Boolean Functions Whose Restrictions are Highly Nonlinear
|
|
- Mavis Cunningham
- 5 years ago
- Views:
Transcription
1 Boolean Functions Whose Restrictions are Highly Nonlinear Constanza Riera Høgskolen i Bergen Nygårdsgt. Bergen 58, Norway csr@hib.no Matthew G. Parker Selmer Centre, nst. for nformatikk University of Bergen Bergen 5, Norway matthew@ii.uib.no Abstract We construct Boolean functions whose non-trivial restrictions are either highly nonlinear with respect to the Walsh- Hadamard or the negahadamard transform. We generalise these properties, identify group actions that preserve them, obtain complementary sets from our functions.. NTRODUCTON This paper investigates spectral properties of basic classes of Boolean function. Typical cryptanalysis considers Walsh- Hadamard spectra of Boolean functions, we examine spectra with respect to more general transform sets. This is one in a series of papers that tackles such ideas [], [4], [8] []. We also propose two new types of multivariate complementary set to add to the one proposed in [7]. The first construction generates Boolean functions whose restrictions remain highly nonlinear with respect to the Walsh-Hadamard transform WHT. We then modify the construction so that, instead, the restrictions remain highly nonlinear with respect to the negahadamard transform NHT. Re-expressing these results in terms of unitary matrices facilitates a significant generalisation, where each of the two constructions is shown to retain its spectral properties with respect to an infinite class of unitary transforms. We highlight unitary group actions that preserve the spectral properties of the two constructions, show that each of the two constructions leads to a new type of multivariate complementary set.. BACKGROUND Denote the set of Boolean functions in m variables by B m. Let S {,,..., m } := {s, s,..., s t } be an ordered set of size t m, let S := {,,..., m } \ S. Let x S := x s, x s,..., x st F t. For f B m, a F t, a constant, the restriction of fx to x S = a is denoted by f a,s B m t, satisfies f a,s x S = fx if x S = a, is undefined otherwise. The Walsh-Hadamard spectrum of f a,s is defined as `F a,sw H := t m x F m t f a,sx+x w, where w F m t, x w := m i= x iw i. Denote `F H S := { `F H a,s a Ft } as the set of t Walsh-Hadamard spectra of the restrictions of fx to x S. The nonlinearity of f a,s is given by nlf a,s := m t m t `F H a,sw. nl is not so useful for comparing nonlinearities over all choices of S, so instead we propose peak-to-average power ratio, P H `f, where `f := f, P H `f a,s := `F H a,sw, nlf a,s = m t m t P H `f a,s. Define peak-to-average power ratio over all restrictions of `f by PH r `f := P H `f a,s, a F S,S {,,...,m } where PH r `f m. Construction generates functions, f B n, from functions, f B m, n > m, that satisfy PH r `f m, irrespective of the size of n relative to m. A. Construction. CONSTRUCTONS Let K := {K, K,..., K m } be an m-wise partition of {,,..., n }, where m i= K i = {,,..., n }, K i K j =, i j. Let k := k, k,..., k m, k j := K j, j, K j := m x i x l B n, K := K j. Let y := i,l K j,i<l j= y, y,..., y m, where y j := i K j x i, j < m. For f B m, define the expansion of f with respect to K by f K := fy B n, abbreviate to f if K is clear from context. Construction : f x = f + K. Construction is reserved for functions described in [7].
