Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Affinity of permutations of \(\mathbb F_{2}^{n}\) - MaRDI portal

Affinity of permutations of \(\mathbb F_{2}^{n}\)

From MaRDI portal
Publication:2489926

DOI10.1016/j.dam.2005.03.022zbMath1089.94020OpenAlexW2023638163MaRDI QIDQ2489926

Xiang-Dong Hou

Publication date: 28 April 2006

Published in: Discrete Applied Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.dam.2005.03.022




Related Items (24)

On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutationsA note on APN permutations in even dimensionIf a generalised butterfly is APN then it operates on 6 bitsSparse permutations with low differential uniformityA further study on bridge structures and constructing bijective S-boxes for low-latency maskingDecomposition of Dillon's APN permutation with efficient hardware implementationOn EA-equivalence of certain permutations to power mappingsAlmost perfect and planar functionsOn Cryptographically Significant Mappings over GF(2 n )Unnamed ItemSome results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)Permutation polynomials and their differential properties over residue class ringsDifferentially low uniform permutations from known 4-uniform functionsWave-shaped round functions and primitive groupsA triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functionsPermutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\)ON CONSTRUCTING APN PERMUTATIONS USING SUBFUNCTIONSPrimitivity of the group of a cipher involving the action of the key-scheduleAlmost perfect nonlinear families which are not equivalent to permutationsOn an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problemOn differential uniformity and nonlinearity of functionsPerfect nonlinear functions and cryptographyConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresOn the differential equivalence of APN functions



Cites Work


This page was built for publication: Affinity of permutations of \(\mathbb F_{2}^{n}\)