nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equa

Similar documents
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Non-Separable Cryptographic Functions

Decomposing Bent Functions

Smart Hill Climbing Finds Better Boolean Functions

arxiv: v5 [cs.it] 4 Nov 2009

1-Resilient Boolean Function with Optimal Algebraic Immunity

Generalized Correlation Analysis of Vectorial Boolean Functions

Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5

On Cryptographic Properties of the Cosets of R(1;m)

New Constructions for Resilient and Highly Nonlinear Boolean Functions

Correcting Codes in Cryptography

Third-order nonlinearities of some biquadratic monomial Boolean functions

Computing the biases of parity-check relations

On Boolean Functions with Generalized Cryptographic Properties

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A New Class of Bent Negabent Boolean Functions

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Some properties of q-ary functions based on spectral analysis

The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers

Open problems related to algebraic attacks on stream ciphers

Functions on Finite Fields, Boolean Functions, and S-Boxes

Vectorial Boolean Functions for Cryptography

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

On the Arithmetic Walsh Coefficients of Boolean Functions

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Some results concerning global avalanche characteristics of two q-ary functions

On Existence and Invariant of Algebraic Attacks

Improvements to Correlation Attacks Against Stream. Ciphers with Nonlinear Combiners. Brian Stottler Elizabethtown College

Haar Spectrum of Bent Boolean Functions

IN this paper, we exploit the information given by the generalized

University of Bergen Faculty of Mathematical and Natural Sciences Department of Informatics The Selmer Center

COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Algebraic Attacks and Decomposition of Boolean Functions

Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity

A construction of Boolean functions with good cryptographic properties

Using Wiedemann s algorithm to compute the immunity against algebraic and fast algebraic attacks

Algebraic nonlinearity and its applications to cryptography

On The Nonlinearity of Maximum-length NFSR Feedbacks

Comments on "Generating and Counting Binary Bent Sequences"

On Welch-Gong Transformation Sequence Generators

CCZ-equivalence and Boolean functions

Nonlinear Equivalence of Stream Ciphers

Complete characterization of generalized bent and 2 k -bent Boolean functions

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

Extended Criterion for Absence of Fixed Points

Hyper-bent Functions

Thesis Research Notes

9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Heriot-Watt University

Sequences, DFT and Resistance against Fast Algebraic Attacks

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function

Perfect Algebraic Immune Functions

The Analysis of affinely Equivalent Boolean Functions

Boolean functions in cryptography

Dirichlet Product for Boolean Functions

Constructions of Quadratic Bent Functions in Polynomial Forms

Fast Discrete Fourier Spectra Attacks on Stream Ciphers

Cryptographic Properties of the Hidden Weighted Bit Function

Pseudo-random sequences, boolean functions and cellular automata

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Maiorana-McFarland class: Degree optimization and algebraic properties

Periodicity and Distribution Properties of Combined FCSR Sequences

Maiorana McFarland Functions with High Second Order Nonlinearity

Fast correlation attacks on certain stream ciphers

The primary aim of this paper is to introduce a new class of functions to facilitate the design of cryptographically good functions. It turns out that

Analysis of Some Quasigroup Transformations as Boolean Functions

A New Characterization of Semi-bent and Bent Functions on Finite Fields

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Lecture Notes on Cryptographic Boolean Functions

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS

Generalized hyper-bent functions over GF(p)

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity

Cryptanalysis of the Stream Cipher ABC v2

On Hardware Implementation of Tang-Maitra Boolean Functions

On a generalized combinatorial conjecture involving addition mod 2 k 1

2. Accelerated Computations

Gurgen Khachatrian Martun Karapetyan

Dickson Polynomials that are Involutions

A deterministic algorithm for the distance and weight distribution of binary nonlinear codes

Higher-order differential properties of Keccak and Luffa

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Statistical and Linear Independence of Binary Random Variables

Differential properties of power functions

Lecture 10-11: General attacks on LFSR based stream ciphers

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks

Stream Ciphers: Cryptanalytic Techniques

CRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n

CRC Press has granted the following specific permissions for the electronic version of this book:

Design of a New Stream Cipher: PALS

Design of Filter Functions for Key Stream Generators using Boolean Power Functions Jong-Min Baek

