2005
DOI: 10.1109/tit.2004.842779
|View full text |Cite
|
Sign up to set email alerts
|

On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions

Abstract: Let Rt,n denote the set of t-resilient Boolean functions of n variables, and letρ(t, r, n) be the maximum distance between t-resilient functions and r-th order Reed-Muller code RM (r, n). We prove (analytically) thatρ(t, 2, 6) = 16 for t = 0, 1, 2,ρ(3, 2, 7) = 32. Using a result from coding theory on the covering radius of (n−3)-rd order Reed-Muller codes, we establish exact values of the covering radius of RM (n − 3, n) in the set of 1-resilient Boolean functions of n variables, when n/2 = 1 mod 2. We also pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…For i = 1 the result is true by expression (2). Assume that the result is true for i − 1 < k, we will prove that it is also true for i.…”
Section: Lemmamentioning
confidence: 76%
See 1 more Smart Citation
“…For i = 1 the result is true by expression (2). Assume that the result is true for i − 1 < k, we will prove that it is also true for i.…”
Section: Lemmamentioning
confidence: 76%
“…Boolean functions are widely used in different types of cryptographic applications such as block ciphers, stream ciphers and hash functions [3,5,21], in coding theory [2,15], among others. A cryptographic function should have high nonlinearity in order to prevent attacks based on linear approximation [1,13,19,22].…”
Section: Introductionmentioning
confidence: 99%
“…Boolean functions are components of S-boxes used in different types of cryptographic applications such as block ciphers, stream ciphers and hash functions [3,5,22] as well as in coding theory [1,17], among others.…”
Section: Introductionmentioning
confidence: 99%
“…Boolean functions are widely used in different types of cryptographic applications, such as block ciphers, stream ciphers, and hash functions [1][2][3], and in coding theory [4,5], among others. For example, the implementation of an S-box needs nonlinear Boolean functions to resist attacks such as the linear and differential cryptanalysis [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%