浏览全部资源
扫码关注微信
1. 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
2. 中国科学院大学国家计算机网络入侵防范中心,北京 101408
[ "田叶(1987-),女,山西平遥人,西安电子科技大学博士生,主要研究方向为布尔函数、序列密码的分析与构造。" ]
[ "张玉清(1966-),男,陕西宝鸡人,博士,中国科学院大学教授、博士生导师,主要研究方向为网络与信息系统安全。" ]
[ "胡予濮(1955-),男,河南濮阳人,西安电子科技大学教授、博士生导师,主要研究方向为序列密码与分组密码、网络安全协议的设计与分析。" ]
[ "伍高飞(1987-),男,河南灵宝人,西安电子科技大学博士生,主要研究方向为序列设计和密码学。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
田叶, 张玉清, 胡予濮, 等. 一类布尔函数的代数免疫度的下界[J]. 通信学报, 2016,37(10):92-98.
Ye TIAN, Yu-qing ZHANG, Yu-pu HU, et al. New bound of algebraic immunity of a class of Boolean function[J]. Journal on communications, 2016, 37(10): 92-98.
田叶, 张玉清, 胡予濮, 等. 一类布尔函数的代数免疫度的下界[J]. 通信学报, 2016,37(10):92-98. DOI: 10.11959/j.issn.1000-436x.2016200.
Ye TIAN, Yu-qing ZHANG, Yu-pu HU, et al. New bound of algebraic immunity of a class of Boolean function[J]. Journal on communications, 2016, 37(10): 92-98. DOI: 10.11959/j.issn.1000-436x.2016200.
代数免疫度是衡量布尔函数抵抗代数攻击的重要指标。最近,Mesnager等研究了布尔函数的零化子与函数所对应循环码最小距离之间的联系,代数免疫度的下界可以由对应的循环码的最小距离得到。解决了Mesnager提出的一个公开问题,给出了一类特定函数的零化子次数的下界,并得到一类布尔函数的代数免疫度的下界。
Algebraic immunity quantified the resistance of a Boolean function to the algebraic attack.Recently
Mesnager
et al showed that there were direct linked between the annihilators used in algebraic attacks and the coding theory.They showed that the lower bound of the algebraic immunity of Boolean functions could been derived from the minimum distance of the associated cyclic codes.An open problem proposed by Mesnager is settled with a detailed proof.Also
a lower bound of algebraic immunity of a class of Boolean functions will be introduced.
COURTOIS N , MEIER W . Algebraic attacks on stream ciphers with linear feedback [C ] // Cryptology-Eurocrypt 2003,LNCS 2656 . Berlin:Springer-Verlag , 2003 : 345 - 359 .
ARMKNECHT F , KRAUSE M . Algebraic attacks on combiners with memory [C ] // Cryptology-Crypto . 2003 : 162 - 175 .
MEIER W , PASALIC E , CARLET C . Algebraic attacks and decomposition of Boolean functions [C ] // Cryptology -Eurocrypt 2004,LNCS 3027 . 2004 : 474 - 491 .
DALAI D , MAITRA S , SARKAR S . Cryptographically significant Boolean functions:construction and analysis in terms of algebraic immunity [J ] . Fast Software Encryption , 2005 , 3557 : 98 - 111 .
CARLET C , DALAI D , GUPTA C . Algebraic immunity for cryptographically significant Boolean function:analysis and construction [J ] . IEEE Transactions on Information Theory , 2006 , 52 ( 7 ): 3105 - 3121 .
CARLET C , FENG K . An infinite class of balanced functions with optimal algebraic immunity,good immunity to fast algebraic attacks and good nonlinearity [C ] // Cryptology-Asiacrypt 2008,LNCS 5350 . 2008 , 5350 : 425 - 440 .
RIZOMILIOTIS P . On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation [J ] . IEEE Trans Information Theory , 2010 , 56 ( 8 ): 4014 - 4024 .
TU Z , DENG Y . A conjecture on binary string and its applications on constructing Boolean functions of optimal algebraic immunity [J ] . Designs Codes and Cryptography , 2011 , 60 ( 1 ): 1 - 14 .
HELLESTH T , RONJOM S . Simplifying algebraic attacks with univariate analysis [C ] // Information Theory and Applications Workshop (ITA) . 2011 : 1 - 7 .
TANG D , CARLET C , TANG X . Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks [J ] . IEEE Trans Inf Theory , 2013 , 59 ( 59 ): 653 - 664 .
LIN J , WANG M , LI Y . On annihilators in fewer variables:basic theory and applications [J ] . Chinese Journal of Electronics , 2013 , 22 ( 3 ): 489 - 494 .
欧智慧 , 赵亚群 , 李旭 . 一类密码函数的构造与分析 [J ] . 通信学报 , 2013 , 4 ( 4 ): 106 - 113 .
OU Z H , ZHAO Y Q , LI X . Construction and analysis of one class of cryptographic functions [J ] . Journal on Communications , 2013 , 34 ( 4 ): 106 - 113 .
MESNAGER S , . A note on linear codes and algebraic immunity of Boolean Functions [C ] // 21st International Symposium on Mathematical Theory of Networks and Systems . 2014 .
MACWILLIAMS F , SLOANE N . The theory of error-correcting Codes [M ] . North-Holland Mathematical Library . Amsterdam,The Netherlands : North-HollandPress , 1977 .
HUFFMAN W , PLESS V . Fundamentals of error-correcting codes [M ] . Cambridge,UK : Cambridge Univ.PressPress , 2003 .
BETTI E , SALA M . A new bound for the minimum distance of a cyclic code from its defining set [J ] . IEEE Trans Information Theory , 2006 , 52 ( 8 ): 3700 - 3706 .
BETTEN A , BRAUN M , FRIPERTINGER H . Error- correcting linear codes [M ] . Berlin,Germany : Springer- VerlagPress , 2006 .
GAO J , HU Y , LI X . Linear span of the optimal frequency hopping sequences from irreducible cyclic Codes [J ] . Chinese Journal of Electronics , 2015 , 24 ( 4 ): 818 - 823 .
DING C , DU X , ZHOU A . The bose and minimum distance of a class of BCH codes [J ] . IEEE Trans Information Theory , 2015 , 61 ( 5 ): 2351 - 2356 .
FENG X , GONG G . On algebraic immunity of trace inverse functions on finite fields of characteristic two [J ] . Journal of Systems Science and Complexity , 2016 , 29 ( 1 ): 272 - 288 .
WU D , QI W . On the spectral immunity of periodic sequences restricted to binary annihilators [J ] . Designs Codes and Cryptography , 2016 , 78 ( 2 ): 533 - 545 .
DING C . A construction of binary linear codes from Boolean functions [J ] . Discrete Mathematics , 2016 , 339 ( 9 ): 2288 - 2303 .
0
浏览量
678
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构