• Publications
  • Influence
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
TLDR
We first prove a sharper version of McEliece theorem for Reed-Muller codes as applied to resilient functions, which also generalizes Xiao-Massey characterization. Expand
  • 204
  • 21
  • PDF
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
TLDR
In this paper we present a construction keeping in mind the basic theory of annihilator immunity and the weight, nonlinearity and algebraic degree of the functions can be properly calculated under certain cases. Expand
  • 227
  • 14
  • PDF
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
TLDR
We obtain better results than all published works on the construction of n-variable, m-resilient functions, including cases where the constructed functions have the maximum possible algebraic degree n - m - 1. Expand
  • 186
  • 14
  • PDF
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
TLDR
We show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Expand
  • 228
  • 8
Further constructions of resilient Boolean functions with very high nonlinearity
TLDR
We provide resilient Boolean functions with currently best known nonlinearity for stream ciphers. Expand
  • 103
  • 8
RC4 Stream Cipher and Its Variants
TLDR
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. Expand
  • 62
  • 8
(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
TLDR
We investigate the effect of RC4 keylength on its keystream, and report significant biases involving the length of the secret key. Expand
  • 74
  • 8
  • PDF
Permutation After RC4 Key Scheduling Reveals the Secret Key
  • G. Paul, S. Maitra
  • Mathematics, Computer Science
  • Selected Areas in Cryptography
  • 16 August 2007
TLDR
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Expand
  • 60
  • 7
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA
TLDR
The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes. Expand
  • 16
  • 7
  • PDF
Evolving Boolean Functions Satisfying Multiple Criteria
TLDR
We show how simulated annealing, a search technique inspired by the cooling processes of molten metals, can be used to derive functions with profiles of cryptographically-relevant properties as yet unachieved by any other technique. Expand
  • 82
  • 6
  • PDF