Second Order Nonlinearities of Some Classes of Cubic Boolean Functions Based on Secondary Constructions

@inproceedings{Singh2011SecondON,
  title={Second Order Nonlinearities of Some Classes of Cubic Boolean Functions Based on Secondary Constructions},
  author={Deep Singh},
  year={2011}
}
The higher order nonlinearity of a Boolean function is a cryptographic criterion, which play a role against attacks on stream and block ciphers. Also it play a role in coding theory, since it is related to the covering radii of Reed-Muller codes. In this paper, we study the lower bounds of second-order nonlinearities of a class of cubic Boolean functions of the form with and ∈ ′ and some classes of cubic Boolean functions based on secondary construction. Whose lower bounds on second order… CONTINUE READING

Tables from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

On the nonlinearity profile of the Dillon function

  • IACR Cryptology ePrint Archive
  • 2009
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Improving the Upper Bounds on the Covering Radii of Binary Reed–Muller Codes

  • IEEE Transactions on Information Theory
  • 2007
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

A new class of monomial bent functions

  • 2006 IEEE International Symposium on Information Theory
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

On second order nonlinearities of cubic monomial Boolean functions

  • IACR Cryptology ePrint Archive
  • 2009
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

On higher-order nonlinearity of monomial partial-spreads type Boolean functions, IMST 2009 - FIM XVIII, Jaypee University of Information Technology, Waknaghat, Solan, H.P., India

R. Telang, S. Gangopadhyay
  • Deep Singh, / (IJCSIT) International Journal of Computer Science and Information Technologies,
  • 2009
VIEW 1 EXCERPT

Tavernier , “ An improved list decoding algorithm for the second - order Reed Muller codes and its applications

S. Sarkar Gangopadhyay, R. Telang
  • Designs Codes and Cryptography
  • 2008