2 For f so constructed, we can show that P r H `f = P r H `f m. 3 We defer proofs of 3 6 until the end of section V. For n m, Construction generates functions, f, whose nontrivial restrictions are highly nonlinear with respect to the WHT. Proposition 38 of [] is a sub-case of Construction, where degf, all k j are equal. Example: Let f := x x + x x B 3. Then f, = f, f,{} = x x, f,{} = x x + x, f,{} =, f,{} = x + x, f,{} = x x, f,{} = x x + x, f,{,} = f,{,} = f,{,} = f,{,} = f,{,} =, f,{,} = x, f,{,} = x +, f,{,} = f,{,} = x, f,{,} = x, f,{,} = x +, f,{,,} = f,{,,} = f,{,,} = f,{,,} = f,{,,} = f,{,,} =, f,{,,} = f,{,,} =. Computations give, a, P H `f, = P H `f a,{,} = P H `f a,{,} = P H `f a,{,} =, P H `f a,{} = P H `f a,{} = P H `f a,{,,} =, P H `f a,{} = 4. So P r H `f = 4. Let K := {, 3}{, 4}{, 5}. Then, by, f = x + x 3 x + x 4 + x + x 4 x + x 5, K = x x 3 + x x 4 + x x 5, f = x x +x x 3 +x x 4 +x x +x x 3 +x x 4 +x x 5 + x x 4 + x x 5 + x 3 x 4 + x 4 x 5. One can verify that P r H `f = P r H `f = 4, in agreement with 3. B. Construction Define the negahadamard spectrum of f a,s as `F a,sw N := t m i f a,sx+x w+ wtx, 4 x F m t where i := wt. denotes Hamming weight. Denote `F S N := { `F a,s N a Ft } as the set of t negahadamard spectra of the restrictions of fx to x S. Define peak-toaverage power ratio of `f a,s with respect to the NHT by, P N `f a,s := `F N a,sw, peak-to-average power ratio over all restrictions of `f by PN r `f := P N `f a,s, where P r N `f m. a F S,S {,,...,m } Construction : f. 5 For f B n, we can show that P r N `f = P r N `f m. 6 So, for n m, Construction generates functions, f, whose restrictions are highly nonlinear with respect to the NHT. Example continued: Computations give, a, P N `f a,{} = P N `f a,{} =, P N `f, = P N `f a,{} = P N `f a,{,} = P N `f a,{,} = P N `f a,{,} = P N `f a,{,,} =. So P r N `f =. One can verify that P r N `f = P r N `f =, in agreement with 6. n section V we establish peak-to-average properties of Constructions with respect to an infinitely larger set of transforms than just WHT NHT. To do so we first recast `F H S `F N S in terms of unitary matrices. This clarifies subsequent generalisations. V. MATRX CHARACTERSATON nterpret `f = f as an m-variate array, `f C m, with elements indexed by members of F m, i.e. `f j := fj, j F m. Define unitary matrices H :=, :=. Comparing with, the WHT of fa,s C m t is given by `F H a,s := H m t `fa,s, 7 where `F a,s H C m t, H l = l i= H is the l-fold tensor product of H with itself, such that the wth element of `F a,s H is given by `F a,s,w H = `F a,s H w, w Fm t. Let m m unitary, U j, denote m-fold tensor product U j :=... U..., with unitary, U, being in the jth position from the left numbering from zero. For S {,,..., m }, let U S := j S U j, 3. Then `F S H C m, the concatenation of `F a,s H, a Ft, is given by `F H S := H S `f = `F H a,s, a F t, 8 P r H `f := S {,,...,m },w F m Example continued: For S = {, }, `F,S H = H `f,s = H `F,S H = H `f,s = H `F,S H = H `f,s = H `F,S H = H `f,s = H Therefore, `F H S = H S `f = `F H S,w. = = = = =,,,,,,, T.. Similarly, for S = {}, we get `F H S =,,,,,,, T. Computing over all subsets, S, we establish, as before, that P r H `f = 4, where the imum occurs for S = {}. A unitary matrix, U, satisfies UU = for the identity. 3 A BC D = AC BD, so U j U k =... U... U... = U k U j, for j k, U, U unitaries.
