메뉴 건너뛰기




Volumn 57, Issue 5, 1996, Pages 261-263

Bounds on the number of functions satisfying the strict avalanche criterion

Author keywords

Boolean functions; Combinatorial problems; Cryptography; Enumeration; Strict Avalanche Criterion

Indexed keywords


EID: 0012978565     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/0020-0190(95)00211-1     Document Type: Article
Times cited : (9)

References (10)
  • 1
    • 84858666096 scopus 로고
    • Boolean functions satisfying a higher order strict avalanche criterion
    • T. Helleseth, ed., Advances in Cryptology - Eurocrypt '93, Springer, Berlin
    • T.W. Cusick, Boolean functions satisfying a higher order strict avalanche criterion, in: T. Helleseth, ed., Advances in Cryptology - Eurocrypt '93, Lecture Notes in Computer Science 765 (Springer, Berlin, 1994) 102-117.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 102-117
    • Cusick, T.W.1
  • 2
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • H. Feistel, Cryptography and computer privacy, Scientific American 228 (1973) 15-23.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 3
    • 85011285633 scopus 로고
    • The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
    • S. Goldwasser, ed., Advances in Cryptology - Crypto '88, Springer, Berlin
    • R. Forré, The strict avalanche criterion: spectral properties of Boolean functions and an extended definition, in: S. Goldwasser, ed., Advances in Cryptology - Crypto '88, Lecture Notes in Computer Science 403 (Springer, Berlin, 1990) 450-468.
    • (1990) Lecture Notes in Computer Science , vol.403 , pp. 450-468
    • Forré, R.1
  • 4
    • 0018530910 scopus 로고
    • A structured design of substitution-permutation encryption networks
    • J.B. Kam and G.I. Davida, A structured design of substitution-permutation encryption networks, IEEE Trans. Comput. 28 (1979) 747-753.
    • (1979) IEEE Trans. Comput. , vol.28 , pp. 747-753
    • Kam, J.B.1    Davida, G.I.2
  • 5
    • 0041532142 scopus 로고
    • Counting functions satisfying a higher order strict avalanche criterion
    • J.-J. Quisquater and J. Vandewalle, eds., Advances in Cryptology - Eurocrypt '89, Springer, Berlin
    • S. Lloyd, Counting functions satisfying a higher order strict avalanche criterion, in: J.-J. Quisquater and J. Vandewalle, eds., Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434 (Springer, Berlin, 1990) 63-74.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 63-74
    • Lloyd, S.1
  • 6
    • 0041532131 scopus 로고
    • Characterising and counting functions satisfying the strict avalanche criterion of order (n - 3)
    • C. Mitchell, ed., Clarendon Press, Oxford
    • S. Lloyd, Characterising and counting functions satisfying the strict avalanche criterion of order (n - 3), in: C. Mitchell, ed., Cryptography and Coding II (Clarendon Press, Oxford, 1992) 165-172.
    • (1992) Cryptography and Coding , vol.2 , pp. 165-172
    • Lloyd, S.1
  • 7
    • 0026630858 scopus 로고
    • Counting binary functions with certain cryptographic properties
    • S. Lloyd, Counting binary functions with certain cryptographic properties, J. Cryptology 5 (1992) 107-131.
    • (1992) J. Cryptology , vol.5 , pp. 107-131
    • Lloyd, S.1
  • 8
    • 0028699983 scopus 로고
    • An upper bound on the number of functions satisfying the strict avalanche criterion
    • L. O'Connor, An upper bound on the number of functions satisfying the Strict Avalanche Criterion, Inform. Process. Lett. 52 (1994) 325-327.
    • (1994) Inform. Process. Lett. , vol.52 , pp. 325-327
    • O'Connor, L.1
  • 9
    • 84955621100 scopus 로고
    • Propagation characteristics of boolean functions
    • I.B. Damgard, ed., Advances in Cryptology - Eurocrypt '90, Springer, Berlin
    • B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandewalle, Propagation characteristics of Boolean functions, in: I.B. Damgard, ed., Advances in Cryptology - Eurocrypt '90, Lecture Notes in Computer Science 473 (Springer, Berlin, 1991) 161-173.
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 161-173
    • Preneel, B.1    Van Leekwijck, W.2    Van Linden, L.3    Govaerts, R.4    Vandewalle, J.5
  • 10
    • 85020573990 scopus 로고
    • On the design of s-boxes
    • H.C. Williams, ed., Advances in Cryptology - Crypto '85, Springer, Berlin
    • A.F. Webster and S.E. Tavares, On the design of S-boxes, in: H.C. Williams, ed., Advances in Cryptology - Crypto '85, Lecture Notes in Computer Science 218 (Springer, Berlin, 1986) 523-534.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 523-534
    • Webster, A.F.1    Tavares, S.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.