1. Further results on the relation between nonlinearity and resiliency for Boolean functionsEnes Pašalić, Thomas Johansson, 1999, published scientific conference contribution (invited lecture) Abstract: A good design of a Boolean function used in a stream cipher requires that the function satisfies certain criteria in order to resist different attacks. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with good nonlinearity and some fixed resiliency. Found in: ključnih besedah Summary of found: ...Boolean functions, cryptography, optimisation, search problems, stream cipher, attacks, maximum... Keywords: Boolean functions, cryptography, optimisation, search problems, stream cipher, attacks, maximum nonlinearity, search algorithm, fixed resiliency Published: 15.10.2013; Views: 1383; Downloads: 68 Full text (0,00 KB) |
2. Collisions for variants of the BLAKE hash functionJanoš Vidali, Peter Nose, Enes Pašalić, 2010, original scientific article Found in: ključnih besedah Summary of found: ...BLAKE, BLOKE, BRAKE, collision, cryptography, fixed point, hash functions, ... Keywords: BLAKE, BLOKE, BRAKE, collision, cryptography, fixed point, hash functions Published: 15.10.2013; Views: 1554; Downloads: 31 Full text (0,00 KB) |
3. On cryptographically significant mappings over GF(2 [sup] n)Enes Pašalić, 2008, published scientific conference contribution Abstract: In this paper we investigate the algebraic properties of important cryptographic primitives called substitution boxes (S-boxes). An S-box is a mapping that takes ▫$n$▫ binary inputs whose image is a binary ▫$m$▫-tuple; therefore it is represented as ▫$F:\text{GF}(2)^n \rightarrow \text{GF}(2)^m$▫. One of the most important cryptographic applications is the case ▫$n = m$▫, thus the S-box may be viewed as a function over ▫$\text{GF}(2^n)$▫. We show that certain classes of functions over ▫$\text{GF}(2^n)$▫ do not possess a cryptographic property known as APN (AlmostPerfect Nonlinear) permutations. On the other hand, when ▫$n$▫ is odd, an infinite class of APN permutations may be derived in a recursive manner, that is starting with a specific APN permutation on ▫$\text{GF}(2^k), k$▫ odd, APN permutations are derived over ▫$\text{GF}(2^{k+2i})$▫ for any ▫$i \geq 1$▫. Some theoretical results related to permutation polynomials and algebraic properties of the functions in the ring ▫$\text{GF}(q)[x,y]$▫ are also presented. For sparse polynomials over the field ▫$\text{GF}(2^n)$▫, an efficient algorithm for finding low degree I/O equations is proposed. Found in: ključnih besedah Summary of found: ...cryptoanalysis, cryptography, permutation polynomials, power mappings, APN functions, S-box,... Keywords: cryptoanalysis, cryptography, permutation polynomials, power mappings, APN functions, S-box, CCZ-equivalence, algebraic properties Published: 15.10.2013; Views: 1370; Downloads: 27 Full text (0,00 KB) |
4. |
5. |
6. |
7. |
8. Design methods for semi-bent functionsEnes Pašalić, Sugata Gangopadhyay, WeiGuo Zhang, Samed Bajrić, 2019, original scientific article Abstract: Semi-bent functions play an important role in the construction of orthogonal variable spreading factor codes used in code-division multiple-access (CDMA) systems as well as in certain cryptographic applications. In this article we provide several infinite classes of semi-bent functions, where each class is characterized by either a different decomposition of such a function with respect to the Walsh spectra of its subfunctions, or by the method used for its derivation. In particular, we also give the exact number of possibilities of decomposing bent functions, in a subclass of the Maiorana-McFarland class. Found in: ključnih besedah Summary of found: ...cryptography, Boolean functions, bent functions, semi-bent functions, derivatives... Keywords: cryptography, Boolean functions, bent functions, semi-bent functions, derivatives Published: 19.12.2018; Views: 928; Downloads: 102 Full text (0,00 KB) |
9. New second-order threshold implementation of AESYongzhuang Wei, Fu Yao, Enes Pašalić, An Wang, 2019, original scientific article Found in: ključnih besedah Summary of found: ...cryptography, AES block cipher, protection against side-channel attacks... Keywords: cryptography, AES block cipher, protection against side-channel attacks Published: 13.02.2019; Views: 332; Downloads: 55 Full text (0,00 KB) |