Journal on Communications ›› 2024, Vol. 45 ›› Issue (1): 194-200.doi: 10.11959/j.issn.1000-436x.2024007
• Correspondences • Previous Articles
Jiao DU1,2, Lin LI1,2, Ziwei ZHAO1,2, Yueyue LI1,2, Tianyin WANG1,3
Revised:
2023-11-28
Online:
2024-01-01
Published:
2024-01-01
Supported by:
CLC Number:
Jiao DU, Lin LI, Ziwei ZHAO, Yueyue LI, Tianyin WANG. Concrete constructions of 2-resilient rotation symmetric Boolean functions with 7 variables[J]. Journal on Communications, 2024, 45(1): 194-200.
"
序号 | T1 | T2 | 序号 | T1 | T2 | 序号 | T1 | T2 |
1 | (6)(16)(17)(18) | (11)(14)(15)(198) | 46 | (7)(8)(9)(16) | (5)(12)(14)(15) | 91 | (7)(8)(9)(17) | (4)(12)(13)(14) |
2 | (7)(6)17)(18) | (12)(14)(15)(19) | 47 | (7)(8)(10)(16) | (3)(12)(13)(14) | 92 | (7)(8)(9)(17) | (4)(12)(13)(15) |
3 | (8)(16)(17)(18) | (13)(14)(15)19) | 48 | (7)(8)(10)(16) | (3)(12)(13)(15) | 93 | (7)(8)(10)(17) | (4)(12)(13)(14) |
4 | (9)(16)(17)(18) | (11)(12)(13)(19) | 49 | (7)(8)(10)(16) | (4)(11)(12)(13) | 94 | (7)(8)(10)(17) | (4)(12)(13)(15) |
5 | (10)(16)(17)(18) | (11)(12)(13)(19) | 50 | (7)(8)(10)(16) | (5)(12)(14)(15) | 95 | (7)(9)(10)(17) | (4)(12)(14)(15) |
6 | (2)(6)(6)(I7) | (3)(4)(11)(9) | 51 | (7)(9)(10)(16) | (3)(12)(14)(15) | 96 | (8)(9)(10)(17) | (4)(13)(14)(15) |
7 | (2)(7)(16)(17) | (3)(4)(12)(19) | 52 | (7)(9)(10)(16) | (4)(11)(12)(14) | 97 | (8)(9)(10)(17) | (5)(12)(13)(14) |
8 | (2)(8)(16)(17) | (3)(4)(13)(19) | 53 | (7)(9)(10)(16) | (4)(11)(12)(15) | 98 | (8)(9)(10)(17) | (5)(12)(13)(15) |
9 | (2)(8)(16)(17) | (4)(5)(14)(19) | 54 | (8)(9)(10)(16) | (3)(13)(14)(15) | 99 | (6)(7)(8)(18) | (3)(13)(14)(15) |
10 | (2)(8)(16)(17) | (4)(5)(15)(19) | 55 | (8)(9)(10)(16) | (4)(11)(13)(14) | 100 | (6)(7)(8)(18) | (4)(11)(13)(14) |
11 | (2)(9)(16)(17) | (3)(4)(14)(19) | 56 | (8)(9)(10)(16) | (4)(11)(13)(15) | 101 | (6)(7)(8)(18) | (4)(11)(13)(15) |
12 | (2)(9)(16)(17) | (3)(4)(15)19) | 57 | (8)(9)(10)(16) | (5)(11)(12)(13) | 102 | (6)(7)(8)(18) | (5)(11)(12)(13) |
13 | (2)(9)(16)(17) | (3)(5)(12)(19) | 58 | (2)(6)(17)(18) | (3)(5)(14)(19) | 103 | (6)(7)(9)(18) | (3)(11)(12)(13) |
14 | (2)(10)(16)(17) | (3)(4)(14)(19) | 59 | (2)(6)(17)(18) | (3)(5)(15)(19) | 104 | (6)(7)(9)(18) | (4)(11)(14)(15) |
15 | (2)(10)(16)(17) | (3)(4)(15)19) | 60 | (2)(6)(17)(18) | (4)(5)(11)(19) | 105 | (6)(7)(9)(18) | (5)(11)(12)(14) |
16 | (2)(10)(16)(17) | (3)(5)(12)(19) | 61 | (2)(7)(17)(18) | (4)(5)(12)(19) | 106 | (6)(7)(9)(18) | (5)(11)(12)(15) |
17 | (2)(6)(16)(18) | (3)(5)(11)(19) | 62 | (2)(8)(17)(18) | (4)(5)(13)(19) | 107 | (6)(7)(10)(18) | (3)(11)(12)(13) |
18 | (2)(7)(16)(18) | (3)(4)(14)19) | 63 | (2)(9)(17)(18) | (3)(4)(13)(19) | 108 | (6)(7)(10)(18) | (4)(11)(14)(15) |
