×

Improved lower bound on the number of balanced symmetric functions over \(\text{GF}(p)\). (English) Zbl 1170.94012

Summary: The lower bound on the number of \(n\)-variable balanced symmetric functions over finite fields \(\text{GF}(p)\) presented by T. W. Cusick, Y. Li and P. Stănică [IEEE Trans. Inf. Theory 54, No. 3, 1304–1307 (2008)] is improved in this paper. An equivalent characterization is also presented for the general case.

MSC:

94A60 Cryptography
06E30 Boolean functions
11T71 Algebraic coding theory; cryptography (number-theoretic aspects)
Full Text: DOI

References:

[1] Braeken, A.; Preneel, B., On the algebraic immunity of symmetric Boolean functions, (INDOCRYPT 2005. INDOCRYPT 2005, LNCS, vol. 3797 (2005), Springer-Verlag: Springer-Verlag Berlin, Germay), 35-48 · Zbl 1153.94353
[2] Brüer, J. O., On pseudorandom sequences as crypto generators, (International Zurich Seminar on Digital Communications (1984), IEEE: IEEE New York), 157-161
[3] Brualdi, R. A., Introductory Combinatorics (2005), Prentice Hall/Pearson · Zbl 0734.05001
[4] Canteaut, A.; Videau, M., Symmetric Boolean functions, IEEE Trans. Inform. Theory, 51, 8, 2791-2811 (2005) · Zbl 1264.94094
[5] Cusick, T. W.; Li, Y.; Staˇnicaˇ, P., Balanced symmetric functions over \(GF (p)\), IEEE Trans. Inform. Theory, 54, 3, 1304-1307 (2008) · Zbl 1306.94041
[6] S.J. Fu, C. Li, L.J. Qu, et al., Enumeration of balanced symmetric functions over \(\mathit{GF} ( p )\). Available at: <http://www.eprint.iacr.org /2008/372.pdf>.; S.J. Fu, C. Li, L.J. Qu, et al., Enumeration of balanced symmetric functions over \(\mathit{GF} ( p )\). Available at: <http://www.eprint.iacr.org /2008/372.pdf>.
[7] Li, Y.; Cusick, T. W., Strict avalanche criterion over finite fields, J. Math. Cryptol., 1, 65-78 (2007) · Zbl 1145.11082
[8] Dalai, D. K.; Maitra, S.; Sarkar, S., Basic theory in construction of Boolean functions with maximum possible annihilator immunity, Des. Codes, Cryptogr., 40, 1, 41-58 (2006) · Zbl 1202.94179
[9] Hu, Y.; Xiao, G., Resilient functions over finite fields, IEEE Trans. Inform. Theory, 49, 2040-2046 (2003) · Zbl 1234.94048
[10] Li, Y.; Cusick, T. W., Linear structures of symmetric functions over finite fields, Inf. Process. Lett., 97, 124-127 (2006) · Zbl 1191.68281
[11] Maitra, S.; Sarkar, P., Maximum nonlinearity of symmetric Boolean functions on odd number of variables, IEEE Trans. Inform. Theory, 48, 9, 2626-2630 (2002) · Zbl 1062.94073
[12] Meier, S.; Pasalic, E.; Carlet, C., Alegbraic attacks and decomposition of Boolean functions, (Cachin, C.; Camenisch, J., Advances in Cryptology - Eurocrypt’04. Advances in Cryptology - Eurocrypt’04, LNCS, vol. 3027 (2004), Springer-Verlag: Springer-Verlag Berlin, Germay), 474-491 · Zbl 1122.94041
[13] Mitchell, C. J., Enumerating Boolean functions of cryptographic significance, J. Cryptol., 2, 3, 155-170 (1990) · Zbl 0705.94010
[14] Yang, Y. X.; Guo, B., Further enumerating Boolean functions of cryptographic significance, J. Cryptol., 8, 3, 115-122 (1995) · Zbl 0853.94028
[15] Yin, Y. F.; Li, X. S.; Hu, Y. P., Fast S-box security mechanism research based on the polymorphic cipher, Inform. Sci., 178, 6, 1603-1610 (2008) · Zbl 1131.94018
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.