3 Define unitary N := i i. Comparing with 4, the NHT of f a,s C m t is given by `F N a,s := N m t `fa,s, 9 The concatenation of `F N a,s, a Ft, is given by `F N S := N S `f = `F N a,s, a F t, P r N `f := S {,,...,m },w F m Example continued: For S = {}, `F,S N = N `f,s = N `F,S N = N `f,s = N Therefore, `F N S = N S `f = `F N S,w. = = i i i i i i i i i i i i i i i i = + i,,, i,, i, + i, T. W W,w F m + i i i + i. For W a set of m m unitaries, define peak-to-average power ratio of `f with respect to W by P W `f := W `f w. Let D be the set of all n n unitaries where any member of D only has one non-zero entry per row column. Let U be a set of n n unitaries, DU be the set of n n unitaries, {DW, D D, W U}. Then, for h B n, P U `h = P DU `h. We abbreviate, D D, this equivalence by DU U, DU`h U`h. Proof: of sketch Let V := m j= V j, where V j K j. Let O V := {j V j odd}. Then we can show that H V `f H OV `f NV f ` NOV `f, so over all choices for V, the spectral elements with respect to the WHT resp. NHT of the restrictions of `f resp. `f, comprise, to within phase position, multiplicities of the spectral elements with respect to the WHT resp. NHT of the restrictions of `f, where magnitudes are unchanged 4. 4 n particular, the proof implies that `f f are bent negabent, respectively, for k j even j. V. GENERALSED NONLNEARTES For V a set of unitaries we say that W iff W = n j= U j, U j V, j. Using this notation, P {,H} m `f = PH r `f, P {,N} m `f = PN r `f. Let V := { cos θ sin θ sin θ cos θ, θ R}, V := { cos θ i sin θ sin θ i cos θ, θ R}, be infinite sets of unitaries, called type-, type- unitaries, respectively [], [8], [9]. We can show that `f m. `f m. 3 By, equations 3 have 3 6, respectively, as special cases as, for any S {,,..., n }, H S {, H} {D, D D} N S {, N} {D, D D}. To sketch proofs for 3, we introduce Type- unitaries, V = { α, α = }. α Let #`h be the number of non-zero elements of `h. The following results are critical to our proofs. #N `f m. 4 #H `f m. 5 Remark : Every entry of every matrix in has the same magnitude. Proof: for - sketch From 4 Remark, it follows that N `f m. follows by observing that V NV. Proof: for 3 - sketch From 5 Remark, it follows that H `f m. 3 follows by observing that V HV. V. GROUP ACTONS PRESERVNG NONLNEARTY Constructions give `f `f, for which 3 hold, respectively. Furthermore, groups exist under whose action properties 3 are preserved. First we establish matrix representations for these groups. V group V ZV is a matrix group as, for U V, UV ZV. Affine group Two Boolean functions f, g B n are affine equivalent if gx = fax + b + d x + c, 6 for A a binary invertible n n matrix, b, d F n c F. We recast affine equivalence by the affine group in matrix form. Let X :=, Z :=, Y := XZ =, be unitary Pauli matrices. Define Xj k := = δ z,uz, where u =, z = x j, x k T, i.e. elements of Xj k are one at positions z, uz zero otherwise, z F - one should remember that matrix Xj k C C is a matrix with
4 both rows columns indexed by elements from F. Define matrix group 5, A n =, X j, Z j, Xj k, j, k {,,..., n }, j k. Then f, g B n are affine equivalent iff W A n, such that `f = W `g. Extended orthogonal group The functions f, g B n are extended orthogonal equivalent if 6 holds for AA T =, b = d of even weight. Define V,,,3 as the 4 4 unitary, V,,,3 := δ z,uz, where u =, z = x, x, x, x 3 T. Based on theorem 9 of [5], the orthogonal group has the following unitary representation for n > 4, O n := V,,,3, P j,k, j, k {,,..., n }, j k, where P j,k is the 4 4 permutation matrix swapping tensor positions j k, i.e. P j,k := = δ z,uz, where u =, z = xj, x k T. Repeated action of P j,k at various pairs, j, k, generates the symmetric group, S n The extended orthogonal group, E n, for n > 4, has the following matrix representation, E n :=, V,,,3, Y j,k, P j,k, j, k {,,..., n }, j k, where Y j,k := takes the role of evenweight vector b = d in 6. Then f, g B n are extended orthogonal equivalent iff W E n, such that `f = W `g. Observe that O n E n A n. Type- invariance V ZV is a group so W `f = `f, W. 7 n general there exist W {, H} h B n, such that `h = W `f. But it is currently unclear to us whether W {D, D D}, W {, H}, such that `h = W `f. W `f =, W E n. 8 Proof: of 8, sketch One can verify that N 4 V,,,3 N 4, N Y j,k N, N P j,k N so, for W E n, N W `f N `f, the proof follows, like, by Remark 4. Type- invariance W ` f = f, ` W A n. 9 Proof: of 9, sketch One can verify that H Xj k H, HX H, HZ H so, for W A n, H W f ` H f, ` the proof follows, like 3, by remark 5. 