Academia.eduAcademia.edu

Bent functions

description14 papers
group1 follower
lightbulbAbout this topic
Bent functions are a class of Boolean functions characterized by their maximum distance from all affine functions, achieving the highest possible nonlinearity. They are significant in cryptography and coding theory for their resistance to linear approximations, making them valuable for designing secure cryptographic systems.
lightbulbAbout this topic
Bent functions are a class of Boolean functions characterized by their maximum distance from all affine functions, achieving the highest possible nonlinearity. They are significant in cryptography and coding theory for their resistance to linear approximations, making them valuable for designing secure cryptographic systems.

Key research themes

1. How can explicit constructions and algebraic characterizations of bent functions over finite fields of odd or even characteristic advance the theory and applications of bent functions?

This research theme focuses on developing new explicit families of bent functions, specifically monomial and quadratic bent functions, and their algebraic properties over finite fields, including both even and odd characteristic cases. It aims to deepen the theoretical understanding of bent functions’ structure, regularity, and algebraic degree, which are crucial for their applications in cryptography and coding theory.

Key finding: The paper introduces new classes of p-ary bent functions of the monomial and quadratic forms over finite fields with odd prime characteristic. It rigorously proves that these functions are weakly regular bent, extending the... Read more
Key finding: This work proves that any univariate Niho bent function can be expressed as a sum of functions of Leander-Kholosha type, with coefficients derived from o-polynomials. Explicit formulae for the algebraic degree are provided... Read more
Key finding: The authors develop a construction method for ternary bent functions based on the manipulation of their value vectors using FFT-like permutation matrices. They classify ternary bent functions into six classes determined by... Read more
Key finding: Focusing on generalized q-ary bent and negabent functions, this paper establishes necessary and sufficient conditions for bentness and negabentness with respect to the generalized nega-Hadamard transform. The authors analyze... Read more
Key finding: This paper generalizes existing secondary construction methods by allowing vectorial bent functions F(x) = G(x) + H(x) where both G and H are vectorial Boolean functions. It expands the construction framework beyond G plus a... Read more

2. What roles do evolutionary and heuristic algorithms play in generating bent and vectorial Boolean functions, especially when conventional algebraic constructions are limiting?

This theme investigates the application of evolutionary algorithms (EAs) and heuristic methods for searching and optimizing bent functions and vectorial Boolean functions with cryptographically desirable properties. Given the complexity and exponential search spaces in constructing such functions, heuristic approaches are evaluated for their effectiveness, limitations, and potential in discovering novel functions not easily accessible through algebraic methods.

Key finding: This study explores evolutionary algorithms for evolving vectorial Boolean functions where the output dimension is smaller than input dimension, including bent (n, m) functions relevant to cryptography and coding. Results... Read more

3. How can spectral domain techniques and specially structured support sets facilitate the construction and classification of plateaued and 5-value spectrum Boolean functions?

This research direction centers on spectral methods for constructing Boolean functions whose Walsh-Hadamard spectra take values in restricted sets such as {0, ±2^r} (plateaued functions) or {0, ±2^λ1, ±2^λ2} (5-value spectrum functions). By characterizing dual functions and their corresponding Walsh supports, the approach enables efficient synthesis of functions meeting cryptographic criteria, and offers strategies for generating affine inequivalent functions with prescribed spectral properties.

Key finding: The authors provide a detailed characterization of 5-value Walsh-Hadamard spectrum Boolean functions whose support is a union of two affine subspaces, introducing totally disjoint spectra dual functions to regulate sign... Read more

