Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
On verification of restricted extended affine equivalence of vectorial boolean functions
Download
index.pdf
Date
2012
Author
Sınak, Ahmet
Metadata
Show full item record
Item Usage Stats
218
views
92
downloads
Cite This
Vectorial Boolean functions are used as S-boxes in cryptosystems. To design inequivalent vectorial Boolean functions resistant to known attacks is one of the challenges in cryptography. Verifying whether two vectorial Boolean functions are equivalent or not is the final step in this challenge. Hence, finding a fast technique for determining whether two given vectorial Boolean functions are equivalent is an important problem. A special class of the equivalence called restricted extended affine (REA) equivalence is studied in this thesis. We study the verification complexity of REA-equivalence of two vectorial Boolean functions for some types, namely types I to VI. We first review the verification of the REA-equivalence types I to IV given in the recent work of Budaghyan and Kazymyrov (2012). Furthermore, we present the complexities of the verification of REA-equivalence types I and IV in the case basic simultaneous Gaussian elimination method is used. Next, we present two new REA-equivalence types V and VI with their complexities. Finally, we give the algorithms of each type I to VI with their MAGMA codes.
Subject Keywords
Vector analysis.
,
Algebra, Boolean.
,
Differential equations, Linear.
,
Cryptography.
URI
http://etd.lib.metu.edu.tr/upload/12615191/index.pdf
https://hdl.handle.net/11511/22180
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions
Özbudak, Ferruh; Yayla, Oğuz (2015-02-01)
Vectorial Boolean functions are used as substitution boxes in cryptosystems. Designing inequivalent functions resistant to known attacks is one of the challenges in cryptography. In doing this, finding a fast technique for determining whether two given functions are equivalent is a significant problem. A special class of the equivalence called restricted extended affine (REA) equivalence is studied in this paper. We update the verification procedures of the REA-equivalence types given in the recent work of ...
Integrable KdV systems: Recursion operators of degree four
Gurses, M; Karasu, Atalay (1999-01-25)
The recursion operator and bi-Hamiltonian formulation of the Drinfeld-Sokolov system are given. (C) 1999 Elsevier Science B.V.
Divisibility properties on boolean functions using the numerical normal form
Göloğlu, Faruk; Yücel, Melek D; Department of Cryptography (2004)
A Boolean function can be represented in several different forms. These different representation have advantages and disadvantages of their own. The Algebraic Normal Form, truth table, and Walsh spectrum representations are widely studied in literature. In 1999, Claude Carlet and Phillippe Guillot introduced the Numerical Normal Form. NumericalNormal Form(NNF) of a Boolean function is similar to Algebraic Normal Form, with integer coefficients instead of coefficients from the two element field. Using NNF re...
On higher order approximations for hermite-gaussian functions and discrete fractional Fourier transforms
Candan, Çağatay (Institute of Electrical and Electronics Engineers (IEEE), 2007-10-01)
Discrete equivalents of Hermite-Gaussian functions play a critical role in the definition of a discrete fractional Fourier transform. The discrete equivalents are typically calculated through the eigendecomposition of a commutator matrix. In this letter, we first characterize the space of DFT-commuting matrices and then construct matrices approximating the Hermite-Gaussian generating differential equation and use the matrices to accurately generate the discrete equivalents of Hermite-Gaussians.
On construction of recursion operators from Lax representation
Gurses, M; Karasu, Atalay; Sokolov, VV (1999-12-01)
In this work we develop a general procedure for constructing the recursion operators for nonlinear integrable equations admitting Lax representation. Several new examples are given. In particular, we find the recursion operators for some KdV-type systems of integrable equations. (C) 1999 American Institute of Physics. [S0022-2488(99)03212-0].
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. Sınak, “On verification of restricted extended affine equivalence of vectorial boolean functions,” M.S. - Master of Science, Middle East Technical University, 2012.