Bent Functions: Results and Applications to Cryptography
()
About this ebook
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions.
The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.
- Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications
- Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography
- Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers
Natalia Tokareva
Dr. Natalia Tokareva is a senior researcher at the Laboratory of Discrete Analysis in the Sobolev Institute of Mathematics and she teaches courses in cryptology in the Department of Mathematics and Mechanics at Novosibirsk State University. She has studied bent functions and their applications for several years, publishing one monograph (in Russian) and more than 12 articles. She has been a participant of many international conferences and seminars and presentations in the area of bent functions, particularly with applications in cryptography. Her research interests include Boolean functions in cryptography, bent functions, block and stream ciphers, cryptanalysis, coding theory, combinatorics, and algebra. She is chief of the seminar "Cryptography and Cryptanalysis" at the Sobolev Institute of Mathematics and she supervises BS, MS, and PhD students in discrete mathematics and cryptology.
Related to Bent Functions
Related ebooks
Bayesian Analysis of Stochastic Process Models Rating: 0 out of 5 stars0 ratingsStochastic Analysis of Mixed Fractional Gaussian Processes Rating: 0 out of 5 stars0 ratingsStream Ciphers and Number Theory Rating: 0 out of 5 stars0 ratingsMacroeconomic Modelling Rating: 0 out of 5 stars0 ratingsThe Works of Frederick Schiller Rating: 0 out of 5 stars0 ratingsHandbook of Volatility Models and Their Applications Rating: 5 out of 5 stars5/5Learning and Expectations in Macroeconomics Rating: 4 out of 5 stars4/5Quantitative Management of Bond Portfolios Rating: 0 out of 5 stars0 ratingsRuin Probabilities: Smoothness, Bounds, Supermartingale Approach Rating: 0 out of 5 stars0 ratingsNumerical Algebra Rating: 0 out of 5 stars0 ratingsA Primer on Statistical Distributions Rating: 0 out of 5 stars0 ratingsFoundations of Data Intensive Applications: Large Scale Data Analytics under the Hood Rating: 0 out of 5 stars0 ratingsPattern-Oriented Software Architecture, Patterns for Resource Management Rating: 3 out of 5 stars3/5Quadratic Form Theory and Differential Equations Rating: 0 out of 5 stars0 ratingsParallel Processing for Artificial Intelligence 1 Rating: 5 out of 5 stars5/5Michael Oakeshott Selected Writings Collection Rating: 0 out of 5 stars0 ratingsSoftware Modeling A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsProgramming Massively Parallel Processors: A Hands-on Approach Rating: 0 out of 5 stars0 ratingsImplementing Domain-Specific Languages with Xtext and Xtend Rating: 4 out of 5 stars4/5Learning ClojureScript Rating: 0 out of 5 stars0 ratingsMultiobjective Programming and Planning Rating: 0 out of 5 stars0 ratingsEstimation and Control of Large-Scale Networked Systems Rating: 0 out of 5 stars0 ratingsComputing Perspectives Rating: 5 out of 5 stars5/5Financial Instrument Pricing Using C++ Rating: 2 out of 5 stars2/5Moodle 1.9 Extension Development Rating: 0 out of 5 stars0 ratingsDataflow and Reactive Programming Systems Rating: 0 out of 5 stars0 ratingsFinancial Institution Advantage and the Optimization of Information Processing Rating: 0 out of 5 stars0 ratingsNonparametric Analysis of Univariate Heavy-Tailed Data: Research and Practice Rating: 0 out of 5 stars0 ratingsLearning Underscore.js Rating: 0 out of 5 stars0 ratingsA Tract on Monetary Reform Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Bent Functions
0 ratings0 reviews
Book preview
Bent Functions - Natalia Tokareva
functions
Chapter 1
Boolean Functions
Abstract
and its automorphisms are considered. It is shown how to associate Boolean functions in n . We discuss polynomial representations of Boolean and vectorial Boolean functions. Representations of a Boolean function in the trace form and in the reduced trace form are given. Some details on the degree of a Boolean function in the trace form and on monomial functions are presented. The notions introduced in this chapter will be useful throughout the book.
Keywords
Boolean function
Vectorial function
Algebraic normal form
Boolean cube
Hamming distance
Extended affine equivalence
Walsh-Hadamard transform
Finite field
Polynomial form
Trace form
Monomial function
Introduction
and its automorphisms are considered. It is shown how to associate Boolean functions in n . We discuss polynomial representations of Boolean and vectorial Boolean functions. Representations of a Boolean function in the trace form and in the reduced trace form are given. Some details on the degree of a Boolean function in the trace form and on monomial functions are presented. The notions introduced in this chapter will be useful throughout the book.
1.1 Definitions
denote the n. Let x = (x1,…,xnof length n.
A Boolean function in nvariables . It is called Boolean in honor of the British mathematician and philosopher George Boole (1815-1864).
Every Boolean function can be defined by its truth table:
and in the second column there are concrete values of a Boolean function taken on these vectors (denoted here by *). We suppose that the arguments of a function (i.e., vectors of length n) follow in lexicographical order. For example, if n = 3, the order is (000),(001),(010), (011),(100), (101), (110),(111).
For instance, the following are Boolean functions:
such that g(00) = g(11) = 1, g(01) = g(10) = 0;
such that h(x) = 1 if and only if x has two nonzero coordinates.
Their truth tables are as follows:
,
of them: to construct a function, one chooses 2n values (0 or 1) for f(x) when x .
Every Boolean function in n variables can be uniquely determined by its vector of values of length 2n. This is the transposed second column of its truth table.
In our examples, (1001) and (00010110) are vectors of values for g and h, respectively.
A vectorial Boolean function F in n , where m is an integer. It is also called an (n,m)-function. In what follows in this book, we consider m = n unless otherwise stated. For vectorial Boolean functions we use uppercase letters, whereas Boolean functions are denoted with lowercase letters.
Every vectorial Boolean function in n variables can be presented as
where f1,…,fn are Boolean functions in n variables called coordinate functions of F. An arbitrary nonempty linear combination of coordinate functions is called a component function of a vectorial function F. In terms of the inner product, which will be introduced in the next section, a component function is a function fv(x) = 〈F(x),v. In particular, every coordinate function is a component