Advertisement

Independence of Boolean Functions of Their Variables

  • Chuan-Kun Wu
  • Dengguo Feng
Chapter
  • 958 Downloads
Part of the Advances in Computer Science and Technology book series (ACST)

Abstract

This chapter studies a few different independences of Boolean functions of their variables, including algebraic independence, statistical independence, and algebraic degeneracy.

Keywords

Boolean Function Algebraically Degenerated Statistical Independence Boolean Permutation Self-correlation Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Daemen, J.: Cipher and hash function design, Strategies based on linear and differential cryptanalysis. PhD Thesis, Leuven (1995)Google Scholar
  2. 2.
    Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., et al. (eds.) Communications and Cryptography: Two Sides of One Tapestry, pp. 227–233. Kluwer Academic Publishers, Springer (1994)Google Scholar
  3. 3.
    Mitchell, C.: Enumerating Boolean functions of cryptographic significance. J. Cryptol. 2(3), 155–170 (1990)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Wu, C.K.: Boolean functions in cryptology. Ph.D. Thesis, Xidian University, Xian (1993) (in Chinese)Google Scholar
  5. 5.
    Wu, C.K.: On the independence of Boolean functions. Int. J. Comput. Math. 82(4), 415–420 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Wu, C.K., Dawson, E.: Existence of generalized inverse of linear transformations over finite fields. Finite Fields Appl. 4(4), 307–315 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Xiao, G.Z., Shen, B.Z., Wu, C.K., Wang, C.C.: Spectral techniques in coding theory. Discret. Math. 87, 181–186 (1991)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Chuan-Kun Wu
    • 1
  • Dengguo Feng
    • 2
  1. 1.Chinese Academy of SciencesState Key Lab of Information Security Institute of Information EngineeringBeijingChina
  2. 2.Chinese Academy of SciencesInstitute of SoftwareBeijingChina

Personalised recommendations