Improved characteristics for differential cryptanalysis of hash functions based on block ciphers

Higher-order differential properties of Keccak and Luffa

Transcription:

Upper bounds on the numbers of resilient functions and of bent functions Claude Carlet 1 and Andrew Klapper 2 1 INRIA projet CODES, B.P. 105, 78153 Le Chesnay Cedex- France. Claude.Carlet@inria.fr 2 Dept. of Computer Science, 779A Anderson Hall, University ofkentucky, Lexington, KY, 40506-0046. klapper@cs.uky.edu Abstract. We introduce an upper bound on the number of bent functions which shows they are much less numerous than the functions of degrees at most n=2 and we improve upon the known bounds on the number of m-resilient functions for m large. 1 Introduction Upper bounds on the numbers of bent and resilient functions can be directly derived from the upper bounds on their algebraic degrees. But these bounds are weak. In this paper, we use characterizations of these functions by means of their Numerical Normal Forms to derive upper bounds on the numbers of m-resilient functions and of bent functions, which show that these numbers are exponentially (with respect to n) smaller than the numbers of Boolean functions of algebraic degrees smaller than or equal to n m 1andn=2 respectively. We improve uponschneider's bound [13] for high orders resilient functions. L We denote by Φ (respectively, P +) addition in F 2 (respectively, inz) and by i2::: (respectively, i2::: ) the corresponding multiple sum. Let n be any positive integer. Any Boolean function f in n variables (i.e., any f0; 1g-valued function defined on the set F n 2 of all binary words of length L n) admits (cf. Q [8]) a unique algebraic normal form (or ANF): f(x 1 ; ;x n )= I f1; ;ng a I i2i x i = L Q I f1; ;ng a I x I, where the a I 's are in F 2 and x I = i2i x i.we call the degree of the algebraic normal form of a Boolean function its algebraic degree. Any function f also P admits (cf. [4]) a unique numerical normal form (or NNF): f(x 1 ; ;x n )= I f1; ;ng I x I, where the I 's are in Z. We call the degree of the numerical normal form of a Boolean function its numerical degree. The ANF of f being equal to its NNFmod 2, the algebraic degree of f is always smaller than or equal to its numerical degree. The Hamming weight, w H (f), of a Boolean function f in n variables is the size of its support, fx 2 F n 2 ; f(x) =1g. TheHamming distance, d H (f; g), between two Boolean functions f and g is the Hamming weight of their difference (i.e. of their sum modulo 2) f Φ g. The nonlinearity of f is its minimum distance to all affine functions. Functions used in stream or block ciphers must have high

nonlinearities to resist certain attacks on these ciphers (correlation and linear attacks). A Boolean function is called bent if its nonlinearity equals 2 n 1 2 n=2 1 (which is the maximum possible value), where n is even. The distance from a bent function to every affine function equals 2 n 1 ± 2 n=2 1.Thisproperty can also be stated in terms of the Walsh (i.e., Hadamard) transform of f, defined as bf(s) = P x2f 2 n f(x)( 1) x s, where x s denotes the usual inner product x s = L n i=1 x i s i. But it is more easily stated in terms of the Walsh transform of the sign" function χ f (x) =( 1) f(x), equal to cχ f (s) = P x2f 2 n( 1) f(x)φx s.the function f is bent if and only if cχ f (s) has constant magnitude 2 n=2 (cf. [8, 12]). Indeed, the distance d H (f; l) between f and the affine function l(x) =s xφffl (s 2 F n 2 ; ffl 2 F 2 ) and the number cχ f (s) are related by: cχ f (s) =( 1) ffl (2 n 2d H (f; l)). Notice that cχ f (s) =2 n 2 b f(s) ifs = 0 and cχ f (s) = 2 b f(s) otherwise. The NNF and the Walsh spectrum are related through the relations bf(s) =( 1) w(s) X I f1; ;ngjsupp(s) I where supp(s) denotes the support fi; s i =1g of s; I =2 n ( 2) jij X 2 n jij I ; (1) x2f 2 n j I supp(x) b f(x): (2) The class of bent functions, whose complete determination is still an open problem, is relevant toseveral topics of information theory: cryptography, algebraic coding theory, sequences and design theory. More information on bent functions can be found in the survey paper [2]. A characterization of bent functions by means of their NNFs is given in [4] and is our main tool in deriving a bound on their number: a Boolean function f is bent if and only if for every I such that n < 2 jij <n(where jij denotes the size of I), the coefficient I is divisible by 2 jij n 2,andif f1;:::;ng 2 n 2 1 mod 2 n 2. Another important class of Boolean functions for cryptography isthatof resilient functions. These functions play acentral role in stream ciphers: in a common type of these ciphers (cf. [14]), the outputs of n linear feedback shift registers are the inputs to a Boolean function. The output of the function produces the keystream, which isthenbitwise XOR-ed with the message to produce the cipher. Several divide-and-conquer attacks exist on this method of encryption and lead to criteria the combining function must satisfy. Two main criteria are the following: the combining function must be balanced (i.e. uniformly distributed) and the probability distribution of its output must be unaltered when any m of its inputs are fixed [15], with m as large as possible. This property, called m-th order correlation-immunity [14], is characterized by the set of zero values in the Walsh spectrum [17]: f is m-th order correlation-immune if and only if bχ f (u) = 0, or, equivalently, f(u) b =0forallu2F n 2 such that1» w H (u)» m, where w H (u) denotes the Hamming weight ofthen-bit vector u (the number of its nonzero components). Balanced m-th order correlation-immune functions are 2

