The simplest method for constructing APN polynomials EA-inequivalent to power functions

Size: px
Start display at page:

Download "The simplest method for constructing APN polynomials EA-inequivalent to power functions"

Transcription

1 The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8] by applying CCZ-equivalence to the Gold APN functions. It is a natural question whether it is possible to construct APN polynoials EA-inequivalent to power functions by using only EA-equivalence and inverse transforation on a power APN function: this would be the siplest ethod to construct APN polynoials EA-inequivalent to power functions. In the present paper we prove that the answer to this question is positive. By this ethod we construct a class of APN polynoials EA-inequivalent to power functions. On the other hand it is shown that the APN polynoials fro [7, 8] cannot be obtained by the introduced ethod. Keywords: Affine equivalence, Alost bent, Alost perfect nonlinear, CCZ-equivalence, Differential unifority, Nonlinearity, S-box, Vectorial Boolean function 1 Introduction A function F : F 2 F 2 is called alost perfect nonlinear (APN) if, for every a 0 and every b in F 2, the equation F(x)+F(x+a) = b adits at ost two solutions (it is also called differentially 2-unifor). Vectorial Boolean functions used as S-boxes in block ciphers ust have low differential unifority to allow high resistance to the differential cryptanalysis (see [2, 28]). In this sense APN functions are optial. The notion of APN function is closely connected to the notion of alost bent (AB) function. A function F : F 2 F 2 is called AB if the iniu Haing distance between all the Boolean functions v F, v F 2 \{0}, and all affine Boolean functions on F 2 is axial. AB functions exist for odd only and oppose an optiu resistance to the linear cryptanalysis (see [26, 14]). Besides, every AB function is APN [14], and in the odd case, any quadratic function is APN if and only if it is AB [13]. The APN and AB properties are preserved by soe transforations of functions [13, 28]. If F is an APN (resp. AB) function, A 1, A 2 are affine perutations and A is affine then the Departent of Matheatics, University of Trento, I Povo (Trento), ITALY; e-ail: lilia.b@ail.ru 1

2 function F = A 1 F A 2 + A is also APN (resp. AB); the functions F and F are called extended affine equivalent (EA-equivalent). Another case is the inverse transforation, that is, the inverse of any APN (resp. AB) perutation is APN (resp. AB). Until recently, the only known constructions of APN and AB functions were EA-equivalent to power functions F(x) = x d over finite fields (F 2 being identified with F 2 ). Table 1 gives all known values of exponents d (up to ultiplication by a power of 2 odulo 2 1, and up to taking the inverse when a function is a perutation) such that the power function x d over F 2 is APN. For odd the Gold, Kasai, Welch and Niho APN functions fro Table 1 are also AB (for the proofs of AB property see [10, 11, 21, 22, 24, 28]). Table 1 Known APN power functions x d on F 2. Functions Exponents d Conditions Proven in Gold 2 i + 1 gcd(i, ) = 1 [21, 28] Kasai 2 2i 2 i + 1 gcd(i, ) = 1 [23, 24] Welch 2 t + 3 = 2t + 1 [18] Niho 2 t + 2 t 2 1, t even = 2t + 1 [17] 2 t + 2 3t+1 2 1, t odd Inverse 2 2t 1 = 2t + 1 [1, 28] Dobbertin 2 4t + 2 3t + 2 2t + 2 t 1 = 5t [19] In [13], Carlet, Charpin and Zinoviev introduced an equivalence relation of functions, ore recently called CCZ-equivalence, which corresponds to the affine equivalence of the graphs of functions and preserves APN and AB properties. EA-equivalence is a particular case of CCZ-equivalence and any perutation is CCZ-equivalent to its inverse [13]. In [7, 8], it is proven that CCZ-equivalence is ore general, and applying CCZ-equivalence to the Gold appings classes of APN functions EA-inequivalent to power functions are constructed. These classes are presented in Table 2. When is odd, these functions are also AB. Table 2 Known APN functions EA-inequivalent to power functions on F 2. Functions Conditions Alg. degree 4 x 2i +1 + (x 2i + x + tr(1) + 1)tr(x 2i +1 + xtr(1)) gcd(i, ) = 1 3 divisible by 6 [x + tr /3 (x 2(2i +1) + x 4(2i +1) ) + tr(x)tr /3 (x 2i +1 + x 22i (2 i +1) )] 2i +1 gcd(i, ) = 1 4 n x 2i +1 + tr /n (x 2i +1 ) + x 2i tr /n (x) + x tr /n (x) 2i odd 1 +[tr /n (x) 2i +1 + tr /n (x 2i +1 ) + tr /n (x)] 2 i +1 (x 2 i + tr /n (x) 2i + 1) divisible by n n + 2 +[tr /n (x) 2i +1 + tr /n (x 2i +1 ) + tr /n (x)] 2 i +1 (x + tr/n (x)) gcd(i, ) = 1 2 i These new results on CCZ-equivalence have solved several probles (see [7, 8]) and have also raised soe interesting questions. One of these questions is whether the known 2

3 classes of APN power functions are CCZ-inequivalent. Partly the answer is given in [5]: it is proven that in general the Gold functions are CCZ-inequivalent to the Kasai and Welch functions, and that for different paraeters 1 i, j 1 the Gold functions 2 x 2i +1 and x 2j +1 are CCZ-inequivalent. Another interesting question is the existence of APN polynoials CCZ-inequivalent to power functions. Exaples of APN polynoials CCZ-inequivalent to power functions have been constructed in [20, 16, 27] and infinite classes of such functions in [3, 4, 5, 6]. In the present paper we consider the natural question whether it is possible to construct APN polynoials EA-inequivalent to power functions by applying only EA-equivalence and the inverse transforation on a power APN function. We prove that the answer is positive and construct a class of AB functions EAinequivalent to power functions by applying this ethod to the Gold AB functions. It should be entioned that the functions fro Table 2 cannot be obtained by this ethod. It can be illustrated, for instance, by the fact that for = 5 the functions fro Table 2 and for even the Gold functions are EA-inequivalent to perutations [7, 8, 29], therefore, the inverse transforation cannot be applied in these cases and the ethod fails. 2 Preliinaries Let F 2 be the -diensional vector space over the field F 2. Any function F fro F 2 to itself can be uniquely represented as a polynoial on variables with coefficients in F 2, whose degree with respect to each coordinate is at ost 1: F(x 1,..., x ) = u F 2 c(u) ( i=1 ) x u i i, c(u) F 2. This representation is called the algebraic noral for of F and its degree d (F) the algebraic degree of the function F. Besides, the field F 2 can be identified with F 2 as a vector space. Then, viewed as a function fro this field to itself, F has a unique representation as a univariate polynoial over F 2 of degree saller than 2 : F(x) = 2 1 i=0 c i x i, c i F 2. For any k, 0 k 2 1, the nuber w 2 (k) of the nonzero coefficients k s {0, 1} in the binary expansion 1 s=0 2s k s of k is called the 2-weight of k. The algebraic degree of F is equal to the axiu 2-weight of the exponents i of the polynoial F(x) such that c i 0, that is, d (F) = ax 0 i 1,ci 0 w 2 (i) (see [13]). A function F : F 2 F 2 is linear if and only if F(x) is a linearized polynoial over F 2, that is, 1 i=0 c i x 2i, c i F 2. 3

4 The su of a linear function and a constant is called an affine function. Let F be a function fro F 2 to itself and A 1, A 2 : F 2 F 2 be affine perutations. The functions F and A 1 F A 2 are then called affine equivalent. Affine equivalent functions have the sae algebraic degree (i.e. the algebraic degree is affine invariant). As recalled in Introduction, we say that the functions F and F are extended affine equivalent if F = A 1 F A 2 + A for soe affine perutations A 1, A 2 and an affine function A. If F is not affine, then F and F have again the sae algebraic degree. Two appings F and F fro F 2 to itself are called Carlet-Charpin-Zinoviev equivalent (CCZ-equivalent) if the graphs of F and F, that is, the subsets G F = {(x, F(x)) x F 2 } and G F = {(x, F (x)) x F 2 } of F 2 F 2, are affine equivalent. Hence, F and F are CCZ-equivalent if and only if there exists an affine autoorphis L = (L 1, L 2 ) of F 2 F 2 such that y = F(x) L 2 (x, y) = F (L 1 (x, y)). Note that since L is a perutation then the function L 1 (x, F(x)) has to be a perutation too (see [5]). As shown in [13], EA-equivalence is a particular case of CCZ-equivalence and any perutation is CCZ-equivalent to its inverse. For a function F : F 2 F 2 and any eleents a, b F 2 we denote δ F (a, b) = {x F 2 : F(x + a) + F(x) = b}. F is called a differentially δ-unifor function if ax a F 2,b F 2 δ F (a, b) δ. Note that δ 2 for any function over F 2. Differentially 2-unifor appings are called alost perfect nonlinear. For any function F : F 2 F 2 we denote λ F (a, b) = ( 1) tr(bf(x)+ax), a, b F 2, x F 2 where tr(x) = x + x 2 + x x 2 1 is the trace function fro F 2 into F 2. The set Λ F = {λ F (a, b) : a, b F 2, b 0} is called the Walsh spectru of the function F and the ultiset { λ F (a, b) : a, b F 2 n, b 0} is called the extended Walsh spectru of F. The value N L(F) = ax λ F (a, b) 2 a F 2,b F 2 equals the nonlinearity of the function F. The nonlinearity of any function F satisfies the inequality N L(F) ([14, 30]) and in case of equality F is called alost bent or axiu nonlinear. Obviously, AB functions exist only for n odd. It is proven in [14] that every AB function is APN and its Walsh spectru equals {0, ± }. If is odd, every APN apping which is quadratic (that is, whose algebraic degree equals 2) is AB [13], but this is not true for nonquadratic cases: the Dobbertin and the inverse APN functions are not AB (see [11, 13]). 4