19 | (2)(7)(16)(18) | (3)(4)(15)(19) | 64 | (2)(9)(17)(18) | (4)(5)(14)(19) | 109 | (6)(7)(10)(18) | (5)(11)(12)(14) |
20 | (2)(7)(16)(18) | (3)(5)(12)(19) | 65 | (2)(9)(17)(18) | (4)(5)(15)(19) | 110 | (6)(7)(10)(18) | (5)(11)(12)(15) |
21 | (2)(8)(16)(18) | (3)(5)(13)(19) | 66 | (2)10)(17)(18) | (3)(4)(13)(19) | 111 | (6)(8)(9)(18) | (5)(11)(13)(14) |
22 | (2)(9)(16)(18) | (3)(5)(14)(19) | 67 | (2)(10)(17)(18) | (4)(5)(14)(19) | 112 | (6)(8)(9)(18) | (5)(11)(13)(15) |
23 | (2)(9)(16)(18) | (3)(5)(15)(19) | 68 | (2)(10)(17)(18) | (4)(5)(15)(19) | 113 | (6)(8)(10)(18) | (5)(11)(13)(14) |
24 | (2)(9)(16)(18) | (4)(5)(11)(19) | 69 | (6)(7)(8)(17) | (3)(12)(13)(14) | 114 | (6)(8)(10)(18) | (5)(11)(13)(15) |
25 | (2)(10)(16)(18) | (3)(5)(14)(19) | 70 | (6)(7)(8)(17) | (3)(12)(13)(15) | 115 | (6)(8)(10)(18) | (3)(11)(13)(14) |
26 | (2)(10)(16)(18) | (3)(5)(15)(19) | 71 | (6)(7)(8)(17) | (4)(11)(12)(13) | 116 | (6)(9)(10)(18) | (3)(11)(13)(15) |
27 | (2)(10)(16)(18) | (4)(5)(11)(19) | 72 | (6)(7)(8)(17) | (5)(12)(14)(15) | 117 | (6)(9)(10)(18) | (5)(11)(14)(15) |
28 | (6)(7)(8)(16) | (3)(11)(12)(13) | 73 | (6)(7)(9)(17) | (3)(12)(14)(15) | 118 | (7)(8)(9)(18) | (4)(13)(14)(15) |
29 | (6)(7)(8)(16) | (4)(11)(14)(15) | 74 | (6)(7)(9)(17) | (4)(11)(12)(14) | 119 | (7)(8)(9)(18) | (5)(12)(13)(14) |
30 | (6)(7)(8)(6) | (5)(11)(12)(14) | 75 | (6)(7)(9)(17) | (4)(11)(12)(15) | 120 | (7)(8)(9)(18) | (5)(12)(13)(15) |
31 | (6)(7)(8)(16) | (5)(11)(12)(15) | 76 | (6)(7)(10)(17) | (3)(12)(14)(15) | 121 | (7)(8)(10)(18) | (4)(13)(14)(15) |
32 | (6)(7)(9)(16) | (3)(11)(12)(14) | 77 | (6)(7)(10)(17) | (4)(11)(12)(14) | 122 | (7)(8)(10)(18) | (5)(12)(13)(14) |
33 | (6)(7)(9)(6) | (3)(11)(12)(15) | 78 | (6)(7)(10)(17) | (4)(11)(12)(15) | 123 | (7)(8)(10)(18) | (5)(12)(13)(15) |
34 | (6)(7)(10)(16) | (3)(11)(12)(14) | 79 | (6)(8)(9)(17) | (3)(13)(14)(15) | 124 | (7)(8)(10)(18) | (3)(12)(13)(14) |
35 | (6)(7)(10)(16) | (3)(11)(12)(15) | 80 | (6)(8)(9)(17) | (4)(11)(13)(14) | 125 | (7)(9)(10)(18) | (3)(12)(13)(15) |
36 | (6)(8)(9)(16) | (3)(11)(13)(14) | 81 | (6)(8)(9)(17) | (4)(11)(13)(15) | 126 | (7)(9)(10)(18) | (4)(11)(12)(13) |
37 | (6)(8)(9)(16) | (3)(11)(13)(15) | 82 | (6)(8)(9)(17) | (5)(11)(12)(13) | 127 | (7)(9)(10)(18) | (5)(12)(14)(15) |
38 | (6)(8)(9)(16) | (5)(11)(14)(15) | 83 | (6)(8)(10)(17) | (3)(13)(14)(15) | 128 | (8)(9)(10)(18) | (5)(13)(14)(15) |
39 | (6)(8)(10)(6) | (3)(11)(13)(14) | 84 | (6)(8)(10)(17) | (4)(11)(13)(14) | 129 | (2)(6)(7)(8) | (3)(4)(5)(14) |
40 | (6)(8)(10)(16) | (3)(11)(13)(15) | 85 | (6)(8)(10)(17) | (4)(11)(13)(15) | 130 | (2)(6)(7)(8) | (3)(4)(5)(15) |
