enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Boolean function - Wikipedia

    en.wikipedia.org/wiki/Boolean_function

    A Boolean function with multiple outputs, : {,} {,} with > is a vectorial or vector-valued Boolean function (an S-box in symmetric cryptography). [ 6 ] There are 2 2 k {\displaystyle 2^{2^{k}}} different Boolean functions with k {\displaystyle k} arguments; equal to the number of different truth tables with 2 k {\displaystyle 2^{k}} entries.

  3. Balanced Boolean function - Wikipedia

    en.wikipedia.org/wiki/Balanced_Boolean_function

    Balanced Boolean functions are used in cryptography, where being balanced is one of "the most important criteria for cryptographically strong Boolean functions". [3] If a function is not balanced, it will have a statistical bias, making it subject to cryptanalysis such as the correlation attack.

  4. Correlation immunity - Wikipedia

    en.wikipedia.org/wiki/Correlation_immunity

    Siegenthaler showed that the correlation immunity m of a Boolean function of algebraic degree d of n variables satisfies m + d ≤ n; for a given set of input variables, this means that a high algebraic degree will restrict the maximum possible correlation immunity. Furthermore, if the function is balanced then m + d ≤ n − 1. [1]

  5. Bent function - Wikipedia

    en.wikipedia.org/wiki/Bent_function

    The following formula shows that a 4-ary function is bent when its nonlinearity is 6: = = In the mathematical field of combinatorics, a bent function is a Boolean function that is maximally non-linear; it is as different as possible from the set of all linear and affine functions when measured by Hamming distance between truth tables.

  6. Analysis of Boolean functions - Wikipedia

    en.wikipedia.org/wiki/Analysis_of_Boolean_functions

    The functions studied are often, but not always, Boolean-valued, making them Boolean functions. The area has found many applications in combinatorics , social choice theory , random graphs , and theoretical computer science, especially in hardness of approximation , property testing , and PAC learning .

  7. Garbled circuit - Wikipedia

    en.wikipedia.org/wiki/Garbled_circuit

    Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. In the garbled circuit protocol, the function has to be described as a Boolean circuit.

  8. Partitioning cryptanalysis - Wikipedia

    en.wikipedia.org/wiki/Partitioning_cryptanalysis

    In cryptography, partitioning cryptanalysis is a form of cryptanalysis for block ciphers. Developed by Carlo Harpes in 1995, the attack is a generalization of linear cryptanalysis. Harpes originally replaced the bit sums (affine transformations) of linear cryptanalysis with more general balanced Boolean functions. He demonstrated a toy cipher ...

  9. S-box - Wikipedia

    en.wikipedia.org/wiki/S-box

    In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext, thus ensuring Shannon's property of confusion. Mathematically, an S-box is a nonlinear [1] vectorial Boolean function ...