[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Carlet, 1993 - Google Patents

Partially-bent functions

Carlet, 1993

Document ID
18423835544892222766
Author
Carlet C
Publication year
Publication venue
Designs, Codes and Cryptography

External Links

Snippet

We study a conjecture stated in [6] about the numbers of non-zeros of, respectively, the auto- correlation function and the Walsh transform of the function (− 1) f (x), where f (x) is any boolean function on {0, 1} n. The result that we obtain leads us to introduce the class of …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; Arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Similar Documents

Publication Publication Date Title
Carlet Partially-bent functions
Patro et al. Secure multi–level permutation operation based multiple colour image encryption
Sharma et al. A review on various cryptographic techniques & algorithms
Jasper et al. Kirkman equiangular tight frames and codes
Babai et al. On the diameter of finite groups
US10623189B2 (en) Online/offline signature system and method based on multivariate cryptography
Kumar et al. Intertwining logistic map and Cellular Automata based color image encryption model
Galbraith et al. The probability that the number of points on an elliptic curve over a finite field is prime
Zhang et al. Auto-correlations and new bounds on the nonlinearity of boolean functions
Vaserstein Non-commutative number theory
Bóna et al. The average number of block interchanges needed to sort a permutation and a recent result of Stanley
Shah Devbhadra Some tribonacci identities
Gopalakrishnan et al. IMAGE ENCRYPTION IN BLOCK-WISE WITH MULTIPLE CHAOTIC MAPS FOR PERMUTATION AND DIFFUSION.
Harkins et al. Encryption schemes using finite frames and Hadamard arrays
Araújo et al. Integrals of groups
Miller Possible Orders of Two Generators of the Alternating and of the Symmetric Groups
JPS62132451A (en) Open key ciphering system
te Riele Hyperperfect numbers with three different prime factors
Moh An application of algebraic geometry to encryption: tame transformation method
Butler et al. Boolean functions for cryptography
Chang Preimage attacks on Cellhash, Subhash and Strengthened versions of Cellhash and Subhash
Sramka Cryptanalysis of the block cipher based on the hopfield neural network
Caminata et al. The symmetric signature of cyclic quotient singularities
Stempak Subroot systems and total positivity in finite reflection groups
Oman et al. Rings which admit faithful torsion modules II