<?xml version="1.0"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/"><rdf:Description rdf:about="https://repozitorij.upr.si/IzpisGradiva.php?id=3586"><dc:title>On cryptographically significant mappings over GF(2 [sup] n)</dc:title><dc:creator>Pašalić,	Enes	(Avtor)
	</dc:creator><dc:subject>cryptoanalysis</dc:subject><dc:subject>cryptography</dc:subject><dc:subject>permutation polynomials</dc:subject><dc:subject>power mappings</dc:subject><dc:subject>APN functions</dc:subject><dc:subject>S-box</dc:subject><dc:subject>CCZ-equivalence</dc:subject><dc:subject>algebraic properties</dc:subject><dc:description>In this paper we investigate the algebraic properties of important cryptographic primitives called substitution boxes (S-boxes). An S-box is a mapping that takes ▫$n$▫ binary inputs whose image is a binary ▫$m$▫-tuple; therefore it is represented as ▫$F:\text{GF}(2)^n \rightarrow \text{GF}(2)^m$▫. One of the most important cryptographic applications is the case ▫$n = m$▫, thus the S-box may be viewed as a function over ▫$\text{GF}(2^n)$▫. We show that certain classes of functions over ▫$\text{GF}(2^n)$▫ do not possess a cryptographic property known as APN (AlmostPerfect Nonlinear) permutations. On the other hand, when ▫$n$▫ is odd, an infinite class of APN permutations may be derived in a recursive manner, that is starting with a specific APN permutation on ▫$\text{GF}(2^k), k$▫ odd, APN permutations are derived over ▫$\text{GF}(2^{k+2i})$▫ for any ▫$i \geq 1$▫. Some theoretical results related to permutation polynomials and algebraic properties of the functions in the ring ▫$\text{GF}(q)[x,y]$▫ are also presented. For sparse polynomials over the field ▫$\text{GF}(2^n)$▫, an efficient algorithm for finding low degree I/O equations is proposed.</dc:description><dc:date>2008</dc:date><dc:date>2013-10-15 12:08:51</dc:date><dc:type>Delo ni kategorizirano</dc:type><dc:identifier>3586</dc:identifier><dc:language>sl</dc:language></rdf:Description></rdf:RDF>
