ID
- 18423835544892222766
- Author
- Carlet C
- Publication year
- Publication venue
- Designs, Codes and Cryptography
External Links
Snippet
We study a conjecture stated in [6] about the numbers of non-zeros of, respectively, the auto- correlation function and the Walsh transform of the function (− 1) f (x), where f (x) is any boolean function on {0, 1} n. The result that we obtain leads us to introduce the class of …
- 238000005311 autocorrelation function 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Carlet | Partially-bent functions | |
Patro et al. | Secure multi–level permutation operation based multiple colour image encryption | |
Sharma et al. | A review on various cryptographic techniques & algorithms | |
Jasper et al. | Kirkman equiangular tight frames and codes | |
Babai et al. | On the diameter of finite groups | |
US10623189B2 (en) | Online/offline signature system and method based on multivariate cryptography | |
Kumar et al. | Intertwining logistic map and Cellular Automata based color image encryption model | |
Galbraith et al. | The probability that the number of points on an elliptic curve over a finite field is prime | |
Zhang et al. | Auto-correlations and new bounds on the nonlinearity of boolean functions | |
Vaserstein | Non-commutative number theory | |
Bóna et al. | The average number of block interchanges needed to sort a permutation and a recent result of Stanley | |
Shah Devbhadra | Some tribonacci identities | |
Gopalakrishnan et al. | IMAGE ENCRYPTION IN BLOCK-WISE WITH MULTIPLE CHAOTIC MAPS FOR PERMUTATION AND DIFFUSION. | |
Harkins et al. | Encryption schemes using finite frames and Hadamard arrays | |
Araújo et al. | Integrals of groups | |
Miller | Possible Orders of Two Generators of the Alternating and of the Symmetric Groups | |
JPS62132451A (en) | Open key ciphering system | |
te Riele | Hyperperfect numbers with three different prime factors | |
Moh | An application of algebraic geometry to encryption: tame transformation method | |
Butler et al. | Boolean functions for cryptography | |
Chang | Preimage attacks on Cellhash, Subhash and Strengthened versions of Cellhash and Subhash | |
Sramka | Cryptanalysis of the block cipher based on the hopfield neural network | |
Caminata et al. | The symmetric signature of cyclic quotient singularities | |
Stempak | Subroot systems and total positivity in finite reflection groups | |
Oman et al. | Rings which admit faithful torsion modules II |