5 When is even, the inverse function x 2 2 is a differentially 4-unifor perutation [28] and has the best known nonlinearity [25], that is (see [11,?]). This function has been chosen as the basic S-box, with = 8, in the Advanced Encryption Standard (AES), see [15]. A coprehensive survey on APN and AB functions can be found in [12]. It is shown in [13] that, if F and G are CCZ-equivalent, then F is APN (resp. AB) if and only if G is APN (resp. AB). More generally, CCZ-equivalent functions have the sae differential unifority and the sae extended Walsh spectru (see [7]). Further invariants for CCZ-equivalence can be found in [20] (see also [16]) in ters of group algebras. 3 The new construction In this section we show that it is possible to construct APN polynoials EA-inequivalent to power functions by applying only EA-equivalence and the inverse transforation on a power APN function. We shall illustrate it on the Gold AB functions and in order to do it we need the following result fro [7, 8]. Proposition 1 ([7, 8]) Let F : F 2 F 2, F(x) = L(x 2i +1 ) + L (x), where gcd(i, ) = 1 and L, L are linear. Then F is a perutation if and only if, for every u 0 in F 2 and every v such that tr(v) = tr(1), the condition L(u 2i +1 v) L (u) holds. Further we use the following notations for any divisor n of tr /n (x) = x + x 2n + x 22n... + x 2n(/n 1), tr n (x) = x + x x 2n 1. Theore 1 Let 9 be odd and divisible by 3. Then the function F (x) = (x 1 2 i +1 + tr/3 (x + x 22i )) 1, with 1 i, gcd(i, ) = 1, is an AB perutation over F 2. The function F EA-inequivalent to the Gold functions and to their inverses, that is, to x 2j +1 and x 1 any 1 j. is 2 j +1 for Proof. To prove that the function F is an AB perutation we only need to show that the function F 1 (x) = x 1 2 i +1 + tr/3 (x + x 22i ) is a perutation. Since the function x 2i +1 is a perutation when is odd and gcd(i, ) = 1 then F 1 is a perutation if and only if the function F(x) = F 1 (x 2i +1 ) = x + tr /3 (x 2i +1 + x 22s (2 i +1) ), with s = i od 3, is a perutation. By Proposition 1 the function F is a perutation if for every v F 2 such that tr(v) = 1 and every u F 2 the condition tr /3(u 2i +1 v+(u 2i +1 v) 22s ) u holds. Obviously, if u / F 2 then tr 3 /3 (u 2i +1 v+(u 2i +1 v) 22s ) u. For any u F 2 the condition tr 3 /3 (u 2i +1 v+ (u 2i +1 v) 22s ) u is equivalent to u 2i +1 tr /3 (v) + (u 2i +1 tr /3 (v)) 22s u. Therefore, F is a 5

