Plateaued functions

Yuliang Zhen, Xian Mo Zhang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

86 Citations (Scopus)

Abstract

The focus of this paper is on nonlinear characteristics of cryptographic Boolean functions. First, we introduce the notion of plateaued functions that have many cryptographically desirable properties. Second, we establish a sequence of strengthened inequalities on some of the most important nonlinearity criteria, including nonlinearity, propagation and correlation immunity, and prove that critical cases of the inequalities coincide with characterizations of plateaued functions. We then proceed to prove that plateaued functions include as a proper subset all partially-bent functions that were introduced earlier by Carlet. This settles an open question that arises from previously known results on partially-bent functions. In addition, we construct plateaued, but not partially-bent, functions that have many properties useful in cryptography.

Original languageEnglish
Title of host publicationInformation and Communication Security - 2nd International Conference, ICICS 1999, Proceedings
PublisherSpringer, Springer Nature
Pages284-300
Number of pages17
Volume1726
ISBN (Print)3540666826, 9783540666820
DOIs
Publication statusPublished - 1999
Event2nd International Conference on Information and Communication Security, ICICS - 1999 - Sydney, Australia
Duration: 9 Nov 199911 Nov 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1726
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Conference on Information and Communication Security, ICICS - 1999
CountryAustralia
CitySydney
Period9/11/9911/11/99

Keywords

  • Bent functions
  • Cryptography
  • Nonlinear characteristics
  • Partially-bent functions
  • Plateaued functions

Fingerprint Dive into the research topics of 'Plateaued functions'. Together they form a unique fingerprint.

Cite this