All papers in Bent functions

The associated codes of almost perfect nonlinear (APN) functions have been widely studied. In this paper, we consider more generally the codes associated with functions that have differential uniformity at least 4. We emphasize, for such... more
Crooked permutations were introduced twenty years ago to construct interesting objects in graph theory. These functions, over F 2 n with odd n, are such that their derivatives have as image set a complement of a hyperplane. The field of... more
The first and the third authors recently introduced a spectral construction of plateaued and of 5-value spectrum functions. In particular, the design of the latter class requires a specification of integers {W (u) : }, so that the... more
In this article, we characterize generalized negabent functions on Z n 2 with values in Z 8 and Z 16. Furthermore, we propose several constructions of generalized negabent functions.
From the last few years, generalized bent functions gain a lot of attention in research as they have many applications in various fields such as combinatorial design, sequence design theory, cryptography, CDMA communication, etc. A deep... more
In this paper we construct two classes of translation hyperovals in any Hall plane of even order q* P 16. Two hyperovals constructed in the same Hall plane are equivalent under the action of the automorphism group of that Hall plane iff... more
Given an inversive plane we define a graph, the vertices of which are the blocks of the inversive plane, where two blocks are adjacent if they meet in one point. We use this graph to provide the following characterization of the classical... more
Crooked permutations were introduced twenty years ago to construct interesting objects in graph theory. These functions, over F 2 n with odd n, are such that their derivatives have as image set a complement of a hyperplane. The field of... more
In this paper, we exploit the concept of a particular n × n symmetric matrix of the form F = [F k ] n×n , where k = max(i, j)+1 and F K is the kth Fibonacci number. We investigate some special properties of this new matrix. In addition,... more
Bent functions, having the highest possible nonlinearity, are among the best candidates for construction of S S S-boxes. One problem with bent functions is the fact that they are hard to find among randomly generated set of Boolean... more
Starting with a basis of F 2k 2 , we define some sets in F 2k 2 that are the supports of bent functions of 2k variables. We also establish some results in order to count the number of bent functions we can construct, and we provide a... more
The associated codes of almost perfect nonlinear (APN) functions have been widely studied. In this paper, we consider more generally the codes associated with functions that have differential uniformity at least 4. We emphasize, for such... more
We present a method to iteratively construct new bent functions of n+2 variables from a bent function of n variables and its cyclic shift permutations using minterms of n variables and minterms of 2 variables. In addition, we provide the... more
In 2017, Tang et al. have introduced a generic construction for bent functions of the form f (x) = g(x) + h(x), where g is a bent function satisfying some conditions and h is a Boolean function. Recently, Zheng et al. [22] generalized... more
Whereas the design and properties of bent and plateaued functions have been frequently addressed during the past few decades, there are only a few design methods of so-called 5-valued spectra Boolean functions whose Walsh spectra takes... more
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. A technique for... more
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. A technique for... more
WHAT IS BOOLEAN FUNCTION?  Let B={0,1} and В n = {0, 1} n. Every function f : В n → В is called Boolean function of n variables. В n = { f |f : В n → В }, |В n | = 2 2 n  Let f 1 , f 2 , …, f m ∈ В n. Mapping F : В n → В m defined by... more
In this paper, we generalize some existing results on Boolean functions to the q-ary functions defined over Zq, where q≥ 2 is an integer, and obtain some new characterization of q-ary functions based on spectral analysis. We provide a... more
From the last few years, generalized bent functions gain a lot of attention in research as they have many applications in various fields such as combinatorial design, sequence design theory, cryptography, CDMA communication, etc. A deep... more
In several combinatorial optimization problems arising in cryptography and design theory, the admissible solutions must often satisfy a balancedness constraint, such as being represented by bitstrings with a fixed number of ones. For this... more
It is known that the Williamson construction for Hadamard matrices can be generalized to constructions using sums of tensor products. This paper describes a specic construction using real monomial representations of Cliord algebras, and... more
The quasi-Clifford algebras as described by Gastineau-Hills in 1980 and 1982, should be better known, and have only recently been rediscovered. These algebras and their representation theory provide effective tools to address the... more
The real monomial representations of Clifford algebras give rise to two sequences of bent functions. For each of these sequences, the corresponding Cayley graphs are strongly regular graphs, and the corresponding sequences of strongly... more
This paper examines a pair of bent functions on Z 2m 2 and their relationship to a necessary condition for the existence of an automorphism of an edge-coloured graph whose colours are defined by the properties of a canonical basis for the... more
In several combinatorial optimization problems arising in cryptography and design theory, the admissible solutions must often satisfy a balancedness constraint, such as being represented by bitstrings with a fixed number of ones. For this... more
In this thesis hyperovals and ovals are considered in the projective plane PG(2,q), q = 2m even. Traditionally these objects are studied algebraically via o-polynomials. In our work, a different approach is used by means of g-functions.... more
WHAT IS BOOLEAN FUNCTION?  Let B={0,1} and В n = {0, 1} n. Every function f : В n → В is called Boolean function of n variables. В n = { f |f : В n → В }, |В n | = 2 2 n  Let f 1 , f 2 , …, f m ∈ В n. Mapping F : В n → В m defined by... more
Substitution boxes are the main nonlinear component of block ciphers. The security of these ciphers against linear, differential, or side-channel attacks is dependent on the design of such component and their intrinsic properties. There... more
The property of nonlinearity has high importance for the design of strong substitution boxes. Therefore, the development of new techniques to produce substitution boxes with high values of nonlinearity is essential. Many research papers... more
Substitution boxes are the main nonlinear component of block ciphers. The security of these ciphers against linear, differential, or side-channel attacks is dependent on the design of such component and their intrinsic properties. There... more
Substitution boxes are the main nonlinear component of block ciphers. The security of these ciphers against linear, differential, or side-channel attacks is dependent on the design of such component and their intrinsic properties. There... more
Boolean functions have a prominent role in many real-world applications, which makes them a very active research domain. Throughout the years, various heuristic techniques proved to be an attractive choice for the construction of Boolean... more
Boolean functions as well as their generalizations, vectorial Boolean functions are extremely active areas of research. Their applications can be found in domains such as error correcting codes, communication, and cryptography.... more
The real monomial representations of Clifford algebras give rise to two sequences of bent functions. For each of these sequences, the corresponding Cayley graphs are strongly regular graphs, and the corresponding sequences of strongly... more
Download research papers for free!