5 We use to encompass group generators, as is used in this paper for expansion. V. COMPLEMENTARY SETS A size m complementary set, CW n := {f j j F m }, of arrays, f j C, with respect to a set, W, of n n unitaries is defined by the property, W,j `F w = m, w F n, W W, j F m where `F W,j = W `f j. Previous work [7] proposed Construction for a set of functions, h F n, where, for n = tm, t h = θ i z i θ i+ z i+ + g i z i, i= where z i = x im, x im+, +..., x i+m F m, θ i : F m F m, are permutations, g i z i B m. These functions satisfy, `h m. Let = {h + j z t j F m }. Then C n is a type- complementary set of size m. Constructions similarly lead to complementary sets. For y = y, y,..., y m, y j = i K j x i, let = {f + j y j F m }. Then C n is a type- complementary set of size m. For some fixed r {,,..., m }, let y r = y, y,..., y r, y r+,..., y m, = { f + j y r j F m }. Then C n is a type- complementary set of size m. Observe that the upper bounds of 3 follow immediately from the fact that C n C n are complementary sets of type- type-, respectively. V. FNAL COMMENTS Construction may be a step towards the difficult problem of constructing cryptographically-interesting k-normal Boolean functions, k n/, for which infinite constructions do not yet exist [3], [6], where any function affineequivalent to such a function remains nonlinear up to kthorder restrictions. n contrast, Construction yields a basic class of functions whose non-trivial restrictions only remain nonlinear up to extended-orthogonal equivalence, where the extended-orthogonal group is a subgroup of the affine group. Construction is a generalisation of the class of affine functions. The constructions properties mentioned herein focus on Boolean functions, but all results carry over, without modification, to generalised Boolean functions, where one constructs, from `f : F m C, functions `f, `f : F n C, where `f x = `f x `Kx. The set of functions constructed using is much larger than that constructed using or 5 6, even if one takes 6 Moreover, section 5 of [7] identifies a further generalisation of.
5 into account symmetries 7, 8, 9, suggesting that Constructions might be generalised further. REFERENCES [] R. Arratia, B. Bollobas, G. B. Sorkin, The nterlace Polynomial of a Graph, J. Combin. Theory Ser. B, 9,, 99 33, 4. [] Tor E. Bjørstad, Matthew G. Parker, Equivalence Between Certain Complementary Pairs of Types, in Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, Vol. 3, NATO Science for Peace Security Series, 9. [3] A. Canteaut, M. Daum, H. Dobbertin, G. Leer, Finding nonnormal bent functions, Discrete Applied Mathematics, 54 8, 6. [4] Lars Eirik Danielsen, Matthew G. Parker, Spectral orbits peak-toaverage power ratio of Boolean functions with respect to the, H, N n transform, Lecture Notes in Computer Science, LNCS 3486, , 5. [5] Gerald J. Janusz, Parametrization of self-dual codes by orthogonal matrices, Finite Fields Their Applications, 3, 3, 45 49, 7. [6] Gregor Leer, Gary McGuire, Construction of bent functions from nearbent functions, Journal of Comb. Theory, Series A , 9. [7] Matthew G. Parker, Chintha Tellambura, A Construction for Binary Sequence Sets with Low Peak-to-Average Power Ratio, Reports in nformatics, University of Bergen, 4, Feb publikasjoner/texrap/ps/3-4.ps. [8] Matthew G. Parker, Close encounters with Boolean functions of three different kinds, Lecture Notes in Computer Science, LNCS 58, 5 9 Sept. 8. [9] Matthew G. Parker, Polynomial Residue Systems via Unitary Transforms, to appear in post-proceedings of Contact Forum Coding Theory Cryptography, Brussels, 9. matthew/prnsunitary. pdf [] Constanza Riera, Matthew G. Parker, Generalised Bent Criteria for Boolean Functions, EEE Trans nform. Theory, 5, 9, , Sept. 6.
