Covering sequences and t, k-bentness criteria

Download
2009
Kurnaz, Güzin
This dissertation deals with some crucial building blocks of cryptosystems in symmetric cryptography; namely the Boolean functions that produce a single-bit result for each possible value of the m-bit input vector, where m>1. Objectives in this study are two-fold; the first objective is to develop relations between cryptographic properties of Boolean functions, and the second one is to form new concepts that associate coding theory with cryptology. For the first objective, we concentrate on the cryptographic properties of Boolean functions such as balancedness, correlation immunity, nonlinearity, resiliency and propagation characteristics; many of which are depending on the Walsh spectrum that gives components of the Boolean function along the direction of linear functions. Another efficient tool to study Boolean functions is the subject of covering sequences introduced by Carlet and Tarannikov in 2000. Covering sequences are defined in terms of the derivatives of the Boolean function. Carlet and Tarannikov relate the correlation immunity and balancedness properties of the Boolean function to its covering sequences. We find further relations between the covering sequence and the Walsh spectrum, and present two theorems for the calculation of covering sequences associated with each null frequency of the Walsh spectrum. As for the second objective of this thesis, we have studied linear codes over the rings Z4 and Z8 and their binary images in the Galois field GF(2). We have investigated the best-known examples of nonlinear binary error-correcting codes such as Kerdock, Preperata and Nordstrom-Robinson, which are -linear codes. We have then reviewed Tokareva’s studies on Z4-linear codes and extended them to Z8-linear codes. We have defined a new classes of bent functions. Next, we have shown that the newly defined classes of bent, namely Tokareva’s k-bent and our t,k-bent functions are affine equivalent to the well-known Maiorana McFarland class of bent functions. As a cryptological application, we have described the method of cubic cryptanalysis, as a generalization of the linear cryptanalysis given by Matsui in 1993. We conjecture that the newly introduced t,k-bent functions are also strong against cubic cryptanalysis, because they are as far as possible to t,k-bent functions.

Suggestions

Multipath Characteristics of Frequency Diverse Arrays Over a Ground Plane
Cetintepe, Cagri; Demir, Şimşek (Institute of Electrical and Electronics Engineers (IEEE), 2014-07-01)
This paper presents a theoretical framework for an analytical investigation of multipath characteristics of frequency diverse arrays (FDAs), a task which is attempted for the first time in the open literature. In particular, transmitted field expressions are formulated for an FDA over a perfectly conducting ground plane first in a general analytical form, and these expressions are later simplified under reasonable assumptions. Developed formulation is then applied to a uniform, linear, continuous-wave opera...
Hierarchical parallelisation strategy for multilevel fast multipole algorithm in computational electromagnetics
Ergül, Özgür Salih (Institution of Engineering and Technology (IET), 2008-01-03)
A hierarchical parallelisation of the multilevel fast multipole algorithm (MLFMA) for the efficient solution of large-scale problems in computational electromagnetics is presented. The tree structure of MLFMA is distributed among the processors by partitioning both the clusters and the samples of the fields appropriately for each level. The parallelisation efficiency is significantly improved compared to previous approaches, where only the clusters or only the fields are partitioned in a level.
A Hierarchical Partitioning Strategy for an Efficient Parallelization of the Multilevel Fast Multipole Algorithm
Ergül, Özgür Salih (Institute of Electrical and Electronics Engineers (IEEE), 2009-06-01)
We present a novel hierarchical partitioning strategy for the efficient parallelization of the multilevel fast multipole algorithm (MLFMA) on distributed-memory architectures to solve large-scale problems in electromagnetics. Unlike previous parallelization techniques, the tree structure of MLFMA is distributed among processors by partitioning both clusters and samples of fields at each level. Due to the improved load-balancing, the hierarchical strategy offers a higher parallelization efficiency than previ...
A comparative evaluation of conventional and particle filter based radar target tracking
Yıldırım, Berkin; Demirekler, Mübeccel; Department of Electrical and Electronics Engineering (2007)
In this thesis the radar target tracking problem in Bayesian estimation framework is studied. Traditionally, linear or linearized models, where the uncertainty in the system and measurement models is typically represented by Gaussian densities, are used in this area. Therefore, classical sub-optimal Bayesian methods based on linearized Kalman filters can be used. The sequential Monte Carlo methods, i.e. particle filters, make it possible to utilize the inherent non-linear state relations and non-Gaussian no...
Derivation of length extension formulas for complementary sets of sequences using orthogonal filterbanks
Candan, Çağatay (Institution of Engineering and Technology (IET), 2006-11-23)
A method for the construction of complementary sets of sequences using polyphase representation of orthogonal filterbanks is presented. It is shown that the case of two-channel filterbanks unifies individually derived length extension formulas for complementary sequences into a common framework and the general M-channel case produces novel formulas for the extension of complementary sets of sequences. The presented technique can also be used to generate polyphase and multilevel sequences.
Citation Formats
G. Kurnaz, “Covering sequences and t, k-bentness criteria,” Ph.D. - Doctoral Program, Middle East Technical University, 2009.