6 perutation if for every u, w F 2, tr 3 3 (w) = 1 the condition u 2i +1 w + (u 2i +1 w) 22s u is satisfied. Then F is a perutation if x+x 2i +1 +x 22s (2 i +1) is a perutation on F 2 3 and that was easily checked by a coputer. We have d (x 2i +1 ) = 2 and it is proven in [28] that d (x 1 2 i +1 ) = +1. We show below that d (F ) = 4 for 9. Since the function F has algebraic degree different fro 2 and +1 2 then it is EA-inequivalent to the Gold functions and to their inverses. Since F (x) = F1 1 (x) = [F(x 1 2 i +1 )] 1 = [F 1 ] 2i +1 then to get the representation of the function F we need the representation of the function F 1. The following coputations are helpful to show that F 1 = F F. tr /3 [(x + tr /3 (x 2i +1 + x 22s (2 i +1) )) 2i +1 ] = tr /3 (x 2i +1 ) + tr /3 (x 2s ) tr /3 (x 2i +1 + x 22s (2 i +1) ) since Then + tr /3 (x) tr /3 (x 2i +1 + x 2s (2 i +1) ) + tr /3 (x 2i +1 + x 22s (2 i +1) ) tr /3 (x 2i +1 + x 2s (2 i +1) ), tr /3 ((x 2i +1 + x 22s (2 i +1) ) 2i ) = tr /3 ((x 2i +1 + x 22s (2 i +1) ) 2s ) = tr /3 (x 2s (2 i +1) + x 23s (2 i +1) ) = tr /3 (x 2s (2 i +1) + x 2i +1 ). tr /3 [(x + tr /3 (x 2i +1 + x 22s (2 i +1) )) 2i +1 + (x + tr /3 (x 2i +1 + x 22s (2 i +1) )) 22s (2 i +1) ] = tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr /3 (x 2s ) tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr /3 (x) tr /3 (x 22s (2 i +1) + x 2s (2 i +1) ) + tr /3 (x) tr /3 (x 2i +1 + x 2s (2 i +1) ) + tr /3 (x 22s ) tr /3 (x 22s (2 i +1) + x (2i +1) ) + tr /3 (x 2i +1 + x 22s (2 i +1) ) tr /3 (x 2i +1 + x 2s (2 i +1) ) + tr /3 (x 22s (2 i +1) + x 2s (2 i +1) ) tr /3 (x 22s (2 i +1) + x (2i +1) ) = tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr /3 (x + x 2s + x 22s ) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 = tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 and F F(x) = x + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 and, since tr (tr /3 (x 2i +1 + x 22s (2 i +1) )) = 0, (F F) F(x) = x + tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr (x)[tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 ] + [tr /3 (x 2i +1 + x 22s (2 i +1) ) + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 ] 2 = x + tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2 + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 4 = x + tr 3 (tr /3 (x 2i +1 + x 22s (2 i +1) )) = x + tr (x 2i +1 + x 22s (2 i +1) )) = x. 6 2

7 Therefore, F 1 (x) = F F(x) = x + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2. Thus, we have F (x) = [F 1 (x)] 2i +1 = [x + tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + (tr /3 (x 2i +1 +x 22s (2 i +1) )) 2 ] 2i +1 = x 2i +1 + tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s +1 +(tr /3 (x 2i +1 + x 22s (2 i +1) )) 2(2s +1) + x 2i tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) +x tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s + x 2i tr /3 (x 2(2i +1) + x 22s+1 (2 i +1) ) +x (tr /3 (x 2(2i +1) + x 22s+1 (2 i +1) )) 2s + tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s +2 + tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s+1 +1 = x 2i +1 + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2(2s +1) +x 2i tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) ) + x tr (x) tr /3 (x 2i +1 + x 2s (2 i +1) ) +x 2i tr /3 (x 2(2i +1) + x 22s+1 (2 i +1) ) + x tr /3 (x 2(2i +1) + x 2s+1 (2 i +1) ) + tr (x)[(tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s +1 + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s +2 + (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s+1 +1 ]. The only ite in this su which can give algebraic degree greater than 4 is the last ite. We have (tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s +1 +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s +2 +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s+1 +1 = (tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s +1 +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 4(2s +1) +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 22s, since 2 s+1 +1 = 2 s + 2 = { { 4 if s = 1 12 = 5 (od 2 6 if s = 2, 4(2s + 1) = 3 1) if s = 1 20 = 6 (od 2 3 1) if s = 2, { { 5 if s = 1 4 if s = 1 9 = 2 (od 2 3 1) if s = 2, 22s = 16 = 2 (od 2 3 1) if s = 2. On the other hand, (tr /3 (x 2i +1 + x 22s (2 i +1) )) 2s +1 = tr /3 (x 2i +1 + x 22s (2 i +1) ) tr /3 (x 2i +1 + x 2s (2 i +1) ) = tr /3 (x 2i +1 ) 2 + (tr /3 (x 2i +1 )) 22s +1 + (tr /3 (x 2i +1 )) 2s +1 + (tr /3 (x 2i +1 )) 22s +2 s = (tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 + (tr /3 (x 2i +1 )) 3 + (tr /3 (x 2i +1 )) 2 (1) Using (1) we get (tr /3 (x 2i +1 +x 22s (2 i +1) )) 2s +1 +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 4(2s +1) +(tr /3 (x 2i +1 +x 22s (2 i +1) )) 22s = (tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 + (tr /3 (x 2i +1 )) 3 + (tr /3 (x 2i +1 )) 2 + [(tr /3 (x 2i +1 )) 3 7