Polynomial Residue Systems via Unitary Transforms Matthew G. Parker
Polynomial Residue Systems via Unitary Transforms Matthew G. Parker Selmer Centre, Inst. for Informatikk, Høyteknologisenteret i Bergen, University of Bergen, Bergen 500, Norway Email: matthew@ii.uib.no
More informationOn Boolean functions which are bent and negabent
On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra
More informationGeneralised Rudin-Shapiro Constructions
Generalised Rudin-Shapiro Constructions Matthew G. Parker 1 Code Theory Group, Inst. for Informatikk, Høyteknologisenteret i Bergen, University of Bergen, Bergen 5020, Norway. E-mail: matthew@ii.uib.no.
More informationSELF DUAL BENT FUNCTIONS
Boolean Functions: Cryptography and Applications Fonctions Booléennes : Cryptographie & Applications BFCA 08 SELF DUAL BENT FUNCTIONS Claude Carlet 1, Lars Eirik Danielsen 2, Matthew Geoffrey Parker 2
More informationCharacterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree
Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree 1 Wei Su Alexander Pott and Xiaohu Tang arxiv:105.6568v1 [cs.it] 30 May 01 Abstract We present
More informationA New Class of Bent Negabent Boolean Functions
A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com
More informationMatthew G. Parker, Gaofei Wu. January 29, 2015
Constructions for complementary and near-complementary arrays and sequences using MUBs and tight frames, respectively Matthew G. Parker, Gaofei Wu The Selmer Center, Department of Informatics, University
More informationComplete characterization of generalized bent and 2 k -bent Boolean functions
Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean
More informationMixed graph states. Constanza Riera, Ramij Rahaman, Matthew G. Parker
Mixed graph states Constanza Riera Ramij Rahaman Matthew G. Parker March 20 2018 arxiv:1506.03635v2 [quant-ph] 16 Mar 2016 1 Introduction The quantum graph state[1] is a pure quantum n-qubit state whose
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationAperiodic Propagation Criteria for Boolean Functions
1 Aperiodic Propagation Criteria for Boolean Functions Lars Eirik Danielsen, T. Aaron Gulliver, and Matthew G. Parker Abstract We characterise aperiodic autocorrelation for a boolean function, f, and define
More informationSmart Hill Climbing Finds Better Boolean Functions
Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,
More informationGENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay
Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationGolay-Davis-Jedwab Complementary Sequences and Rudin-Shapiro Constructions
Golay-Davis-Jedwab Complementary Sequences and Rudin-Shapiro Constructions Matthew G. Parker and C. Tellambura March 6, 2001 5.3.01, M.G.Parker, ConstaBent2.tex Abstract A Golay Complementary Sequence
More informationCONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial
More informationSome Results on the Known Classes of Quadratic APN Functions
Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no
More informationSelf-Dual Cyclic Codes
Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace
More informationAPPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.
APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationUniversity of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center
University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center A DATABASE FOR BOOLEAN FUNCTIONS AND CONSTRUCTIONS OF GENERALIZED COMPLEMENTARY PAIRS by Mohamed
More informationThe Classification of Clifford Gates over Qubits
The Classification of Clifford Gates over Qubits Daniel Grier, Luke Schaeffer MIT Introduction Section 1 Introduction Classification Introduction Idea Study universality by finding non-universal gate sets.
More informationEquivalence Between Certain Complementary Pairs of Types I and III
Equivalence Between Certain Complementary Pairs of Types I and III TOR E. BJØRSTAD a and MATTHEW G PARKER a, a Selmer Center, University of Bergen, Norway Abstract. Building on a recent paper which defined
More informationarxiv:math/ v1 [math.co] 24 Oct 2000
arxiv:math/0010220v1 [math.co] 24 Oct 2000 Nonlinearity, Local and Global Avalanche Characteristics of Balanced Boolean Functions Abstract Pantelimon Stănică Auburn University Montgomery, Department of
More informationA Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationCharacterizations of the differential uniformity of vectorial functions by the Walsh transform
Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis
More informationOn the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010
Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ
More informationThe Analysis of affinely Equivalent Boolean Functions
The Analysis of affinely Equivalent Boolean Functions Qing-shu Meng Min Yang Huan-guo Zhang Yuzhen Liu October 21, 2005 Abstract By Walsh transform, autocorrelation function, decomposition, derivation
More informationConstruction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4
More informationHaar Spectrum of Bent Boolean Functions
Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationFast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function
Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions
More informationAutomorphism group of the set of all bent functions
Automorphism group of the set of all bent functions Natalia N. Tokareva 1 Sobolev Institute of Mathematics, Novosibirsk State University, Novosibirsk, Russian Federation e-mail: tokareva@math.nsc.ru Abstract.
