2006
DOI: 10.1109/tit.2006.872862
|View full text |Cite
|
Sign up to set email alerts
|

On the existence of (9,3,5,240) resilient functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…EA and other nature-inspired optimization heuristics such as swarm intelligence algorithms have been extensively used to optimize the cryptographic properties of Boolean functions. Examples include Genetic Algorithms (GA) [33,24,21], Genetic Programming (GP) [6,13,34] and Particle Swarm Optimization (PSO) [36,25]. Most of these works usually focus on the use of EA and swarm intelligence algorithms as alternative constructions of Boolean functions with good cryptographic properties.…”
Section: Evolutionary Searchmentioning
confidence: 99%
“…EA and other nature-inspired optimization heuristics such as swarm intelligence algorithms have been extensively used to optimize the cryptographic properties of Boolean functions. Examples include Genetic Algorithms (GA) [33,24,21], Genetic Programming (GP) [6,13,34] and Particle Swarm Optimization (PSO) [36,25]. Most of these works usually focus on the use of EA and swarm intelligence algorithms as alternative constructions of Boolean functions with good cryptographic properties.…”
Section: Evolutionary Searchmentioning
confidence: 99%
“…Kavut, Maitra, and Yücel [34] (240, 7, 4, −24, −354176) Saber, Uddin, and Youssef [48] (240, 5, 4, −160, −524288) Read [47] (240, 5, 3, −32, −524288) Burnett [10] (240, 5, 4, −128, −524288) Stanicȃ and Sung [50] (240, 2, 2, −512, −524288) Misty 1 and KASUMI 9 × 9 S-box [1] (240, 2, 2, −512, −524288) Table 3 Comparison of profiles with n = 11, I = 0.…”
Section: Authors Profilementioning
confidence: 99%
“…These properties are characterized via several relevant criteria from the cryptographic perspective [43], usually posing a trade-off between them [19,36,11,54,51,16], so that the resultant design of robust Boolean functions looks for a compromise among these criteria [17,20,33,41,24,18,1,10,34,48,47,50,35,14,38,4,49,52]. The systematic selection of such criteria (not to mention the determination of their relative relevance) is an open issue in the existing literature on the subject matter.…”
mentioning
confidence: 99%
“…Both aforementioned constructions depend on the nonlinear functions h i and h. Note that (9,3,5,240) [16] and (15, 1, -, 2 14 -2 6 -2 5 -2 4 -2 3 ) [17] functions are available. Based on the functions obtained in Examples 1 and 2, we obtain some new functions with good nonlinearity as follows.…”
Section: Remarkmentioning
confidence: 99%