Abstract
Some cryptographic properties such as linear structure, SAC and nonlinearity of Exponential boolean functions and permutations on GF(2)n are studied in this paper.
Preview
Unable to display preview. Download preview PDF.
References
Tor Helleseth, Some Results about the Cross-Correlation Function between Two Maximal Linear Sequences, Discrete Mathematics, Vol. 16, 1976, pp. 209–232.
Y.Niho, Multi-values Cross-Correlation Function between Two Maximal Linear Recursive Sequences, Ph.D. Dissertation, Univ. of Southern California, Los Angeles, CA(1972).
K.Nyberg, Differentially Uniform Mappings for Cryptography, Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT'93, 1993.
Josef P.Pieprzyk, Non-Linearity of Exponent Permutations, Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT'89, pp.80–92, 1989.
J.Seberry, X.M.Zhang, and Y.Zheng, Structure of cryptographic functions with strong avalanche characteristics, Pre-proceedings of AISACRYPT'94, pp.96–106.
M.K.Simmon, J.K.Omura, R.A.Scholtz, B.K.Levitt, Spread Spectrum Communication, Vol.I, Computer Science Press, Inc., 1985, Chapter 5.
A.F.Webster and S.E.Tavares, On the design of S-boxes, Lecture Notes in Computer Science 219, Advances in Cryptology, Proceedings of CRYPTO'85, pp.523–534, 1986.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, X., Dai, Z.D., Gong, G. (1995). Some cryptographic properties of exponential functions. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000452
Download citation
DOI: https://doi.org/10.1007/BFb0000452
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59339-3
Online ISBN: 978-3-540-49236-8
eBook Packages: Springer Book Archive