We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 781 results
  1. Characterizations and constructions of plateaued functions on finite abelian groups

    Plateaued functions have been studied in many papers. They can be candidates for designing cryptographic functions and have been used to construct...

    Article 17 November 2022
  2. Several Classes of Niho Type Boolean Functions with Few Walsh Transform Values

    Boolean functions with n variables are functions from \(\mathbb {f}_{2^n}\)...
    Yanan Wu, Nian Li, ... Yuhua Cai in Information Security and Cryptology
    Conference paper 2023
  3. Boolean Functions with a Few Walsh Transform Values

    Boolean functions have been extensively studied in coding theory, cryptography, sequence design and graph theory. By adding two products of three...
    Wengang **, **aoni Du, ... Yanzhong Sun in Advances in Artificial Intelligence and Security
    Conference paper 2021
  4. Combinatorial t-designs from special functions

    A special function is a function either of special form or with a special property. Special functions have interesting applications in coding theory...

    Cunsheng Ding, Chunming Tang in Cryptography and Communications
    Article 18 June 2020
  5. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
  6. Editorial: Special issue on Boolean functions and their applications 2021

    Lilya Budaghyan, Claude Carlet, ... Tor Helleseth in Cryptography and Communications
    Article 13 September 2022
  7. On the Algebraic Immunity of Weightwise Perfectly Balanced Functions

    In this article we study the Algebraic Immunity (AI) of Weightwise Perfectly Balanced (WPB) functions. After showing a lower bound on the AI of two...
    Agnese Gini, Pierrick Méaux in Progress in Cryptology – LATINCRYPT 2023
    Conference paper 2023
  8. Further projective binary linear codes derived from two-to-one functions and their duals

    Binary linear codes with few weights have wide applications in communication, secret sharing schemes, authentication codes, association schemes,...

    Sihem Mesnager, Liqin Qian, **wang Cao in Designs, Codes and Cryptography
    Article 10 October 2022
  9. Shifted plateaued functions and their differential properties

    Nurdagül Anbar, Canan Kaşıkçı, ... Alev Topuzoğlu in Cryptography and Communications
    Article 23 March 2020
  10. Cooperative coati optimization algorithm with transfer functions for feature selection and knapsack problems

    Coatis optimization algorithm (COA) has recently emerged as an innovative meta-heuristic algorithm (MA) for global optimization, garnering...

    Rui Zhong, Chao Zhang, Jun Yu in Knowledge and Information Systems
    Article 15 July 2024
  11. Frobenius linear translators giving rise to new infinite classes of permutations and bent functions

    We show the existence of many infinite classes of permutations over finite fields and bent functions by extending the notion of linear translators,...

    N. Cepak, E. Pasalic, A. Muratović-Ribić in Cryptography and Communications
    Article 24 August 2019
  12. Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra

    Aaronson defined Forrelation (2010) as a measure of correlation between a Boolean function f and the Walsh–Hadamard transform  of another function ...

    Suman Dutta, Subhamoy Maitra in Designs, Codes and Cryptography
    Article 27 December 2023
  13. On the boomerang uniformity of quadratic permutations

    At Eurocrypt’18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of...

    Sihem Mesnager, Chunming Tang, Maosheng **ong in Designs, Codes and Cryptography
    Article 18 June 2020
  14. On APN Functions Whose Graphs are Maximal Sidon Sets

    The graphs \(\mathcal{G}_F=\{(x,F(x)); x\in \mathbb {F}_2^n\}\)...
    Conference paper 2022
  15. Some conditions for absence of affine functions in NFSR output stream

    Nonlinear feedback shift registers (NFSR) are widely used in cryptography as the source of pseudo-random sequences used in ciphers. The nature of the...

    Michail I. Rozhkov, Alexander V. Sorokin in Designs, Codes and Cryptography
    Article 07 September 2021
  16. A new lower bound on the second-order nonlinearity of a class of monomial bent functions

    The second-order nonlinearity can provide knowledge on classes of Boolean functions used in symmetric-key cryptosystems, coding theory, and Gowers...

    Deng Tang, Haode Yan, ... **aosong Zhang in Cryptography and Communications
    Article 11 May 2019
  17. New sets of non-orthogonal spreading sequences with low correlation and low PAPR using extended Boolean functions

    Extended Boolean functions (EBFs) are one of the most important tools in cryptography and spreading sequence design in communication systems. In this...

    Kaiqiang Liu, Zhengchun Zhou, ... Rong Luo in Designs, Codes and Cryptography
    Article 27 May 2023
Did you find what you were looking for? Share feedback.