Xu Hanliang, Lu Shuwang . Equivalent characterization and application of multi-output correlation-immune boolean function[J]. Journal of Electronics & Information Technology, 2002, 24(9): 1185-1189.
Citation:
Xu Hanliang, Lu Shuwang . Equivalent characterization and application of multi-output correlation-immune boolean function[J]. Journal of Electronics & Information Technology, 2002, 24(9): 1185-1189.
Xu Hanliang, Lu Shuwang . Equivalent characterization and application of multi-output correlation-immune boolean function[J]. Journal of Electronics & Information Technology, 2002, 24(9): 1185-1189.
Citation:
Xu Hanliang, Lu Shuwang . Equivalent characterization and application of multi-output correlation-immune boolean function[J]. Journal of Electronics & Information Technology, 2002, 24(9): 1185-1189.
This paper discusses the characterizations of multi-output correlation-immune functions. We first give a decomposition formula of the probability distribution of binary random vectors by using Walsh transform. Then the equivalence of the two different definitions of multi-output correlation-immune functions is proved. Furthermore, a class of keystream generators is constructed which can resist the linear and correlation attacks.
丁存生,肖国镇,流密码学及其应用,北京,国防工业出版社,1994,169-173.[2]K. Gopalakrishnan, D. R. Stinson, Three charaterizations of non-binary correlation-immune andresilient functions, Designs, Codes and Cryptography, 1995, 5(3), 241-251.[3]陈鲁生,多输出布尔函数的密码学性质,[博士论文],天津,南开大学,2000.