More informationBoolean Inner-Product Spaces and Boolean Matrices
Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver
More informationMath 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces.
Math 350 Fall 2011 Notes about inner product spaces In this notes we state and prove some important properties of inner product spaces. First, recall the dot product on R n : if x, y R n, say x = (x 1,...,
More informationSemifields, Relative Difference Sets, and Bent Functions
Semifields, Relative Difference Sets, and Bent Functions Alexander Pott Otto-von-Guericke-University Magdeburg December 09, 2013 1 / 34 Outline, or: 2 / 34 Outline, or: Why I am nervous 2 / 34 Outline,
More informationLecture Notes on Cryptographic Boolean Functions
Lecture Notes on Cryptographic Boolean Functions Anne Canteaut Inria, Paris, France Anne.Canteaut@inria.fr https://www.rocq.inria.fr/secret/anne.canteaut/ version: March 10, 016 Contents 1 Boolean functions
More informationSome results on the existence of t-all-or-nothing transforms over arbitrary alphabets
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of
More informationFourier Spectra of Binomial APN Functions
Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra
More informationarxiv: v1 [math.co] 3 Nov 2014
SPARSE MATRICES DESCRIBING ITERATIONS OF INTEGER-VALUED FUNCTIONS BERND C. KELLNER arxiv:1411.0590v1 [math.co] 3 Nov 014 Abstract. We consider iterations of integer-valued functions φ, which have no fixed
More informationOn structural properties of the class of bent functions
On structural properties of the class of bent functions Natalia Tokareva Sobolev Institute of Mathematics, Novosibirsk State University Russia tokareva@math.nsc.ru Maximally nonlinear Boolean functions
More informationMaiorana-McFarland class: Degree optimization and algebraic properties
Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,
More informationIntroduction to Decision Sciences Lecture 6
Introduction to Decision Sciences Lecture 6 Andrew Nobel September 21, 2017 Functions Functions Given: Sets A and B, possibly different Definition: A function f : A B is a rule that assigns every element
More informationImproved Zero-sum Distinguisher for Full Round Keccak-f Permutation
Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Ming Duan 12 and Xuejia Lai 1 1 Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. 2 Basic Courses
More informationMIT Algebraic techniques and semidefinite optimization May 9, Lecture 21. Lecturer: Pablo A. Parrilo Scribe:???
MIT 6.972 Algebraic techniques and semidefinite optimization May 9, 2006 Lecture 2 Lecturer: Pablo A. Parrilo Scribe:??? In this lecture we study techniques to exploit the symmetry that can be present
More informationOn Existence and Invariant of Algebraic Attacks
On Existence and Invariant of Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationLecture notes on Quantum Computing. Chapter 1 Mathematical Background
Lecture notes on Quantum Computing Chapter 1 Mathematical Background Vector states of a quantum system with n physical states are represented by unique vectors in C n, the set of n 1 column vectors 1 For
More informationPh 219b/CS 219b. Exercises Due: Wednesday 20 November 2013
1 h 219b/CS 219b Exercises Due: Wednesday 20 November 2013 3.1 Universal quantum gates I In this exercise and the two that follow, we will establish that several simple sets of gates are universal for
More informationQuantum Computing Lecture 2. Review of Linear Algebra
Quantum Computing Lecture 2 Review of Linear Algebra Maris Ozols Linear algebra States of a quantum system form a vector space and their transformations are described by linear operators Vector spaces
More informationQuantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity
Quantum Computing 1. Quantum States and Quantum Gates 2. Multiple Qubits and Entangled States 3. Quantum Gate Arrays 4. Quantum Parallelism 5. Examples of Quantum Algorithms 1. Grover s Unstructured Search
More informationMathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations
Mathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations D. R. Wilkins Academic Year 1996-7 1 Number Systems and Matrix Algebra Integers The whole numbers 0, ±1, ±2, ±3, ±4,...
