Abstract
Propagation criteria and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1–4, 7, 8, 1, 11, 16]). Kurosawa, Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper, the algebraic-geometric codes over GF(2m) are used to modify the Carlet and Kurosawa-Satoh’s construction for giving vectorial resilient Boolean functions satisfying PC(l) of order k criterion. This new construction is compared with previously known results.
Similar content being viewed by others
References
Carlet, C., On the propagation criterion of degree l and order k, Advances in Cryptology, Lecture Notes in Computer Science, 1403, Springer-Verlag, Berlin, Heidelberg, New York, 1998, 462–474.
Carlet, C., Boolean Functions for Cryptography and Error Correcting Codes, Boolean Methods and Models, Y. Crama and P. Hammer (eds.), Cambridge University Press, Cambridge, 2010, in press.
Carlet, C., Vectorial Boolean functions for cryptography, Boolean Methods and Models, Y. Crama and P. Hammer (eds.), Cambridge University Press, Cambridge, to appear.
Cheon, J. H., Nonlinear vector Boolean functions, Advances in Cryptology, Lecture Notes in Computer Science, 2139, Springer-Verlag, Berlin, Heidelberg, New York, 2001, 458–469.
Garcia, A. and Stichtenoth, H., On the asymptotic behaviour of some towers of function fields over finite fields, J. Number Theory, 61, 1996, 248–273.
Grassl, M., Geiselmann, W. and Beth, T., Quantum Reed-Solomon codes, Proc. AAECC 13, Lecture Notes in Computer Science, 1719, M. Fossoreier, H. Imai, S. Lin and A. Poli (eds.), Springer-Verlag, New York, 1996, 231–244.
Johansson, T. and Pasalic, E., A construction of resilient functions with high nonlinearity, IEEE Trans. Inf. Theory, 49(2), 2002, 494–501.
Kurosawa, K. and Satoh, T., Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria, Advances in Cryptology, Lecture Notes in Computer Science, 1233, Springer-Verlag, Berlin, Heidelberg, New York, 1997, 434–449.
Matsumoto, R., Kurosawa, K., Itoh, T., et al, Primal-dual distance bounds of linear codes with applications to cryptography, IEEE Trans. Inf. Theory, to appear. Cryptology e-print 194/2005
Meier, W. and Staffelbach, O., Nonlinearity criteria for cryptographic functions, Advances in Cryptology, Lecture Notes in Computer Science, 434, Springer-Verlag, Berlin, Heidelberg, New York, 1989, 549–562.
Preneel, B., Govaerts, R. and Vandevalle, J., Boolean functions satisfying high order propagation criteria, Advances in Cryptology, Lecture Notes in Computer Science, 473, Springer-Verlag, Berlin, Heidelberg, New York, 1990, 161–173.
Stichtenoth, H., Algebraic Function Fields and Codes, Springer-Verlag, Berlin, 1993.
Tsfasman, M. A. and Vladut, S. G., Algebraic-Geometric Codes, Kluwer, Dordrecht, 1991.
van der Geer, G. and van der Vludgt, M., Tables of curves with many points. http://www.science.uva.nl/geer/
van Lint, J. H., Introduction to coding theory, 3rd ed., Springer-Verlag, Berlin, 1999.
Webster, A. and Tavares, S., On the design of S-boxes, Advances in Cryptology, Lecture Notes in Computer Science, 218, Springer-Verlag, Berlin, Heidelberg, New York, 1985, 523–534.
Zhang, X. M. and Zheng, Y., Cryptographically resilient functions, IEEE Transactions on Information Theory, 43(5), 1997, 1740–1747.
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Natural Science Foundation of China (No. 10871068), the joint grant of the Danish National Research Foundation and the National Natural Science Foundation of China and the Shanghai Leading Academic Discipline Project (No. S30504).
Rights and permissions
About this article
Cite this article
Chen, H., Ma, L. & Li, J. Vectorial resilient PC(l) of order k Boolean functions from AG-codes. Chin. Ann. Math. Ser. B 32, 99–104 (2011). https://doi.org/10.1007/s11401-010-0621-4
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11401-010-0621-4