2009 Sixth International Conference on Information Technology: New Generations 2009
DOI: 10.1109/itng.2009.102
|View full text |Cite
|
Sign up to set email alerts
|

The Design of Boolean Functions by Modified Hill Climbing Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
2

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 6 publications
0
21
0
2
Order By: Relevance
“…The obtained results of the distribution on the non-linearity of the entire set of M-NLFSR sized below 6  L are summarized in Table 5. The Tables 6 and 7 As it can be seen from the results above, M-NLFSR simultaneously achieve the maximum possible stability and maximum nonlinearity [13][14][15][16][17][18][19]. Moreover, all m-optimal functions are also msaturated (in Tables 6-9 .…”
Section: Correlation Immunitymentioning
confidence: 95%
“…The obtained results of the distribution on the non-linearity of the entire set of M-NLFSR sized below 6  L are summarized in Table 5. The Tables 6 and 7 As it can be seen from the results above, M-NLFSR simultaneously achieve the maximum possible stability and maximum nonlinearity [13][14][15][16][17][18][19]. Moreover, all m-optimal functions are also msaturated (in Tables 6-9 .…”
Section: Correlation Immunitymentioning
confidence: 95%
“…In order to partially avoid this drawback, some authors consider some of the advances performed with algebraic constructions. Particularly, References [ 18 , 19 ] proposed trajectory-based search methods that operate with bent BFs . They randomly adjust the bent BF to convert it on a balanced BF.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Motivated by the related work from Burnett [ 18 ] and Izbenko [ 19 ], we considered the application of an algebraic procedure to improve our results. Contrary to their work, we decided not to use bent functions, instead we employ the work from Tang [ 32 ] to build an initial population of individuals with high nonlinearity.…”
Section: Population-based Proposalsmentioning
confidence: 99%
“…In particular, the algebraic properties of S-blocks of modern block ciphers are investigated in [5][6][7] and their influence on sustainability to algebraic cryptanalysis is shown. In [8][9][10][11], combinatorial properties of non-linear knots in the context of the security evaluation of various encryption modes and key schedules were properties are examined; in [24] the method of simulation of annealing is investigated; evolutionary methods are studied in [25,26]; papers [27,28] are dedicated to the heuristic methods of gradient search.…”
Section: Introductionmentioning
confidence: 99%
“…The purpose of this paper is to continue studies of the method of gradient descent, first proposed in [28], an assessment of its computational complexity in comparison with the closest analog in [27]. For this purpose, the necessary terms and definitions in Section 2 are introduced; the heuristic methods studied in [27,28] are summarized in Section 3 and the calculated data for the required number of operations for the realization of gradient descent (Table I) is provided. Section 4 evaluates the properties of the gradient-lift method for the formation of high non-linear correlation-immune cryptographic Boolean functions.…”
Section: Introductionmentioning
confidence: 99%