called m-resilient functions and are characterized by the fact that bχ f (u) =0for all u 2 F n 2 such thatw H (u)» m. Characterizations of resilient functions and of correlation-immune functions by means of NNFare given in [5] and in [3] and are also our main tool in deriving bounds on their numbers: a Boolean function f is m-resilient if and only if for every I such thatjij n m, the coefficient I of x I in the NNFof the function g(x) =f(x) Φ x 1 Φ :::Φ x n is null (i.e. if and only if the numerical degree of g is smaller than n m). And f is m-th order correlation-immune if and only if, for every I such that jij n m, wehave: I =( 2) jij n f1; ;ng =( 1) n ( 2) jij n w H (f). 2 Upper Bounds on Degrees of Functions Rothaus' inequality states that any bent function has degree at most n=2 [12]. Thus, the number of bent functions is at most 2 1+n+:::+( n=2) n =2 2 n 1 + 2( 1 n=2) n.we refer to this as the naive bound on (the number of) bent functions. However, we know that for n = 6 (the highest number of variables for which thenumber of bent functions is known), the number of bent functions is approximately equal to 2 32 (cf. [11]), which ismuch less than 2 25 + 2( 1 6 3) =2 42. Also it has been checked experimentally that there is no hope of obtaining a bent function in 8 variables by picking a Boolean function of algebraic degree upper bounded by 4 at random. So a better upper bound is desirable. Siegenthaler's inequality [14] states that any m-th order correlation-immune function in n variables has algebraic degree at most n m, thatany m-resilient function (0» m<n 1) has algebraic degree smaller than or equal to n m 1, and that any (n 1)-resilient function has algebraic degree 1. This implies that the number of m-resilient functions is at most 2 1+n+:::+( n n m 1) if m<n 1. This is also a weak bound that we refer to as the naive bound on (the number of) m-resilient functions. A bound on the number of first order correlation-immune P functions was found 2 by Yang and Guo [16] and improved to n 2 n 2 4 2 j=0 j bypark, Lee, Sung and Kim [10]. The method of Park, Lee, Sung and Kim can be applied to bound the number of 1-resilient functions. This gives a slightly smaller (but more complex) bound. Maitra and Sarkar [9] have also derived an upper bound for the number of first order correlation-immune functions and Jian-Zhou Zhang, Zhi-Sheng You and Zheng-Liang Li [18] have derived an upper bound for the number of m-th order correlation-immune functions. However, their results involve complex parameters which make them impractical for obtaining effective upper bounds. Moreover, a general and efficiently computed upper bound was earlier found by Schneider [13]. In the case of m-resilient functions, the upper bound he obtained n j 1 j 2 j 1 ( Q n m m 1 ) is j=1 2. His bound for the number of correlation-immune functions is more complex but comparable. In both cases, the bound when m =1is better than Park, Lee, Sung and Kim's bound. It seems difficult to improve it significantly for low orders. But Schneider's bound is weak for high orders. For instance, the exact number of(n 3)-resilient functions has been computed [1]: it 3

