2001
DOI: 10.1109/18.923730
|View full text |Cite
|
Sign up to set email alerts
|

On cryptographic properties of the cosets of R(1, m)

Abstract: Abstract-We introduce a new approach for the study of weight distributions of cosets of the Reed-Muller code of order 1. Our approach is based on the method introduced by Kasami in [1], using Pless identities. By interpreting some equations, we obtain a necessary condition for a coset to have a "high" minimum weight. Most notably, we are able to distinguish such cosets which have three weights only. We then apply our results to the problem of the nonlinearity of Boolean functions. We particularly study the lin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 103 publications
(70 citation statements)
references
References 33 publications
0
69
0
Order By: Relevance
“…The statement of Theorem 2 is related with Theorems V.2 and V.3 from [7]. These results show that for checking that a given Boolean function is bent (resp.…”
mentioning
confidence: 60%
“…The statement of Theorem 2 is related with Theorems V.2 and V.3 from [7]. These results show that for checking that a given Boolean function is bent (resp.…”
mentioning
confidence: 60%
“…The properties of the restrictions of a bent function to a subspace of codimension and (and to its cosets) have been investigated in [1]. This study points out the major role played by the functions whose extended Fourier spectrum takes on exactly three values.…”
Section: Restrictions Of a Bent Function To A Subspace Of Large DImentioning
confidence: 99%
“…Note that the following proposition includes both three-valued and bent functions. [10], are notably studied in [1]. These functions are three valued and could be almost optimal.…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…Annex A.2) and by Canteaut, Carlet, Charpin and Fontaine [5,6]. In the standard model of stream ciphers, a Boolean function is used to combine the outputs of n linear feedback shift registers.…”
Section: Plateaued Functionsmentioning
confidence: 99%