8 +(tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 + tr /3 (x 2i +1 )] + (tr /3 (x 2i +1 )) 2 + (tr /3 (x 2i +1 )) 4 = tr /3 (x 2i +1 ) + (tr /3 (x 2i +1 )) 4. Hence, applying (1) and (2) we get (2) F (x) = x 2i +1 + [(tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 + (tr /3 (x 2i +1 )) 3 + (tr /3 (x 2i +1 )) 2 ] 2 +x 2i tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) + x tr (x) tr /3 (x 2i +1 + x 2s (2 i +1) ) +x 2i tr /3 (x 2(2i +1) + x 22s+1 (2 i +1) ) + x tr /3 (x 2(2i +1) + x 2s+1 (2 i +1) ) + tr (x)[tr /3 (x 2i +1 ) + (tr /3 (x 2i +1 )) 4 ] = x 2i +1 + (tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 +(tr /3 (x 2i +1 )) 3 + (tr /3 (x 2i +1 )) 4 + x 2i tr (x) tr /3 (x 2i +1 + x 22s (2 i +1) ) +x tr (x) tr /3 (x 2i +1 + x 2s (2 i +1) ) + x 2i tr /3 (x 2(2i +1) + x 22s+1 (2 i +1) ) +x tr /3 (x 2(2i +1) + x 2s+1 (2 i +1) ) + tr (x) tr /3 (x 2i +1 + x 4(2i +1) ). Below we consider all ites in the su presenting the function F which ay give the algebraic degree 4: [(tr /3 (x 2i +1 )) 6 + (tr /3 (x 2i +1 )) 5 + (tr /3 (x 2i +1 )) 3 ] +[x 2i tr (x)(tr /3 (x 2i +1 + x 22s (2 i +1) ) + x tr (x)(tr /3 (x 2i +1 + x 2s (2 i +1) )]. For siplicity we take i = 1. Obviously, all the ites in the second bracket of the algebraic degree 4 have the for x 2j +2 k +2 l +2 r, where r < l < k < j 1, r 1. Therefore, if we find an ite of algebraic degree 4 in the first bracket of the for x 2j +2 k +2 l +2 r, where 2 r < l < k < j 1, which does not cancel, then this ite does not vanish in the whole su. We have tr /3 (x 3 ) = x x x x = (tr /3 (x 3 )) 2 = x x x x = (tr /3 (x 3 )) 4 = x x x x = (tr /3 (x 3 )) 3 = (tr /3 (x 3 )) 2 tr /3 (x 3 ) = (tr /3 (x 3 )) 5 = 3 2 j=0 x 23k k, x 23k k+1, 3 2 x 23k k+2 + x , x 23k k +2 3i i+1, (3) i, x 23j j k k + x k k, (4) 8

9 (tr /3 (x 3 )) 6 = 3 2 j=0 x 23j j k k+1 + x k k+1. (5) Note that all exponents of weight 4 in (3)-(5) are saller than 2. If 9 then it is obvious that the ite x does not vanish in (4) and it definitely differs fro all ites in (3) and (5). Hence, the function F has the algebraic degree 4 when 9 and that copletes the proof of the theore. It is proven in [5] that the Gold functions are CCZ-inequivalent to the Welch function for all 9. Therefore, the function F of Theore 1 is CCZ-inequivalent to the Welch function. Further, the inverse and the Dobbertin APN functions are not AB (see [13, 11]) and, therefore, the AB function F is CCZ-inequivalent to the. The algebraic degree of the Kasai function x 4i 2 i +1, 2 i n 1, gcd(i, ) = 1, is equal to i + 1. Thus, its 2 algebraic degree equals 4 if and only if i = 3. Since the function F is defined only for divisible by 3 then for i = 3 we would have gcd(i, ) 1. On the other hand, if Gold and Kasai functions are CCZ-equivalent then it follows fro the proof of Theore 5 of [5] that the Gold function is EA-equivalent to the inverse of the Kasai function which ust be quadratic in this case. Thus, if F was EA-equivalent to the inverse of a Kasai function then F would be quadratic. Thus, F cannot be EA-equivalent to the Kasai functions or to their inverses. Proposition 2 The function of Theore 1 is EA-inequivalent to the Welch, Kasai, inverse, Dobbertin functions and to their inverses. For = 2t + 1 the Niho function has the algebraic degree t + 1 if t is odd and the algebraic degree (t + 2)/2 if t is even. Therefore, its algebraic degree equals 4 if and only if = 7, 13. Proposition 3 The function of Theore 1 is EA-inequivalent to the Niho function. We do not have a general proof of EA-inequivalence of F and the inverse of the Niho function but for = 9 the Niho function coincides with the Welch functions and therefore its inverse cannot be EA-equivalent to the function F. Thus, for = 9 the function F is EA-inequivalent to any power function. Corollary 1 For = 9 the function of Theore 1 is EA-inequivalent to any power function. When is odd and divisible by 3 the APN functions fro Table 2 have the algebraic degree different fro 4. Thus we get the following proposition. Proposition 4 The function of Theore 1 is EA-inequivalent to any APN function fro Table 2. 9

