Abstract
Cryptographic applications of Boolean functions are meant to have some cryptographic properties, those properties are built to thwart cryptanalysis of certain kinds, and multiple cryptographic properties are usually required for a Boolean function to be used in cryptographic algorithm design, expected to resist some known attacks to the cryptographic algorithms. Therefore, the primary applications of cryptographic Boolean functions are the design of cryptographic algorithms, particularly stream cipher and block cipher algorithms. This chapter will discuss some applications of Boolean functions with some cryptographic properties in the areas beyond cryptographic algorithm design, where the involved Boolean functions are primary building blocks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, Zurich, pp. 78–91. ACM (1997)
Chabaud, F.: On the security of some cryptosystems based on error-correcting codes. In: Advances in Cryptology – Proceedings of Eurocrypt’94. LNCS 950, pp. 131–139. Springer, Berlin/Heidelberg (1995)
Desmedt, Y.: Threshold cryptosystems. In: Advances in Cryptology – Proceedings of Auscrypt’92. LNCS 718, pp. 3–14. Springer, Berlin/Heidelberg (1993)
Diffie, W., Hellman, M.: New directions in cryptology. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company/Bell Telephone Laboratories Incorporated, New York (1978)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)
McEliece, R.L.: “A public-key cryptosystem based on algebraic coding theory”, Deep Space Network Progress Report, Jet Propulsion Labs, Pasadena 42–44, pp. 114–116 (1978)
National Institute for Standards and Technology, “Escrowed Encryption Standard (EES),” Federal Information Processing Standards Publication (FIPS PUB) 185, 9 Feb 1994
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures. Commun. ACM 21(2), 120–126 (1978)
Shamir, A.: Partial key escrow: a new approach to software key escrow, presented at Key Escrow Conference, Washington, D.C., 15 Sept 1995
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Wu, CK., Feng, D. (2016). Cryptographic Applications of Boolean Functions. In: Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48865-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-662-48865-2_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48863-8
Online ISBN: 978-3-662-48865-2
eBook Packages: Computer ScienceComputer Science (R0)