41 | (6)(8)10)(16) | (5)(11)(14)(15) | 86 | (6)(8)(10)(17) | (5)(11)(12)(13) | 131 | (2)(6)(9)(10) | (3)(4)(5)(11) |
42 | (6)(9)(10)(6) | (3)(11)(14)(15) | 87 | (6)(9)(10)(17) | (3)(11)(12)(13) | 132 | (2)(7)(9)(10) | (3)(4)(5)(12) |
43 | (7)(8)(9)(16) | (3)(12)(13)(l4) | 88 | (6)(8)(10)(17) | (4)(11)(14)(15) | 133 | (2)(8)(9)(10) | (3)(4)(5)(13) |
44 | (7)(8)(9)(16) | (3)(12)(13)(15) | 89 | (6)(9)(10)(17) | (5)(11)(12)(14) | |||
45 | (7)(8)(9)(16) | (4)(11)(12)(13) | 90 | (6)(9)(10)(17) | (5)(11)(12)(15) |
[1] | 李超, 屈龙江, 周悦 . 密码函数的安全性指标分析[M]. 北京: 科学出版社, 2011. |
LI C , QU L J , ZHOU Y . Security index analysis of cryptographic functions[M]. Beijing: Science Press, 2011. | |
[2] | ZHANG W Y . Construction of balanced rotation symmetric Boolean functions with optimal algebraic immunity[J]. Wuhan University Journal of Natural Sciences, 2014,19(4): 301-306. |
[3] | FU S , LI C , MATSUURA K ,et al. Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity[J]. Applied Mathematics Letters, 2011,24(12): 2093-2096. |
[4] | SUN L , SHI Z X . Balanced rotation symmetric Boolean functions with good autocorrelation properties[J]. IEEE Access, 2021,9: 67850-67858. |
[5] | FU S J , LI C , QU L J . On the number of rotation symmetric Boolean functions[J]. Science China Information Sciences, 2010,53(3): 537-545. |
[6] | STANICA P , MAITRA S , CLARK J A . Results on rotation symmetric bent and correlation immune Boolean functions[C]// International Workshop on Fast Software Encryption. Berlin:Springer, 2004: 161-177. |
[7] | STANICA P , MAITRA S . Rotation symmetric Boolean functions—count and cryptographic properties[J]. Discrete Applied Mathematics, 2008,156(10): 1567-1580. |
[8] | PIEPRZYK J , QU C X . Fast hashing and rotation-symmetric functions[J]. Journal of Universal Computer Science, 1999,5(1): 20-31. |
[9] | KAVUT S , MAITRA S , SARKAR S ,et al. Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity>240[C]// International Conference on Cryptology. Berlin:Springer, 2006: 266-279. |
[10] | KAVUT S , MAITRA S , YUCEL M D . Search for Boolean functions with excellent profiles in the rotation symmetric class[J]. IEEE Transactions on Information Theory, 2007,53(5): 1743-1751. |
[11] | CARLET C , DALAI D K , GUPTA K C ,et al. Algebraic immunity for cryptographically significant Boolean functions:analysis and construction[J]. IEEE Transactions on Information Theory, 2006,52(7): 3105-3121. |
[12] | 高光普, 程庆丰, 王磊 . 三次旋转对称Bent函数的构造[J]. 密码学报, 2015,2(4): 372-380. |
GAO G P , CHENG Q F , WANG L . Construction of cubic rotation symmetric Bent functions[J]. Journal of Cryptologic Research, 2015,2(4): 372-380. | |