10 Acknowledgents We would like to thank Claude Carlet for any valuable discussions and for detailed and insightful coents on the several drafts of this paper. The ain part of this work was carried out while the author was with Otto-von-Guericke University Magdeburg and the research was supported by the State of Saxony Anhalt, Gerany. References [1] T. Beth and C. Ding. On alost perfect nonlinear perutations. Advances in Cryptology-EUROCRYPT 93, Lecture Notes in Coputer Science, 765, Springer- Verlag, New York, pp , [2] E. Biha and A. Shair. Differential Cryptanalysis of DES-like Cryptosystes. Journal of Cryptology, vol. 4, No.1, pp. 3-72, [3] L. Budaghyan, C. Carlet, G. Leander. Constructing new APN functions fro known ones. Preprint, [4] L. Budaghyan, C. Carlet, G. Leander. Another class of quadratic APN binoials over F 2 n: the case n divisible by 4. Subitted to the Workshop on Coding and Cryptography 2007, available at [5] L. Budaghyan, C. Carlet, G. Leander. A class of quadratic APN binoials inequivalent to power functions. Subitted to IEEE Trans. Infor. Theory, available at [6] L. Budaghyan, C. Carlet, P. Felke, G. Leander. An infinite class of quadratic APN functions which are not equivalent to power appings. Proceedings of the IEEE International Syposiu on Inforation Theory 2006, Seattle, USA, Jul [7] L. Budaghyan, C. Carlet, A. Pott. New Classes of Alost Bent and Alost Perfect Nonlinear Functions. IEEE Trans. Infor. Theory, vol. 52, no. 3, pp , March [8] L. Budaghyan, C. Carlet, A. Pott. New Constructions of Alost Bent and Alost Perfect Nonlinear Functions. Proceedings of the Workshop on Coding and Cryptography 2005, P. Charpin and Ø. Ytrehus eds, pp , [9] A. Canteaut, P. Charpin and H. Dobbertin. A new characterization of alost bent functions. Fast Software Encryption 99, LNCS 1636, L. Knudsen edt, pp Springer-Verlag, [10] A. Canteaut, P. Charpin and H. Dobbertin. Binary -sequences with three-valued crosscorrelation: A proof of Welch s conjecture. IEEE Trans. Infor. Theory, 46 (1), pp. 4-8,

11 [11] A. Canteaut, P. Charpin, H. Dobbertin. Weight divisibility of cyclic codes, highly nonlinear functions on F 2, and crosscorrelation of axiu-length sequences. SIAM Journal on Discrete Matheatics, 13(1), pp , [12] C. Carlet. Vectorial (ulti-output) Boolean Functions for Cryptography. Chapter of the onography Boolean Methods and Models, Y. Craa and P. Haer eds, Cabridge University Press, to appear soon. Preliinary version available at [13] C. Carlet, P. Charpin and V. Zinoviev. Codes, bent functions and perutations suitable for DES-like cryptosystes. Designs, Codes and Cryptography, 15(2), pp , [14] F. Chabaud and S. Vaudenay. Links between differential and linear cryptanalysis, Advances in Cryptology -EUROCRYPT 94, LNCS, Springer-Verlag, New York, 950, pp , [15] J. Daeen and V. Rijen. AES proposal: Rijndael [16] J. F. Dillon. APN Polynoials and Related Codes. Polynoials over Finite Fields and Applications, Banff International Research Station, Nov [17] H. Dobbertin. Alost perfect nonlinear power functions over GF(2 n ): the Niho case. Infor. and Coput., 151, pp , [18] H. Dobbertin. Alost perfect nonlinear power functions over GF(2 n ): the Welch case. IEEE Trans. Infor. Theory, 45, pp , [19] H. Dobbertin. Alost perfect nonlinear power functions over GF(2 n ): a new case for n divisible by 5. D. Jungnickel and H. Niederreiter eds. Proceedings of Finite Fields and Applications FQ5, Augsburg, Gerany, Springer, pp , [20] Y. Edel, G. Kyureghyan and A. Pott. A new APN function which is not equivalent to a power apping. IEEE Trans. Infor. Theory, vol. 52, no. 2, pp , Feb [21] R. Gold. Maxial recursive sequences with 3-valued recursive crosscorrelation functions. IEEE Trans. Infor. Theory, 14, pp , [22] H. Hollann and Q. Xiang. A proof of the Welch and Niho conjectures on crosscorrelations of binary -sequences. Finite Fields and Their Applications 7, pp , [23] H. Janwa and R. Wilson. Hyperplane sections of Ferat varieties in P 3 in char. 2 and soe applications to cyclic codes. Proceedings of AAECC-10, LNCS, vol. 673, Berlin, Springer-Verlag, pp ,

