Lupa

Search the repository Help

A- | A+ | Print
Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 10 / 54
First pagePrevious page123456Next pageLast page
1.
2.
Coding theory and applications, cyclic codes
Enes Pašalić, 2013, other educational material

Found in: osebi
Keywords: coding theory, cyclic codes, BCH codes, Reed-Solomon codes, channel erasures
Published: 15.10.2013; Views: 2364; Downloads: 101
URL Full text (0,00 KB)
This document has more files! More...

3.
Integral distinguishers of the full-round lightweight block cipher SAT_Jo
Enes Pašalić, Samir Hodžić, Yongzhuang Wei, Xueying Qiu, 2021, original scientific article

Found in: osebi
Keywords: cryptography, integral cryptanalysis, block ciphers
Published: 18.10.2021; Views: 340; Downloads: 17
URL Full text (0,00 KB)

4.
Coding theory and applications, solved exercises and problems of cyclic codes
Enes Pašalić, 2013, other educational material

Found in: osebi
Keywords: finite field, counting cyclic codes, codeword, Hamming code, Ternary Golay code, BCH code, BCH decoding, Fire code, Erasure corrections, MDS code, convolutional code
Published: 15.10.2013; Views: 2326; Downloads: 79
URL Full text (0,00 KB)
This document has more files! More...

5.
A new method for secondary constructions of vectorial bent functions
Enes Pašalić, Amar Bapić, 2021, original scientific article

Found in: osebi
Keywords: bent functions, vectorial bent functions, algebraic degree, EA equivalence, CCZ equivalence
Published: 18.10.2021; Views: 266; Downloads: 19
URL Full text (0,00 KB)

6.
Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic cryptanalysis
Enes Pašalić, 2009, published scientific conference contribution

Abstract: In this paper the possibilities of an iterative concatenation method towards construction of Boolean functions resistant to algebraic cryptanalysis are investigated. The notion of ▫$\mathcal{AAR}$▫ (Algebraic Attack Resistant) function is introduced as a unified measure of protection against classical algebraic attacks as well as fast algebraic attacks. Then, it is shown that functions that posses the highest resistance to fast algebraic attacks are necessarily of maximum ▫$\mathcal{AI}$▫ (Algebraic Immunity), the notion defined as a minimum degree of functions that annihilate either ▫$f$▫ or ▫$1+f$▫. More precisely, if for any non-annihilating function ▫$g$▫ of degree ▫$e$▫ an optimum degreerelation ▫$e+d \ge n$▫ is satisfied in the product ▫$fg=h$▫ (denoting ▫$deg(h)=d$▫), then the function ▫$f$▫ in ▫$n$▫ variables must have maximum ▫$\mathcal{AI}$▫, i.e. for nonzero function ▫$g$▫ the relation ▫$fg=0$▫ or ▫$(1+f)g=0$▫ implies. The presented theoretical framework allows us to iteratively construct functions with maximum ▫$\mathcal{AI}$▫ satisfying ▫$e+d=n-1$▫, thus almost optimized resistance to fast algebraic cryptanalysis. This infinite class for the first time, apart from almost optimal resistance to algebraic cryptanalysis, in addition generates the functions that possess high nonlinearity (superior to previous constructions) and maximum algebraic degree, thus unifying most of the relevant cryptographic criteria.
Found in: osebi
Keywords: algebraic cryptoanalysis, fast algebraic attacks, algebraic immunity, annihilators, algebraic attack resistant, high degree product, stream ciphers, Boolean function
Published: 15.10.2013; Views: 2537; Downloads: 132
URL Full text (0,00 KB)

7.
Stream ciphers
Enes Pašalić, 2013, other educational material

Found in: osebi
Keywords: stream ciphers, pseudo-random sequences, Boolean functions
Published: 15.10.2013; Views: 2214; Downloads: 65
URL Full text (0,00 KB)
This document has more files! More...

8.
9.
Further results on the relation between nonlinearity and resiliency for Boolean functions
Enes Pašalić, Thomas Johansson, 1999, published scientific conference contribution (invited lecture)

Abstract: A good design of a Boolean function used in a stream cipher requires that the function satisfies certain criteria in order to resist different attacks. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with good nonlinearity and some fixed resiliency.
Found in: osebi
Keywords: Boolean functions, cryptography, optimisation, search problems, stream cipher, attacks, maximum nonlinearity, search algorithm, fixed resiliency
Published: 15.10.2013; Views: 2269; Downloads: 127
URL Full text (0,00 KB)

10.
Finite structures in cryptology
Enes Pašalić, 2013, invited lecture at foreign university

Found in: osebi
Keywords: multiple Boolean function, bent function, cryptology
Published: 15.10.2013; Views: 1931; Downloads: 27
URL Full text (0,00 KB)

Search done in 0 sec.
Back to top
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica