高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Plateaued函数的正规性

王维琼 周宇 肖国镇

王维琼, 周宇, 肖国镇. Plateaued函数的正规性[J]. 电子与信息学报, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617
引用本文: 王维琼, 周宇, 肖国镇. Plateaued函数的正规性[J]. 电子与信息学报, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617
Wang Wei-qiong, Zhou Yu, Xiao Guo-zhen. Normality of Plateaued Functions[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617
Citation: Wang Wei-qiong, Zhou Yu, Xiao Guo-zhen. Normality of Plateaued Functions[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617

Plateaued函数的正规性

doi: 10.3724/SP.J.1146.2008.00617
基金项目: 

国家自然科学基金(60773003)资助课题

Normality of Plateaued Functions

  • 摘要: Plateaued函数作为Bent函数和部分Bent函数的扩展,是一类能实现多个密码学准则折中的性质优良的密码函数。该文基于布尔函数与其分解函数的Walsh谱之间的关系研究了Plateaued函数的复杂性度量指标之一的正规性,根据其正规性质给出了判定给定Plateaued函数是否正规的一个较为简单的算法,并分析了已知Plateaued函数类的正规性。
  • Dobbertin H. Constructions of bent functions and balancedBoolean functions with high nonlinearity [C]. Fast SoftwareEncryption, Lecture Notes in Computer Science, Springer-Verlag, 1994, 1008: 61-74.[2]Daum M, Dobbertin H, and Leander G. An algorithm forchecking normality of Boolean functions [C]. Proceedings ofthe 2003 International Workshop on Coding andCryptography (WCC 2003), Versailles, France, 2003:133-142.[3]Braeken A, Wolf C, and Preneel B. A randomised algorithmfor checking the normality of cryptographic Booleanfunctions [C]. IFIP TCS, Kluwer, 2004: 51-66.[4]Zheng Y, Zhang X M, and Imai H. Restriction, terms andnonlinearity of Boolean functions [J]. Theoretical ComputerScience, 1999, 226(1): 207-223.[5]张卫国, 丁勇, 张宁,肖国镇. 代数免疫布尔函数的一个特征[J]. 北京邮电大学学报, 2007, 30(5): 55-57.Zhang Wei-guo, Ding Yong, Zhang Ning, and Xiao Guo-zhen.A characterization of algebraic immune Boolean functions [J].Journal of Beijing University of Posts andTelecommunications, 2007, 30(5): 55-57.[6]Canteaut A, Daum M, Dobbertin H, and Leauder G. Normaland Non Normal Bent Functions [C]. Proceedings of the 2003Inernational Workshop on Coding and Cryptography (WCC2003), Versailles, France, 2003: 91-100.[7]Zheng Y, Zhang X M. Plateaued functions [C][J].Advances inCryptology, ICICS99, Lecture Notes in Computer Science,Ed., Springer-Verlag.1999, 1726:284-300[8]Carlet C and Prouff E. On Plateaued functions and theirconstructions [C]. Fast Software Encryption, Lecture Notes inComputer Science, Springer-Verlag, 2003, 2887: 54-73.[9]Zheng Y. On plateaued functions [J].IEEE Transactions onInformation Theory.2001, 47(3):1215-1223[10]Zhang W. Construction of plateaued functions satisfyingmultiple criteria [J]. High Technology Letters, 2005, 11(4):364-366.[11]胡斌, 金晨辉, 冯春海. Plateaued 函数的密码学性质[J].电子与信息学报.2008, 30(3):660-664浏览[12]金栋梁, 赵亚群. 多输出plateaued 函数的性质和构造[J].电子与信息学报.2008, 30(12):2991-2995浏览[13]Canteaut A, Carlet C, and Charpin P. On cryptographicproperties of the cosets of R(1,m) [J].IEEE Transactions onInformation Theory.2001, 47(4):1494-1513[14]Mac Williams F J and Sloane N J. The Theory of Error-Correcting Codes [M], North-Holland, Amsterdam, 1977.
  • 加载中
计量
  • 文章访问数:  3547
  • HTML全文浏览量:  98
  • PDF下载量:  827
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-05-15
  • 修回日期:  2009-06-08
  • 刊出日期:  2009-09-19

目录

    /

    返回文章
    返回