We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 45 results
  1. Lexicographically maximal edges of dual hypergraphs and Nash-solvability of tight game forms

    We prove a new property of dual hypergraphs and derive from it Nash-solvability of the corresponding (tight) game forms. This result is known since...

    Vladimir Gurvich, Mariya Naumova in Annals of Mathematics and Artificial Intelligence
    Article 19 October 2022
  2. On those Boolean functions that are coset leaders of first order Reed-Muller codes

    In this paper, we study the class of those Boolean functions that are coset leaders of first order Reed-Muller codes. We study their properties and...

    Claude Carlet, Serge Feukoua in Annals of Mathematics and Artificial Intelligence
    Article 25 April 2023
  3. Critical Properties and Complexity Measures of Read-Once Boolean Functions

    In this paper, we define a quasi-order on the set of read-once Boolean functions and show that this is a well-quasi-order. This implies that every...

    Vadim Lozin, Mikhail Moshkov in Annals of Mathematics and Artificial Intelligence
    Article Open access 22 March 2021
  4. How Low can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?

    It has long been known that any Boolean function that depends on n input variables has both degree and exact quantum query complexity of Ω(log n ),...

    Andris Ambainis, Ronald de Wolf in computational complexity
    Article 09 May 2014
  5. Hardness results for approximate pure Horn CNF formulae minimization

    We study the hardness of approximation of clause minimum and literal minimum representations of pure Horn functions in n Boolean variables. We show...

    Endre Boros, Aritanan Gruber in Annals of Mathematics and Artificial Intelligence
    Article 07 May 2014
  6. A non-cyclic triple-error-correcting BCH-like code and some minimum distance results

    In this paper, we give the first example of a non-cyclic triple-error-correcting code which is not equivalent to the primitive BCH code. It has...

    Carl Bracken, Faruk Göloğlu in Designs, Codes and Cryptography
    Article 13 November 2012
  7. Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1)

    In this paper, by means of the idea proposed by Carlet (ACISP 1-15, 2011 ), differentially 4-uniform permutations with the best known nonlinearity...

    Yongqiang Li, Mingsheng Wang in Designs, Codes and Cryptography
    Article 25 October 2012
  8. Towards the classification of self-dual bent functions in eight variables

    In this paper, we classify quadratic and cubic self-dual bent functions in eight variables with the help of computers. There are exactly four and 45...

    Thomas Feulner, Lin Sok, ... Alfred Wassermann in Designs, Codes and Cryptography
    Article 08 September 2012
  9. A construction of bent functions from plateaued functions

    In this presentation, a technique for constructing bent functions from plateaued functions is introduced and analyzed. This generalizes earlier...

    Ayça Çeşmelioğlu, Wilfried Meidl in Designs, Codes and Cryptography
    Article 17 May 2012
  10. A new construction of bent functions based on \({\mathbb{Z}}\) -bent functions

    Dobbertin has embedded the problem of construction of bent functions in a recursive framework by using a generalization of bent functions called ...

    Sugata Gangopadhyay, Anand Joshi, ... Rajendra Kumar Sharma in Designs, Codes and Cryptography
    Article 31 May 2012
  11. On CCZ-equivalence of addition mod 2 n

    We show that addition mod 2 n is CCZ-equivalent to a quadratic vectorial Boolean function. We use this to reduce the solution of systems of...

    Ernst Schulte-Geers in Designs, Codes and Cryptography
    Article 25 May 2012
  12. On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity

    Recently, two classes of Boolean functions with optimal algebraic immunity have been proposed by Carlet et al. and Wang et al., respectively....

    Hua** Chen, Tian Tian, Wenfeng Qi in Designs, Codes and Cryptography
    Article 26 January 2012
  13. Bent and generalized bent Boolean functions

    Pantelimon Stănică, Thor Martinsen, ... Brajesh Kumar Singh in Designs, Codes and Cryptography
    Article 12 February 2012
  14. Geometric and design-theoretic aspects of semibent functions II

    This article is the successor of Dempwolff and Neumann (Des. Codes Cryptogr. 57:373–381, 2010 ). We now consider semibent functions with a linear...

    Ulrich Dempwolff in Designs, Codes and Cryptography
    Article 10 May 2011
  15. Affine equivalence for rotation symmetric Boolean functions with 2 k variables

    Rotation symmetric Boolean functions have been extensively studied in the last 10 years or so because of their importance in cryptography and coding...

    Thomas W. Cusick, Younhwan Cheon in Designs, Codes and Cryptography
    Article 21 August 2011
  16. Counting all bent functions in dimension eight 99270589265934370305785861242880

    Based on the classification of the homogeneous Boolean functions of degree 4 in 8 variables we present the strategy that we used to count the number...

    Philippe Langevin, Gregor Leander in Designs, Codes and Cryptography
    Article 19 December 2010
  17. Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions

    We survey the properties of two parameters introduced by C. Ding and the author for quantifying the balancedness of vectorial functions and of their...

    Article 06 January 2011
  18. Geometric and design-theoretic aspects of semibent functions I

    The two parts of this paper consider combinatorial and geometric aspects of semibent functions. In the first part of this note we obtain 2-designs...

    Ulrich Dempwolff, Timo Neumann in Designs, Codes and Cryptography
    Article 10 March 2010
Did you find what you were looking for? Share feedback.