[13] | ZHANG W Y , HAN G Y . Construction of rotation symmetric Bent functions with maximum algebraic degree[J]. Science China Information Sciences, 2018,61(3): 1-3. |
[14] | 郑东, 严宏超, 赵庆兰 . 一类旋转对称Bent函数的构造[J]. 西安邮电大学学报, 2018,23(2): 17-21. |
ZHENG D , YAN H C , ZHAO Q L . Construction of a class of rotation symmetric Bent functions[J]. Journal of Xi’an University of Posts and Telecommunications, 2018,23(2): 17-21. | |
[15] | SU S H . Systematic methods of constructing Bent functions and 2-rotation symmetric Bent functions[J]. IEEE Transactions on Information Theory, 2020,66(5): 3277-3291. |
[16] | 李超, 薛朝红, 付绍静 . 代数免疫度最优的旋转对称布尔函数的构造[J]. 国防科技大学学报, 2012,34(2): 34-38. |
LI C , XUE C H , FU S J . Construction of rotation symmetric Boolean function with maximum algebraic immunity[J]. Journal of National University of Defense Technology, 2012,34(2): 34-38. | |
[17] | 张鹏, 付绍静, 屈龙江 ,等. 平衡旋转对称布尔函数的计数[J]. 应用科学学报, 2012,30(1): 45-51. |
ZHANG P , FU S J , QU L J ,et al. Enumeration of balanced rotation-symmetric Boolean functions[J]. Journal of Applied Sciences, 2012,30(1): 45-51. | |
[18] | 杜蛟, 温巧燕, 张劼 ,等. 2p 元 2-阶旋转对称弹性布尔函数的构造与计数[J]. 北京邮电大学学报, 2012,35(5): 36-40. |
DU J , WEN Q Y , ZHANG J ,et al. Construction and counting of resilient 2-rotation symmetric Boolean functions with 2p variables[J]. Journal of Beijing University of Posts and Telecommunications, 2012,35(5): 36-40. | |
[19] | PANG S Q , WANG X N , WANG J ,et al. Construction and count of 1-resilient rotation symmetric Boolean functions[J]. Information Sciences, 2018,450: 336-342. |
[20] | DU J , WEN Q Y , ZHANG J ,et al. Constructions of resilient rotation symmetric Boolean functions on given number of variables[J]. IET Information Security, 2014,8(5): 265-272. |
[21] | SUN L , FU F W , GUANG X . Two classes of 1-resilient prime-variable rotation symmetric Boolean functions[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2017,100(3): 902-907. |
[22] | SUN L , SHI Z X , FU F W . Several classes of even-variable 1-resilient rotation symmetric Boolean functions with high algebraic degree and nonlinearity[J]. Discrete Mathematics, 2022,345(3): 112752. |
[23] | 杜蛟, 刘春红, 庞善起 . 4t-1 元旋转对称 2-弹性函数的构造[J]. 通信学报, 2020,41(11): 169-175. |
DU J , LIU C H , PANG S Q . Constructions of rotation symmetric 2-resilient functions with 4t-1 number of variables[J]. Journal on Communications, 2020,41(11): 169-175. | |
[24] | DU J , CHEN Z Y , DONG L ,et al. A new characterization of 2-resilient rotation symmetric Boolean functions[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2023,106(9): 1268-1271. |