12 [24] T. Kasai. The weight enuerators for several classes of subcodes of the second order binary Reed-Muller codes. Infor. and Control, 18, pp , [25] G. Lachaud and J. Wolfann. The Weights of the Orthogonals of the Extended Quadratic Binary Goppa Codes. IEEE Trans. Infor. Theory, vol. 36, pp , [26] M. Matsui. Linear cryptanalysis ethod for DES cipher. Advances in Cryptology- EUROCRYPT 93, LNCS, Springer-Verlag, pp , [27] N. Nakagawa. Private counications, [28] K. Nyberg. Differentially unifor appings for cryptography, Advances in Cryptography, EUROCRYPT 93, LNCS, Springer-Verlag, New York, 765, pp , [29] K. Nyberg. S-boxes and Round Functions with Controllable Linearity and Differential Unifority. Proceedings of Fast Software Encryption 1994, LNCS 1008, pp , [30] V. Sidelnikov. On utual correlation of sequences. Soviet Math. Dokl., 12, pp ,

Constructing new APN functions from known ones

Constructing new APN functions from known ones Constructing new APN functions from known ones Lilya Budaghyan a, Claude Carlet b, and Gregor Leander c a Department of Mathematics University of Trento ITALY b Department of Mathematics University of

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

A class of quadratic APN binomials inequivalent to power functions

A class of quadratic APN binomials inequivalent to power functions A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander November 30, 2006 Abstract We exhibit an infinite class of almost perfect nonlinear quadratic

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

Some Results on the Known Classes of Quadratic APN Functions

Some Results on the Known Classes of Quadratic APN Functions Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Nonlinear Functions A topic in Designs, Codes and Cryptography

Nonlinear Functions A topic in Designs, Codes and Cryptography Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

On Dillon s class H of Niho bent functions and o-polynomials

On Dillon s class H of Niho bent functions and o-polynomials On Dillon s class H of Niho bent functions and o-polynoials Claude Carlet and Sihe Mesnager LAGA, UMR 7539, CNRS, Departent of Matheatics, University of Paris XIII and University of Paris VIII, 2 rue de

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

G-Perfect Nonlinear Functions

G-Perfect Nonlinear Functions University of Richmond UR Scholarship Repository Math and Computer Science Faculty Publications Math and Computer Science 1-2008 G-Perfect Nonlinear Functions James A. Davis University of Richmond, jdavis@richmond.edu

More information

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies Dierential cryptanalysis o eistel ciphers and dierentially uniorm mappings Anne Canteaut INRIA Projet codes Domaine de Voluceau BP 105 78153 Le Chesnay Cedex rance Abstract In this paper we study the round

More information

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin

Polynomials on F 2. cryptanalysis. Y. Aubry 1 G. McGuire 2 F. Rodier 1. m with good resistance to. 1 IML Marseille 2 University College Dublin Polynomials on F 2 m with good resistance to cryptanalysis Y Aubry 1 G McGuire 2 F Rodier 1 1 IML Marseille 2 University College Dublin Outline APN functions A lower bound for the degree of an APN polynomial

More information

A matrix approach for constructing quadratic APN functions

A matrix approach for constructing quadratic APN functions Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a

More information

APN Power Functions Over GF(2 n ) for Infinitely Many n

APN Power Functions Over GF(2 n ) for Infinitely Many n APN Power Functions Over GF( n ) for Infinitely Many n David Jedlicka University of Texas at Austin Department of Mathematics Austin, TX 7871 USA jedlicka@math.utexas.edu July 11, 005 Abstract I present

More information

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-coercial

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Two Notions of Differential Equivalence on Sboxes

Two Notions of Differential Equivalence on Sboxes Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder To cite this version: Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder. Two Notions

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Extended Criterion for Absence of Fixed Points

Extended Criterion for Absence of Fixed Points Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova Abstract One of the criteria for substitutions used in block ciphers is the absence of fixed points. In this paper

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet 1 and Stjepan Picek 1, 2 1 LAGA, Department of Mathematics, University of Paris 8 (and Paris

More information

Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets

Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Claude Carlet LAGA, Department of Mathematics, University of Paris 8 and Paris 13 and CNRS, Saint Denis cedex

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

Special Monomial Maps: Examples, Classification, Open Problems

Special Monomial Maps: Examples, Classification, Open Problems Special Monomial Maps: Examples, Classification, Open Problems Gohar Kyureghyan Otto-von-Guericke University of Magdeburg, Germany Fq12 - Saratoga July 14, 2015 Outline Special maps yielding small Kakeya

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

If a Generalised Butterfly is APN then it Operates on 6 Bits

If a Generalised Butterfly is APN then it Operates on 6 Bits If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut 1, Léo Perrin 1, Shizhu Tian 1,2,3 1 Inria, Paris, France. 2 State Key Laboratory of Information Security, Institute of Information

