메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 470-482

On relationships among avalanche, nonlinearity, and correlation immunity

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84937399833     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_36     Document Type: Conference Paper
Times cited : (24)

References (26)
  • 1
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, Vol. 4, No. 1:3–72, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 4
    • 0002251636 scopus 로고
    • Partially-bent functions. Designs
    • Claude Carlet. Partially-bent functions. Designs, Codes and Cryptography, 3:135–145, 1993.
    • (1993) Codes and Cryptography , vol.3 , pp. 135-145
    • Carlet, C.1
  • 6
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15–23, 1973.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 7
    • 0024001951 scopus 로고
    • A spectral characterization of correlationimmune combining functions
    • Xiao Guo-Zhen and J. L. Massey. A spectral characterization of correlationimmune combining functions. IEEE Transactions on Information Theory, 34(3):569–571, 1988.
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.3 , pp. 569-571
    • Guo-Zhen, X.1    Massey, J.L.2
  • 15
    • 0012473975 scopus 로고
    • Nonlinearity and propagation characteristics of balanced boolean functions
    • J. Seberry, X. M. Zhang, and Y. Zheng. Nonlinearity and propagation characteristics of balanced boolean functions. Information and Computation, 119(1):1–13, 1995.
    • (1995) Information and Computation , vol.119 , Issue.1 , pp. 1-13
    • Seberry, J.1    Zhang, X.M.2    Zheng, Y.3
  • 16
    • 84890522850 scopus 로고
    • Communications theory of secrecy system. Bell Sys. Tech
    • C. E. Shannon. Communications theory of secrecy system. Bell Sys. Tech. Journal, Vol. 28:656–751, 1949.
    • (1949) Journal , vol.28 , pp. 656-751
    • Shannon, C.E.1
  • 17
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • IT-30 No. 5
    • T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30 No. 5:776–779, 1984.
    • (1984) IEEE Transactions on Information Theory , pp. 776-779
    • Siegenthaler, T.1
  • 19
  • 21
    • 0001331280 scopus 로고    scopus 로고
    • Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors
    • special issue dedicated to Gus Simmons
    • X. M. Zhang and Y. Zheng. Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors. Design, Codes and Cryptography, 7(1/2):111–134, 1996. special issue dedicated to Gus Simmons.
    • (1996) Design, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 111-134
    • Zhang, X.M.1    Zheng, Y.2
  • 25
    • 0001136230 scopus 로고    scopus 로고
    • Improved upper bound on the nonlinearity of high order correlation immune functions
    • volume xxxx of Lecture Notes in Computer Science, pages xxx–xxx. Springer-Verlag, Berlin, Heidelberg, New York, 2000. now in Preceedings
    • Y. Zheng and X. M. Zhang. Improved upper bound on the nonlinearity of high order correlation immune functions. In Selected Areas in Cryptography, 7th Annual International Workshop, SAC2000, volume xxxx of Lecture Notes in Computer Science, pages xxx–xxx. Springer-Verlag, Berlin, Heidelberg, New York, 2000. now in Preceedings pages 258-269.
    • Selected Areas in Cryptography, 7Th Annual International Workshop, SAC2000 , pp. 258-269
    • Zheng, Y.1    Zhang, X.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.