Lupa

Iskanje po repozitoriju Pomoč

A- | A+ | Natisni
Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 9 / 9
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
1.
Further results on the relation between nonlinearity and resiliency for Boolean functions
Enes Pašalić, Thomas Johansson, 1999, objavljeni znanstveni prispevek na konferenci (vabljeno predavanje)

Opis: A good design of a Boolean function used in a stream cipher requires that the function satisfies certain criteria in order to resist different attacks. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with good nonlinearity and some fixed resiliency.
Najdeno v: ključnih besedah
Povzetek najdenega: ...Boolean functions, cryptography, optimisation, search problems, stream cipher, attacks, maximum...
Ključne besede: Boolean functions, cryptography, optimisation, search problems, stream cipher, attacks, maximum nonlinearity, search algorithm, fixed resiliency
Objavljeno: 15.10.2013; Ogledov: 1328; Prenosov: 64
URL Polno besedilo (0,00 KB)

2.
Collisions for variants of the BLAKE hash function
Janoš Vidali, Peter Nose, Enes Pašalić, 2010, izvirni znanstveni članek

Najdeno v: ključnih besedah
Povzetek najdenega: ...BLAKE, BLOKE, BRAKE, collision, cryptography, fixed point, hash functions, ...
Ključne besede: BLAKE, BLOKE, BRAKE, collision, cryptography, fixed point, hash functions
Objavljeno: 15.10.2013; Ogledov: 1516; Prenosov: 28
URL Polno besedilo (0,00 KB)

3.
On cryptographically significant mappings over GF(2 [sup] n)
Enes Pašalić, 2008, objavljeni znanstveni prispevek na konferenci

Opis: In this paper we investigate the algebraic properties of important cryptographic primitives called substitution boxes (S-boxes). An S-box is a mapping that takes ▫$n$▫ binary inputs whose image is a binary ▫$m$▫-tuple; therefore it is represented as ▫$F:\text{GF}(2)^n \rightarrow \text{GF}(2)^m$▫. One of the most important cryptographic applications is the case ▫$n = m$▫, thus the S-box may be viewed as a function over ▫$\text{GF}(2^n)$▫. We show that certain classes of functions over ▫$\text{GF}(2^n)$▫ do not possess a cryptographic property known as APN (AlmostPerfect Nonlinear) permutations. On the other hand, when ▫$n$▫ is odd, an infinite class of APN permutations may be derived in a recursive manner, that is starting with a specific APN permutation on ▫$\text{GF}(2^k), k$▫ odd, APN permutations are derived over ▫$\text{GF}(2^{k+2i})$▫ for any ▫$i \geq 1$▫. Some theoretical results related to permutation polynomials and algebraic properties of the functions in the ring ▫$\text{GF}(q)[x,y]$▫ are also presented. For sparse polynomials over the field ▫$\text{GF}(2^n)$▫, an efficient algorithm for finding low degree I/O equations is proposed.
Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptoanalysis, cryptography, permutation polynomials, power mappings, APN functions, S-box,...
Ključne besede: cryptoanalysis, cryptography, permutation polynomials, power mappings, APN functions, S-box, CCZ-equivalence, algebraic properties
Objavljeno: 15.10.2013; Ogledov: 1340; Prenosov: 26
URL Polno besedilo (0,00 KB)

4.
Selected topics in cryptography, solved exam problems
Enes Pašalić, 2013, drugo učno gradivo

Najdeno v: ključnih besedah
Povzetek najdenega: Zadetek v naslovu
Ključne besede: cryptography, cipher, encryption, cryptosystem
Objavljeno: 15.10.2013; Ogledov: 2045; Prenosov: 48
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

5.
Corrigendum to "A note on nonexistence of vectorial bent functions with binomial trace representation in the PS[sup]- class" [Information Processing Letters 115 (2) (2015) 139-140]
Enes Pašalić, 2015, drugi članki ali sestavki

Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptography, vectorial bent funtions, trace functions, binomial bent...
Ključne besede: cryptography, vectorial bent funtions, trace functions, binomial bent functions
Objavljeno: 15.10.2015; Ogledov: 903; Prenosov: 55
URL Polno besedilo (0,00 KB)

6.
A note on nonexistence of vectorial bent functions with binomial trace representation in the PS[sup]- class
Enes Pašalić, 2015, kratki znanstveni prispevek

Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptography, vectorial bent funtions, trace functions, binomial bent...
Ključne besede: cryptography, vectorial bent funtions, trace functions, binomial bent functions
Objavljeno: 15.10.2015; Ogledov: 857; Prenosov: 52
URL Polno besedilo (0,00 KB)

7.
Vectorial quadratic bent functions as a product of two linearized polynomials
Samed Bajrić, 2015, objavljeni povzetek znanstvenega prispevka na konferenci

Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptography, Boolean functions, CCZ inequivalence, ...
Ključne besede: cryptography, Boolean functions, CCZ inequivalence
Objavljeno: 08.08.2016; Ogledov: 827; Prenosov: 10
URL Polno besedilo (0,00 KB)

8.
Design methods for semi-bent functions
Enes Pašalić, Sugata Gangopadhyay, WeiGuo Zhang, Samed Bajrić, 2019, izvirni znanstveni članek

Opis: Semi-bent functions play an important role in the construction of orthogonal variable spreading factor codes used in code-division multiple-access (CDMA) systems as well as in certain cryptographic applications. In this article we provide several infinite classes of semi-bent functions, where each class is characterized by either a different decomposition of such a function with respect to the Walsh spectra of its subfunctions, or by the method used for its derivation. In particular, we also give the exact number of possibilities of decomposing bent functions, in a subclass of the Maiorana-McFarland class.
Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptography, Boolean functions, bent functions, semi-bent functions, derivatives...
Ključne besede: cryptography, Boolean functions, bent functions, semi-bent functions, derivatives
Objavljeno: 19.12.2018; Ogledov: 845; Prenosov: 95
URL Polno besedilo (0,00 KB)

9.
New second-order threshold implementation of AES
Yongzhuang Wei, Fu Yao, Enes Pašalić, An Wang, 2019, izvirni znanstveni članek

Najdeno v: ključnih besedah
Povzetek najdenega: ...cryptography, AES block cipher, protection against side-channel attacks...
Ključne besede: cryptography, AES block cipher, protection against side-channel attacks
Objavljeno: 13.02.2019; Ogledov: 292; Prenosov: 51
URL Polno besedilo (0,00 KB)

Iskanje izvedeno v 0 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici