Analysis of autocorrelation function of Boolean functions in Haar domain
Design of strong symmetric cipher systems requires that the underlying cryptographic Boolean function meet specific security requirements. Some of the required security criteria can be measured with the help of the autocorrelation function as a tool, while other criteria can be measured using the W...
| Main Authors: | Rafiq, Hashum M., Siddiqi, Mohammad Umar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/55718/ http://irep.iium.edu.my/55718/1/55718_Analysis%20of%20Autocorrelation%20Function.pdf http://irep.iium.edu.my/55718/7/55718_Analysis%20of%20autocorrelation%20function_Scopus.pdf |
Similar Items
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
Impulsive noise mitigation in Haar DWT based OFDM systems
by: Ali, Moaaz Elhag, et al.
Published: (2013)
by: Ali, Moaaz Elhag, et al.
Published: (2013)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Enhancing the reliability of spectral correlation function with distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2013)
by: Alfaqawi, Mohammed, et al.
Published: (2013)
Enhancing the reliability of spectral correlation function with distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2013)
by: Alfaqawi, Mohammed, et al.
Published: (2013)
Development of the service recovery time and signaling cost function
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Generalized discrete fourier transform based minimization
of PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Intra domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Inter domain movement of M-HMIPV6/CXTP
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Randomness analysis of pseudo random noise generator using 24-bits LFSR
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Lightweight handover control function (L-HCF) for Mobile Internet Protocol version Six (IPv6)
by: Mokhtar, Rania A., et al.
Published: (2014)
by: Mokhtar, Rania A., et al.
Published: (2014)
Similar Items
-
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012) -
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016) -
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015) -
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009) -
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)