Q 3 is equal to n(n 1)(3n 2)(n+1)=3, which ismuch less than j=1 as we can see in Table 1. n j 1 j 2 2j 1 ( n 4 ), n Schneider/exact n Schneider/exact 5 3:9 10 1 9 1:1 10 9 6 8:6 10 2 10 5:7 10 11 7 4:4 10 4 11 5:9 10 14 8 4:8 10 6 12 1:3 10 18 Table 1. (Schneider's bound/exact number) of (n 3)-resilient functions In this paper we derive a new bound which significantly improves upon Schneider's bound for high order correlation-immune and resilient functions. We denote by B(n) the set of Boolean functions in n variables, by B(k; n) the subset of those Boolean functions of algebraic degrees at most k, by D(k; n) the set of functions in B(n) whose distances to affine functions are all divisible by 2 k and by C(k; n) the set of functions in B(n) whose distances to affine functions are all congruent to2 k mod 2 k+1.wealsodenoteb(n) =jb(n)j and B(k; n) = jb(k; n)j. Thus every bent function is in C(n=2 1;n), every m-th order correlation immune function is in D(m; n), and every m-resilient function is in D(m +1;n). 3 Necessary Conditions on Functions with Walsh Spectrum Constraints A relation between the coefficients of the NNFand the coefficients of the ANF of any Boolean function f is shown in [4]: I = 2 n X k=1 ( 2) k 1 X fi 1 ;:::;I k gj I 1 [ [I k =I a I1 a Ik ; (3) where the indices I 1 ;:::;I k are all distinct and in indefinite order. We deduce necessary conditions for a function to bent or resilient (see also [6,7]). Theorem 31 Let n and m be anypositive integers. Let f be any Boolean function on F n 2.Let f(x) = L I f1; ;ng a I x I be its ANF. Denote by g(x) the function f(x) Φ x 1 Φ :::Φ x n and let g(x) = L I f1; ;ng b I x I its ANF (i.e. b I = a I Φ 1 if jij =1; b I = a I otherwise). Then M 1. if f is bent (n even) and n 6, then for every multi-index I such that jij n +2,wehavethat a 2 J a K =0. 4

2. if f is m-th order correlation-immune with n>m 2, then for every multiindex I such that jij n m +2, we have that a J a K =0. M M 3. if f is m-resilient with n>m 2, then for every multi-index I such that jij n m, we have that b J b K =0. Noticethatiff is m-resilient andifjij >n m, then the condition J [K = I and the fact that f has algebraic degree M at most n m M1 imply that J and K must have at least size 2; thus b J b K = a J a K. 4 Dependence and Bounds In this section we use Theorem 31 to obtain bounds on the numbers of bent, resilient, and correlation-immune functions. Our strategy is to show that certain coefficients depend on other coefficients. In the cases of bent and correlation immune functions, we are trying to bound the size of a set E(d; n) offunctions f(x) = P I f1;2; ;ng a Ix I 2B(d; n) such that for all I with jij d +2,wehave M fj;kg:j[k=i a J a K =0: (4) In the case of resilient functions, we are trying to bound a similar set where the I are only constrained to have size at least d +1. We obtain bounds by counting within certain subsets of B(d; n). Specifically, if A(d; n) is the set of homogeneous polynomials of degree d in x 1 ; ;x n,thenwe have B(d; n) =B(d 1;n)[([ h2a(d;n) h+b(d 1;n)). Fix h(x) = P jij=d a Ix I 2 A(d; n). An element ofe(d; n) (h + B(d 1;n)) is determined by achoice of a I for each I of size less than or equal to d 1 satisfying equation (4). Lemma 1. Let n, d and l be positive integers such that d» n and l» min(d 1;n d). Denote by E l (d; n) the set of functions f(x) = P I f1;2; ;ng a Ix I 2 B(d; n) such that for all I with jij d + l, we have L fj;kg:j[k=i a J a K =0. Let f 2E l (d; n) have degree d and let J be a multi-index of cardinality d such that the coefficient a J of x J in the ANF of f equals 1. The coefficients a K with K J = ; and l»jkj»d 1 in the ANF of f are then completely determined by the coefficients a L with L J 6= ;. It follows that je l (d; n) (h + B(d 1;n)j)» 2 Summing over h we immediately obtain that P min(d 1;n d) i=l B(d 1;n) ( n d i ) : B(d; n) B(d 1;n) je l (d; n)j» P min(d 1;n d) + B(d 2 i=l ( n d 1;n): i ) 5