More informationOn Walsh transform and matrix factorization 1
Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 55-60 On Walsh transform and matrix factorization 1 Iliya Bouyukliev iliyab@math.bas.bg Paskal Piperkov
More informationMath113: Linear Algebra. Beifang Chen
Math3: Linear Algebra Beifang Chen Spring 26 Contents Systems of Linear Equations 3 Systems of Linear Equations 3 Linear Systems 3 2 Geometric Interpretation 3 3 Matrices of Linear Systems 4 4 Elementary
More informationThe Quantum Entanglement of Binary and Bipolar Sequences
The Quantum Entanglement of Binary and Bipolar Sequences Matthew G. Parker 1 and V. Rijmen 2 1 Inst. for Informatikk, University of Bergen, Norway, matthew@ii.uib.no, http://www.ii.uib.no/ matthew/mattweb.html
More informationCOUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS
italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationDIFFERENTIAL cryptanalysis is the first statistical attack
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of
More informationAlgebraic structures I
MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one
More informationGeneralised Bent Criteria for Boolean Functions (I)
Generalised Bent Criteria for Boolean Functions I) Constanza Riera, Matthew G. Parker 1 Abstract arxiv:cs/050049v1 [cs.it] 9 Feb 005 Generalisations of the bent property of a boolean function are presented,
More informationOn The Nonlinearity of Maximum-length NFSR Feedbacks
On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main
More informationOpen problems related to algebraic attacks on stream ciphers
Open problems related to algebraic attacks on stream ciphers Anne Canteaut INRIA - projet CODES B.P. 105 78153 Le Chesnay cedex - France e-mail: Anne.Canteaut@inria.fr Abstract The recently developed algebraic
More informationRandom Edge-Local Complementation With Applications to Iterative Decoding of High-Density Parity-Check Codes
1 Random Edge-Local Complementation With Applications to Iterative Decoding of High-Density Parity-Check Codes Joakim Grahl Knudsen, Constanza Riera, Lars Eirik Danielsen, Matthew G. Parker, and Eirik
More information50 Years of Crosscorrelation of m-sequences
50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation
More informationCCZ-equivalence and Boolean functions
CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence
More information2. Linear algebra. matrices and vectors. linear equations. range and nullspace of matrices. function of vectors, gradient and Hessian
FE661 - Statistical Methods for Financial Engineering 2. Linear algebra Jitkomut Songsiri matrices and vectors linear equations range and nullspace of matrices function of vectors, gradient and Hessian
More informationA construction of Boolean functions with good cryptographic properties
A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,
More informationConstructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and
More informationFourier analysis of boolean functions in quantum computation
Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge
More informationHyperbent functions, Kloosterman sums and Dickson polynomials
Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department
More informationThe Interlace Polynomial of Graphs at 1
The Interlace Polynomial of Graphs at 1 PN Balister B Bollobás J Cutler L Pebody July 3, 2002 Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152 USA Abstract In this paper we
More informationA Framework for the Construction of Golay Sequences
1 A Framework for the Construction of Golay Sequences Frank Fiedler, Jonathan Jedwab, and Matthew G Parker Abstract In 1999 Davis and Jedwab gave an explicit algebraic normal form for m! h(m+) ordered
More informationarxiv: v5 [cs.it] 4 Nov 2009
1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]
More informationConstructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date
More informationLinear Algebra: Matrix Eigenvalue Problems
CHAPTER8 Linear Algebra: Matrix Eigenvalue Problems Chapter 8 p1 A matrix eigenvalue problem considers the vector equation (1) Ax = λx. 8.0 Linear Algebra: Matrix Eigenvalue Problems Here A is a given
More informationLINEAR ALGEBRA REVIEW
LINEAR ALGEBRA REVIEW JC Stuff you should know for the exam. 1. Basics on vector spaces (1) F n is the set of all n-tuples (a 1,... a n ) with a i F. It forms a VS with the operations of + and scalar multiplication
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationNew quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices
New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices Carl Bracken, Gary McGuire Department of Mathematics, National University of Ireland, Maynooth, Co.
