enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Boolean function - Wikipedia

    en.wikipedia.org/wiki/Boolean_function

    A Boolean function with multiple outputs, : {,} {,} with > is a vectorial or vector-valued Boolean function (an S-box in symmetric cryptography). [ 6 ] There are 2 2 k {\displaystyle 2^{2^{k}}} different Boolean functions with k {\displaystyle k} arguments; equal to the number of different truth tables with 2 k {\displaystyle 2^{k}} entries.

  3. Bent function - Wikipedia

    en.wikipedia.org/wiki/Bent_function

    The cryptographic hash function HAVAL uses Boolean functions built from representatives of all four of the equivalence classes of bent functions on six variables. [15] The stream cipher Grain uses an NLFSR whose nonlinear feedback polynomial is, by design, the sum of a bent function and a linear function.

  4. Correlation immunity - Wikipedia

    en.wikipedia.org/wiki/Correlation_immunity

    Siegenthaler showed that the correlation immunity m of a Boolean function of algebraic degree d of n variables satisfies m + d ≤ n; for a given set of input variables, this means that a high algebraic degree will restrict the maximum possible correlation immunity. Furthermore, if the function is balanced then m + d ≤ n − 1. [1]

  5. Garbled circuit - Wikipedia

    en.wikipedia.org/wiki/Garbled_circuit

    Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. In the garbled circuit protocol, the function has to be described as a Boolean circuit.

  6. Balanced Boolean function - Wikipedia

    en.wikipedia.org/wiki/Balanced_Boolean_function

    Balanced Boolean functions are used in cryptography, where being balanced is one of "the most important criteria for cryptographically strong Boolean functions". [3] If a function is not balanced, it will have a statistical bias, making it subject to cryptanalysis such as the correlation attack.

  7. International Association for Cryptologic Research - Wikipedia

    en.wikipedia.org/wiki/International_Association...

    "For fundamental contributions to the design and analysis of Boolean functions for cryptographic applications, and for sustained educational leadership." Benny Pinkas: 2022 "For impactful research in the theory and practice of secure multi-party computation, sustained educational leadership, and service to the IACR." Yael Tauman Kalai: 2022

  8. Correlation attack - Wikipedia

    en.wikipedia.org/wiki/Correlation_attack

    Correlation attacks are a class of cryptographic known-plaintext attacks for breaking stream ciphers whose keystreams are generated by combining the output of several linear-feedback shift registers (LFSRs) using a Boolean function. Correlation attacks exploit a statistical weakness that arises from the specific Boolean function chosen for the ...

  9. S-box - Wikipedia

    en.wikipedia.org/wiki/S-box

    In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext, thus ensuring Shannon's property of confusion. Mathematically, an S-box is a nonlinear [1] vectorial Boolean function ...