We can improve this bound when d» n d (or, equivalently, d» n=2) by considering the coefficients a K with jkj = d. IfJ and K are two disjoint multiindices with size d and I = J [ K, then the equation corresponding to I is simply a J a K = 0. That is, at least one of a J and a K must be zero. Thus we need only count the sets E l (d; n) (h + B(d 1;n)) for h such that no two coefficients with disjoint multi-indices are both 1. Lemma 2. Let d» n=2. The number of homogeneous degree d functions h in n variables such that no two coefficients with disjoint multi-indices are both 1 is at most 2 (n d) ( n d d ) (1 + ffl), where ffl =1=2 Ω((2 n =n) 1=2 ). Thus we have the following. Theorem 41 Let l be apositive integer smaller than min(d 1;n d). Ifd» n=2, then B(d; n)(1 + ffl) je l (d; n)j» P d + B(d 1;n); 2 i=l (n d i ) where ffl =1=2 Ω((2n =n) 1=2 ).Ifd>n=2, then P l 1 2 2n d i=0 (n d i ) B(d; n) B(d 1;n) je l (d; n)j» + B(d 1;n): Combining this with Theorem 31, we have the following bounds on the numbers of bent, correlation immune, and resilient functions. Corollary 42 For n 6 even, the number of bent functions in n variables is at most B(n=2;n)(1 + ffl) +B(n=2 1;n)=2 2n 1 +( n=2)=2 2 n n=2 +n=2+1 (1+ffl)+2 2n 1 ( n=2)=2 n ; 2 2n=2 n=2 1 where ffl =1=2 Ω((2n =n) 1=2 ).If2» n=2» m<n, then the number of m-th order correlation immune functions in n variables is at most 2 m+1 B(n m; n)(1 + ffl) B(n m; m) + B(n m 1;n); where ffl = 1=2 Ω((2n =n) 1=2 ).If2» m < n=2, then the number of m-th order correlation immune functions in n variables is at most B(n m; n) B(n m 1;n) + B(n 2 2m m 1;n): m 1 If n=2» m < n, then the number of (m 1)-resilient functions in n variables is at most 2B(n m; n)(1 + ffl) + B(n m 1;n); B(n m; m) where ffl =1=2 Ω((2n =n) 1=2 ).If2» m<n=2, then the number of (m 1)-resilient functions in n variables is at most B(n m; n) B(n m 1;n) 2 2m 1 + B(n m 1;n): 6