More information

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1

More information

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS N. van Erp and P. van Gelder Structural Hydraulic and Probabilistic Design, TU Delft Delft, The Netherlands Abstract. In probles of odel coparison

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Evolutionary Design of Trace Form Bent Functions

Evolutionary Design of Trace Form Bent Functions Evolutionary Design of Trace Form Bent Functions Min Yang, Qingshu Meng, and Huanguo Zhang school of computer science, Wuhan university, Wuhan Hubei, China mqseagle@yahoo.com Abstract. In order to design

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Optimal Ternary Cyclic Codes From Monomials

Optimal Ternary Cyclic Codes From Monomials 5898 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 Optimal Ternary Cyclic Codes From Monomials Cunsheng Ding, Senior Member, IEEE, and Tor Helleseth, Fellow, IEEE Abstract Cyclic

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

A Family of Reversible BCH Codes

A Family of Reversible BCH Codes 1 A Faily of Reversible BCH Codes Shuxing Li, Cunsheng Ding, and Hao Liu Abstract arxiv:1608.0169v1 [cs.it] 7 Aug 016 Cyclic codes are an interesting class of linear codes due to their efficient encoding

More information

E0 370 Statistical Learning Theory Lecture 5 (Aug 25, 2011)

E0 370 Statistical Learning Theory Lecture 5 (Aug 25, 2011) E0 370 Statistical Learning Theory Lecture 5 Aug 5, 0 Covering Nubers, Pseudo-Diension, and Fat-Shattering Diension Lecturer: Shivani Agarwal Scribe: Shivani Agarwal Introduction So far we have seen how

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volue 126, Nuber 3, March 1998, Pages 687 691 S 0002-9939(98)04229-4 NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS DAVID EISENBUD, IRENA PEEVA,

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

MATRIX POWER S-BOX ANALYSIS 1. Kestutis Luksys, Petras Nefas

MATRIX POWER S-BOX ANALYSIS 1. Kestutis Luksys, Petras Nefas International Book Series "Inforation Science and Coputing" 97 MATRIX POWER S-BOX ANALYSIS Keutis Luksys, Petras Nefas Abract: Conruction of syetric cipher S-bo based on atri power function and dependant

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers Link Between Integrals and Higher-Order Integrals of SPN Ciphers Ruilin Li, Bing Sun, and Chao Li Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

Two Notions of Differential Equivalence on Sboxes

Two Notions of Differential Equivalence on Sboxes Two Notions of Differential Equivalence on Sboxes Christina Boura 1,2, Anne Canteaut 2, Jérémy Jean 3, and Valentin Suder 1 1 University of Versailles, France Christina.Boura@uvsq.fr, Valentin.Suder@uvsq.fr

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

On the normality of p-ary bent functions

On the normality of p-ary bent functions Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

Almost Difference Sets and Their Sequences With Optimal Autocorrelation

Almost Difference Sets and Their Sequences With Optimal Autocorrelation 2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,

More information

hal , version 1-9 Mar 2011

hal , version 1-9 Mar 2011 Non-Boolean Almost Perfect Nonlinear Functions on Non-Abelian Groups Laurent Poinsot LIPN - UMR CNRS 7030, Institut Galilée, University Paris XIII, 99, avenue Jean-Baptiste Clment, 93430 Villetaneuse laurent.poinsot@lipn.univ-paris13.fr

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

ON SOME MATRIX INEQUALITIES. Hyun Deok Lee. 1. Introduction Matrix inequalities play an important role in statistical mechanics([1,3,6,7]).

ON SOME MATRIX INEQUALITIES. Hyun Deok Lee. 1. Introduction Matrix inequalities play an important role in statistical mechanics([1,3,6,7]). Korean J. Math. 6 (2008), No. 4, pp. 565 57 ON SOME MATRIX INEQUALITIES Hyun Deok Lee Abstract. In this paper we present soe trace inequalities for positive definite atrices in statistical echanics. In

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS

CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS LILYA BUDAGHYAN, MARCO CALDERINI, CLAUDE CARLET, ROBERT S. COULTER, AND IRENE VILLA Abstract. Almost perfect nonlinear (APN) functions over fields of

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)! THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Aalto University School of Science and Nokia, Finland kaisa.nyberg@aalto.fi Abstract. In this invited talk, a brief survey on

More information

arxiv: v2 [cs.cr] 18 Jan 2016

arxiv: v2 [cs.cr] 18 Jan 2016 A note on APN permutations in even dimension M. Calderini a, M. Sala a, I. Villa a a Department of Mathematics, University of Trento, Via Sommarive 14, 38100 Povo (Trento), Italy arxiv:1511.08101v2 [cs.cr]

More information