Recent Results on Constructing Boolean Functions with (Potentially) Optimal Algebraic Immunity Based on Decompositions of Finite Fields

被引:4
|
作者
Liu Zhuojun [1 ]
Wu Baofeng [2 ]
机构
[1] Chinese Acad Sci, Acad Math & Syst Sci, Key Lab Math Mechanizat, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
Additive decomposition; algebraic immunity; Boolean function; multiplicative decomposition; Tu-Deng conjecture;
D O I
10.1007/s11424-019-8346-2
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Boolean functions with optimal algebraic immunity (OAI functions) are important cryptographic primitives in the design of stream ciphers. During the past decade, a lot of work has been done on constructing such functions, among which mathematics, especially finite fields, play an important role. Notably, the approach based on decompositions of additive or multiplicative groups of finite fields turns out to be a very successful one in constructing OAI functions, where some original ideas are contributed by Tu and Deng (2012), Tang, et al. (2017), and Lou, et al. (2015). Motivated by their pioneering work, the authors and their collaborators have done a series of work, obtaining some more general constructions of OAI functions based on decompositions of finite fields. In this survey article, the authors review our work in this field in the past few years, illustrating the ideas for the step-by-step generalizations of previous constructions and recalling several new observations on a combinatorial conjecture on binary strings known as the Tu-Deng conjecture. In fact, the authors have obtained some variants or more general forms of Tu-Deng conjecture, and the optimal algebraic immunity of certain classes of functions we constructed is based on these conjectures.
引用
收藏
页码:356 / 374
页数:19
相关论文
共 50 条
  • [41] On the construction of multi-output Boolean functions with optimal algebraic immunity
    Jie Zhang
    ShouChao Song
    Jiao Du
    QiaoYan Wen
    Science China Information Sciences, 2012, 55 : 1617 - 1623
  • [42] On the construction of multi-output Boolean functions with optimal algebraic immunity
    ZHANG Jie 1
    2 State Key Laboratory of Networking and Switching Technology
    3 Department of Mathematics
    Science China(Information Sciences), 2012, 55 (07) : 1617 - 1623
  • [43] A new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity
    Zhang, Hui
    Su, Sihong
    DISCRETE APPLIED MATHEMATICS, 2019, 262 : 13 - 28
  • [44] On the construction of multi-output Boolean functions with optimal algebraic immunity
    Zhang Jie
    Song ShouChao
    Du Jiao
    Wen QiaoYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1617 - 1623
  • [45] On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
    Rizomiliotis, Panagiotis
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 57 (03) : 283 - 292
  • [46] Constructing Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on an Odd Number of Variables
    Peng, Jie
    Kan, Haibin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (06) : 1056 - 1064
  • [47] Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
    Tang, Deng
    Carlet, Claude
    Tang, Xiaohu
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 653 - 664
  • [48] On Algebraic Immunity of Trace Inverse Functions on Finite Fields of Characteristic Two
    FENG Xiutao
    GONG Guang
    JournalofSystemsScience&Complexity, 2016, 29 (01) : 272 - 288
  • [49] On algebraic immunity of trace inverse functions on finite fields of characteristic two
    Feng Xiutao
    Gong Guang
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2016, 29 (01) : 272 - 288
  • [50] Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
    Li, Jiao
    Carlet, Claude
    Zeng, Xiangyong
    Li, Chunlei
    Hu, Lei
    Shan, Jinyong
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 76 (02) : 279 - 305