Acknowledgements The authors are grateful to Harald Niedereitter and the Institute for Mathematical Sciences at the National University of Singapore for bringing them together and for allowing them to use the facilities of the Institute during the summer of 2001. References 1. P. Camion, C. Carlet, P. Charpin, and N. Sendrier, On correlation-immune functions, Advances in Cryptology: Crypto '91, Proceedings, Lecture Notes in Computer Science 576, (1991), pp. 86-100. 2. C. Carlet, Recent results on binary bent functions, International Conference on Combinatorics, Information Theory and Statistics; Journal of Combinatorics, Information and System Sciences 24, n ffi 3-4, (1999), pp. 275-291 3. C. Carlet, On the coset weight divisibility and nonlinearity of resilient and correlation-immune functions, to appear in the Proceedings of SETA 2001(Sequences and their Applications,Bergen, Norway, May 2001), published by Discrete Mathematics and Theoretical Computer Science Series, Springer-Verlag. 4. C. Carlet and P. Guillot, A new representation of Boolean functions, Proceedings of AAECC'13, Lecture Notes in Computer Science 1719, (1999), pp. 94-103. 5. C. Carlet and P. Guillot, Bent, resilient functions and the Numerical Normal Form, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 56, (2001), pp. 87-96. 6. X.D. Hou. On the coefficients of binary bent functions, Proceedings of the American Mathematical Society, S 0002-9939(99)05146-1. Article electronically published on August 17, 1999. 7. X.D. Hou and and P. Langevin. Results on bent functions, Journal of Combinatorial Theory, Series A, 80, 232-246 (1997). 8. F. J. Mac Williams and N. J. Sloane, The theory of error-correcting codes, Amsterdam, North Holland, 1977. 9. S. Maitra et P. Sarkar, Enumeration of correlation-immune Boolean functions, ACISP, (1999), pp. 12-25. 10. S.M.Park, S. Lee, S. H. Sung et K. Kim, Improving bounds for the number of correlation-immune Boolean functions. Information Processing Letters 61, (1997), pp. 209-212. 11. B. Preneel, Analysis and Design of Cryptographic Hash Functions, Ph. D. Thesis, Katholieke Universiteit Leuven, K. Mercierlaan 94, 3001 Leuven, Belgium (1993). 12. O. S. Rothaus, On bent functions, J. Comb. Theory 20A, (1976), pp. 300-305. 13. M. Schneider, A note on the construction and upper bounds of correlation-immune functions, 6thIMA Conference, (1997), pp. 295-306. 14. T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information theory IT-30, (1984), pp. 776-780. 15. T. Siegenthaler, Decrypting a Class of Stream Ciphers Using Ciphertext Only, IEEE Transactions on Computers C-34, n ffi 1, (1985), pp. 81-85. 16. Y. Yang and B. Guo, Further enumerating Boolean functions of cryptographic signifiance, Journal of Cryptology 8, (1995), pp. 115-122. 7

17. Xiao Guo-Zhen and J. L. Massey, A Spectral Characterization of Correlation- Immune Combining Functions, IEEE Transactions on Information Theory 34, n ffi 3, (1988), pp. 569-571. 18. Jian-Zhou Zhang, Zhi-Sheng You, and Zheng-Liang Li, Enumeration of binary orthogonal arrays of strength 1, Discrete Mathematics, to appear. A Tables n n m =3n m =4 n m =5 n m =6 n m =7 6 6:3 10 3 3:5 10 10 1:8 10 16 7 2:5 10 4 1:1 10 15 5:0 10 27 1:7 10 35 8 9:9 10 4 3:0 10 20 3:6 10 44 6:6 10 63 2:8 10 73 9 3:9 10 5 6:2 10 26 1:1 10 68 3:0 10 110 1:5 10 138 10 1:6 10 6 1:0 10 34 2:2 10 99 5:3 10 182 5:7 10 250 11 6:3 10 6 1:4 10 42 4:8 10 139 3:9 10 289 1 10 438 12 2:5 10 7 1:5 10 51 1:8 10 190 4:1 10 441 4:2 10 736 13 1 10 8 1:3 10 61 1:8 10 252 6:7 10 650 1:2 10 1195 14 4 10 8 8:8 10 71 8:3 10 326 6:1 10 930 2:6 10 1875 15 1:6 10 9 4:9 10 83 2:6 10 415 3:4 10 1296 9:3 10 2854 Table 2. Bounds on the number of m-resilient functions, m large n n m =3n m =4n m =5 n m =6 n m =7 6 1:5 10 2 6:3 3:6 10 1 7 3:7 10 3 1:9 10 2 2:9 10 1 7:2 10 2 8 9 1:8 10 5 1:7 10 7 6:6 10 4 5:6 10 8 8:4 10 1 2:6 10 3 5:4 10 1:7 10 5 1 10 2 3:2 10 6 10 3:3 10 9 2:3 10 14 9:3 10 5 5:6 10 8 4:2 10 13 11 1:3 10 12 9 10 21 1 10 14 1:5 10 9 7:2 10 25 12 9:9 10 14 6:8 10 31 3:5 10 27 7:2 10 8 1 10 42 13 1:5 10 18 2 10 44 3:4 10 48 2:7 10 1 10 64 14 4:7 10 21 4:4 10 59 1:9 10 79 1:9 10 22 8:8 10 95 15 2:9 10 25 1:5 10 78 2:3 10 122 5:2 10 62 2:8 10 119 Table 3. (Schneider's bound/new bound) for m-resilient functions 8