Sciweavers

24 search results - page 2 / 5
» Duality of Boolean functions and its cryptographic significa...
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
14 years 4 days ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
TIT
2008
78views more  TIT 2008»
13 years 5 months ago
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
The nonlinearity profile of a Boolean function (i.e. the sequence of its minimum Hamming distances nlr(f) to all functions of degrees at most r, for r 1) is a cryptographic crite...
Claude Carlet
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
VLSID
1996
IEEE
135views VLSI» more  VLSID 1996»
13 years 10 months ago
Cubical CAMP for minimization of Boolean functions
The paper presents QCAMP, a cube-based algorithm for minimization of single Boolean functions. The algorithm does not generate all the prime cubes, nor does it require the Off-set...
Nripendra N. Biswas, C. Srikanth, James Jacob
DDECS
2008
IEEE
185views Hardware» more  DDECS 2008»
14 years 7 days ago
Fast Boolean Minimizer for Completely Specified Functions
: We propose a simple and fast two-level minimization algorithm for completely specified functions in this paper. The algorithm is based on processing ternary trees. A ternary tree...
Petr Fiser, Pemysl Rucký, Irena Vanov&aacut...