2021
DOI: 10.1007/978-3-030-88238-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Autocorrelations of Vectorial Boolean Functions

Abstract: Recently, Bar-On et al. introduced at Eurocrypt'19 a new tool, called the differential-linear connectivity table (DLCT), which allows for taking into account the dependency between the two subciphers E0 and E1 involved in differential-linear attacks. This paper presents a theoretical characterization of the DLCT, which corresponds to an autocorrelation table (ACT) of a vectorial Boolean function. We further provide some new theoretical results on ACTs of vectorial Boolean functions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 45 publications
(43 reference statements)
0
9
0
Order By: Relevance
“…Let 𝐹 be a vectorial Boolean function, for any 𝑢 ∈ F 𝑛 2 and 𝑣 ∈ F 𝑚 2 , when only 𝑢 is variable, the sum-ofsquares indicator is 𝜎 𝐹 (𝑢) = 𝑣∈F 𝑚 2 𝐴𝐶 2 𝐹 (𝑢, 𝑣). The relationship between the differential distribution table and the autocorrelation of vectorial Boolean functions was presented in [4], which will be used to the proof of Theorem 4. Lemma 2.…”
Section: Lemma 1 [4] Let 𝐹 Be a Vectorial Boolean Function Then For A...mentioning
confidence: 99%
See 3 more Smart Citations
“…Let 𝐹 be a vectorial Boolean function, for any 𝑢 ∈ F 𝑛 2 and 𝑣 ∈ F 𝑚 2 , when only 𝑢 is variable, the sum-ofsquares indicator is 𝜎 𝐹 (𝑢) = 𝑣∈F 𝑚 2 𝐴𝐶 2 𝐹 (𝑢, 𝑣). The relationship between the differential distribution table and the autocorrelation of vectorial Boolean functions was presented in [4], which will be used to the proof of Theorem 4. Lemma 2.…”
Section: Lemma 1 [4] Let 𝐹 Be a Vectorial Boolean Function Then For A...mentioning
confidence: 99%
“…Lemma 2. [4] Let 𝐹 be a vectorial Boolean function. Then, for any 𝑢 ∈ F 𝑛 2 and 𝑣 ∈ F 𝑚 2 , we have ∑︁…”
Section: Lemma 1 [4] Let 𝐹 Be a Vectorial Boolean Function Then For A...mentioning
confidence: 99%
See 2 more Smart Citations
“…For even characteristic, some cryptographic properties of permutations of low Carlitz rank have been investigated in several researches, and we can see that they have good cryptographic parameters. For example, the multiplicative inverse function of Carlitz rank 1 has low differential uniformity [17], high nonlinearity [12], low boomerang uniformity [5], low differential-linear uniformity [6], low cdifferential uniformity [7], and low c-boomerang uniformity [18]. Furthermore, it is used as the S-box of the AES(Advanced Encryption Standard) cryptosystem.…”
Section: Introductionmentioning
confidence: 99%