[25] | DU J , CHEN Z Y , FU S J ,et al. Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix[J]. Theoretical Computer Science, 2022,919: 80-91. |
[1] | Huawei HUANG. Security analysis of public-key cryptosystems based on matrix action problem against quantum attack [J]. Journal on Communications, 2023, 44(3): 220-226. |
[2] | Bowen ZHAO, Yao ZHU, Yang XIAO, Qingqi PEI, Xiaoguo LI, Ximeng LIU. Rational-security and fair two-party comparison protocol [J]. Journal on Communications, 2023, 44(12): 112-123. |
[3] | Ziyuan WANG, Ruizhong DU. Certificateless public key cryptography based provable data possession scheme in edge environment [J]. Journal on Communications, 2022, 43(7): 62-72. |
[4] | Zhu WANG, Siqi YANG, Fenghua LI, Kui GENG, Tingting PENG, Mengyao SHI. Efficient and provably-secure certificateless sequential aggregate signature scheme [J]. Journal on Communications, 2022, 43(5): 58-67. |
[5] | Bin LI, Xiaojie CHEN, Feng FENG, Qinglei ZHOU. FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber [J]. Journal on Communications, 2022, 43(2): 196-207. |
[6] | Youliang TIAN, Xiaoxia JIANG. Fair and rational delegation of computation in the universally composable framework [J]. Journal on Communications, 2021, 42(9): 106-119. |
[7] | Jiangtao DONG, Peiwen YAN, Ruizhong DU. Verifiable access control scheme based on unpaired CP-ABE in fog computing [J]. Journal on Communications, 2021, 42(8): 139-150. |
[8] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[9] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[10] | Huaqun WANG, Zhe LIU, Debiao HE, Jiguo LI. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud [J]. Journal on Communications, 2021, 42(7): 52-60. |
[11] | Fei TANG, Jiali BAO, Yonghong HUANG, Dong HUANG, Huili WANG. Multi-authority attribute-based identification scheme [J]. Journal on Communications, 2021, 42(3): 220-228. |
[12] | Bin WANG, Si CHEN, Jiadong CHEN, Xing WANG. DWB-AES: an implementation of dynamic white-box based on AES [J]. Journal on Communications, 2021, 42(2): 177-186. |
[13] | Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG. 5-pass zero-knowledge identity authentication scheme based on matrix completion problem [J]. Journal on Communications, 2021, 42(11): 79-86. |
[14] | Miaomiao TIAN, Jing CHEN, Hong ZHONG. Identity-based incremental signature scheme from lattices [J]. Journal on Communications, 2021, 42(1): 108-117. |
[15] | Jiao DU,Chunhong LIU,Shanqi PANG. Constructions of rotation symmetric 2-resilient functions with 4t-1 number of variables [J]. Journal on Communications, 2020, 41(11): 169-175. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|