2004
DOI: 10.1016/j.jco.2003.08.008
|View full text |Cite
|
Sign up to set email alerts
|

Highly nonlinear mappings

Abstract: Functions with high nonlinearity have important applications in cryptography, sequences and coding theory. The purpose of this paper is to give a well-rounded treatment of nonBoolean functions with optimal nonlinearity. We summarize and generalize known results, and prove a number of new results. We also present open problems about functions with high nonlinearity. r

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
154
0
3

Year Published

2007
2007
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 212 publications
(158 citation statements)
references
References 66 publications
(89 reference statements)
1
154
0
3
Order By: Relevance
“…Functions f : G → N , for which the equation f (x + a) − f (x) = b has no more than 1 solution for all a, b ∈ G not equal to zero simultaneously, are called differentially 1-uniform [25]. If N satisfies |G|/|N | = m ∈ N and function f : G → N is such that |{x ∈ G | f (x + a) − f (x) = b}| = m for any b ∈ N and non-zero a ∈ G, the latter is called perfect non-linear [7]. These functions are used in cryptography to construct S-boxes that are not vulnerable to differential cryptanalysis.…”
Section: Related Combinatorial Structuresmentioning
confidence: 99%
“…Functions f : G → N , for which the equation f (x + a) − f (x) = b has no more than 1 solution for all a, b ∈ G not equal to zero simultaneously, are called differentially 1-uniform [25]. If N satisfies |G|/|N | = m ∈ N and function f : G → N is such that |{x ∈ G | f (x + a) − f (x) = b}| = m for any b ∈ N and non-zero a ∈ G, the latter is called perfect non-linear [7]. These functions are used in cryptography to construct S-boxes that are not vulnerable to differential cryptanalysis.…”
Section: Related Combinatorial Structuresmentioning
confidence: 99%
“…[4,6,7,[9][10][11]13,14,16,17]). They can be used to construct DES-like cryptosystems that are resistant to differential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, if ϕ fix {(0, y)|y ∈ H}, then we call ϕ an extended affine transformation (EA-transformation) of f , and we define EA(f ) = {g | ϕ(G f ) = G g , ϕ(0, H) = (0, H)}. It is pointed out that CCZ equivalence preserves linear and differential properties of functions for the case of abelian groups as well, see Remark 1 of [2], and [7], [10].…”
Section: Introductionmentioning
confidence: 99%