Advanced Search
Volume 31 Issue 9
Dec.  2010
Turn off MathJax
Article Contents
Wang Wei-qiong, Zhou Yu, Xiao Guo-zhen. Normality of Plateaued Functions[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617
Citation: Wang Wei-qiong, Zhou Yu, Xiao Guo-zhen. Normality of Plateaued Functions[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2283-2286. doi: 10.3724/SP.J.1146.2008.00617

Normality of Plateaued Functions

doi: 10.3724/SP.J.1146.2008.00617
  • Received Date: 2008-05-15
  • Rev Recd Date: 2009-06-08
  • Publish Date: 2009-09-19
  • As a generalization of Bent functions and Partially Bent functions, Plateaued functions can achieve trade-off among many cryptographic criteria. Based on the relationships between the Walsh transform of a given function and the Walsh transform of its decomposing function, the normality of Plateaued functions is studied. Then a simpler algorithm for checking the normality of Plateaued functions is proposed. Finally, the normality of some known kind of Plateaued functions is discussed.
  • loading
  • Dobbertin H. Constructions of bent functions and balancedBoolean functions with high nonlinearity [C]. Fast SoftwareEncryption, Lecture Notes in Computer Science, Springer-Verlag, 1994, 1008: 61-74.[2]Daum M, Dobbertin H, and Leander G. An algorithm forchecking normality of Boolean functions [C]. Proceedings ofthe 2003 International Workshop on Coding andCryptography (WCC 2003), Versailles, France, 2003:133-142.[3]Braeken A, Wolf C, and Preneel B. A randomised algorithmfor checking the normality of cryptographic Booleanfunctions [C]. IFIP TCS, Kluwer, 2004: 51-66.[4]Zheng Y, Zhang X M, and Imai H. Restriction, terms andnonlinearity of Boolean functions [J]. Theoretical ComputerScience, 1999, 226(1): 207-223.[5]张卫国, 丁勇, 张宁,肖国镇. 代数免疫布尔函数的一个特征[J]. 北京邮电大学学报, 2007, 30(5): 55-57.Zhang Wei-guo, Ding Yong, Zhang Ning, and Xiao Guo-zhen.A characterization of algebraic immune Boolean functions [J].Journal of Beijing University of Posts andTelecommunications, 2007, 30(5): 55-57.[6]Canteaut A, Daum M, Dobbertin H, and Leauder G. Normaland Non Normal Bent Functions [C]. Proceedings of the 2003Inernational Workshop on Coding and Cryptography (WCC2003), Versailles, France, 2003: 91-100.[7]Zheng Y, Zhang X M. Plateaued functions [C][J].Advances inCryptology, ICICS99, Lecture Notes in Computer Science,Ed., Springer-Verlag.1999, 1726:284-300[8]Carlet C and Prouff E. On Plateaued functions and theirconstructions [C]. Fast Software Encryption, Lecture Notes inComputer Science, Springer-Verlag, 2003, 2887: 54-73.[9]Zheng Y. On plateaued functions [J].IEEE Transactions onInformation Theory.2001, 47(3):1215-1223[10]Zhang W. Construction of plateaued functions satisfyingmultiple criteria [J]. High Technology Letters, 2005, 11(4):364-366.[11]胡斌, 金晨辉, 冯春海. Plateaued 函数的密码学性质[J].电子与信息学报.2008, 30(3):660-664浏览[12]金栋梁, 赵亚群. 多输出plateaued 函数的性质和构造[J].电子与信息学报.2008, 30(12):2991-2995浏览[13]Canteaut A, Carlet C, and Charpin P. On cryptographicproperties of the cosets of R(1,m) [J].IEEE Transactions onInformation Theory.2001, 47(4):1494-1513[14]Mac Williams F J and Sloane N J. The Theory of Error-Correcting Codes [M], North-Holland, Amsterdam, 1977.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3638) PDF downloads(827) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return