More informationCHAPTER I. Rings. Definition A ring R is a set with two binary operations, addition + and
CHAPTER I Rings 1.1 Definitions and Examples Definition 1.1.1. A ring R is a set with two binary operations, addition + and multiplication satisfying the following conditions for all a, b, c in R : (i)
More informationConstructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, PP 1638-1651, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member,
More informationStatistical and Linear Independence of Binary Random Variables
Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.
More informationChapter 2. Optimization. Gradients, convexity, and ALS
Chapter 2 Optimization Gradients, convexity, and ALS Contents Background Gradient descent Stochastic gradient descent Newton s method Alternating least squares KKT conditions 2 Motivation We can solve
More informationDERIVATIONS. Introduction to non-associative algebra. Playing havoc with the product rule? BERNARD RUSSO University of California, Irvine
DERIVATIONS Introduction to non-associative algebra OR Playing havoc with the product rule? PART VI COHOMOLOGY OF LIE ALGEBRAS BERNARD RUSSO University of California, Irvine FULLERTON COLLEGE DEPARTMENT
More informationReview for Exam Find all a for which the following linear system has no solutions, one solution, and infinitely many solutions.
Review for Exam. Find all a for which the following linear system has no solutions, one solution, and infinitely many solutions. x + y z = 2 x + 2y + z = 3 x + y + (a 2 5)z = a 2 The augmented matrix for
More informationOptimal XOR based (2,n)-Visual Cryptography Schemes
Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationSpectral Properties of Boolean Functions, Graphs and Graph States. Constanza Riera
Spectral Properties of Boolean Functions, Graphs and Graph States Constanza Riera December 9, 2005 Acknowledgements I feel that I have to thank a lot of people, but I cannot list them all here. Nevertheless,
More informationLecture 4 Orthonormal vectors and QR factorization
Orthonormal vectors and QR factorization 4 1 Lecture 4 Orthonormal vectors and QR factorization EE263 Autumn 2004 orthonormal vectors Gram-Schmidt procedure, QR factorization orthogonal decomposition induced
More informationCritical Groups for Cayley Graphs of Bent Functions
Critical Groups for Cayley Graphs of Bent Functions Thomas F. Gruebl Adviser: David Joyner December 9, 2015 1 Introduction This paper will study the critical group of bent functions in the p-ary case.
More informationFrame Diagonalization of Matrices
Frame Diagonalization of Matrices Fumiko Futamura Mathematics and Computer Science Department Southwestern University 00 E University Ave Georgetown, Texas 78626 U.S.A. Phone: + (52) 863-98 Fax: + (52)
More informationx 3y 2z = 6 1.2) 2x 4y 3z = 8 3x + 6y + 8z = 5 x + 3y 2z + 5t = 4 1.5) 2x + 8y z + 9t = 9 3x + 5y 12z + 17t = 7
Linear Algebra and its Applications-Lab 1 1) Use Gaussian elimination to solve the following systems x 1 + x 2 2x 3 + 4x 4 = 5 1.1) 2x 1 + 2x 2 3x 3 + x 4 = 3 3x 1 + 3x 2 4x 3 2x 4 = 1 x + y + 2z = 4 1.4)
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 1 x 2. x n 8 (4) 3 4 2
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS SYSTEMS OF EQUATIONS AND MATRICES Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
More informationHadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used
More informationLinear Algebra March 16, 2019
Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented
More informationHigher-order differential properties of Keccak and Luffa
Higher-order differential properties of Keccak and Luffa Christina Boura 1,2, Anne Canteaut 1 and Christophe De Cannière 3 1 SECRET Project-Team - INRIA Paris-Rocquencourt - B.P. 105-78153 Le Chesnay Cedex
More informationVectorial Boolean Functions for Cryptography
Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter
More information