Abstract
In this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by Göloğlu is affine equivalent to Gold functions.
This work was supported by the Norwegian Research Council.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
For given positive integers n and m, a function F from the finite field \({{\mathrm{\mathbb {F}}}}_{2^n}\) to the finite field \({{\mathrm{\mathbb {F}}}}_{2^m}\) is called a vectorial Boolean function or an (n, m)-function, and in the case when \(m=1\) it is simply called a Boolean function. When \(m=n\) an (n, n)-function has a unique representation as a univariate polynomial over \({\mathbb F}_{2^n}\) of the form
Boolean and vectorial Boolean functions have many applications in mathematics and information theory. In particular, they play an important role in cryptography.
In modern society, exchange and storage of information in an efficient, reliable and secure manner is of fundamental importance. Cryptographic primitives are used to protect information against eavesdropping, unauthorized changes and other misuse. In the case of symmetric cryptography ciphers are designed by appropriate composition of nonlinear Boolean functions. For example, the security of block ciphers depends on S-boxes which are (n, m)-functions. For most of cryptographic attacks on block ciphers there are certain properties of functions which measure the resistance of the S-box to these attacks. The differential attack introduced by Biham and Shamir is one of the most efficient cryptanalysis tools for block ciphers [2]. It is based on the study of how differences in an input can affect the resulting difference at the output. An (n, m)-function F is called differentially \(\delta \)-uniform if the equation \(F(x+a)-F(x)=b\) has at most \(\delta \) solutions for every nonzero element a of \({{\mathrm{\mathbb {F}}}}_{2^n}\) and every b in \({{\mathrm{\mathbb {F}}}}_{2^m}\). Functions with the smallest possible differential uniformity contribute an optimal resistance to the differential attack [34]. In this sense differentially \(2^{n-m}\)-uniform functions, called perfect nonlinear (PN), are optimal. However, PN functions exist only for n even and \(m\le n/2\) [35]. An important case are differentially 2-uniform functions with \(n=m\), called almost perfect nonlinear (APN), which have the smallest possible differential uniformity.
Another powerful attack on block ciphers is linear cryptanalysis by Matsui which is based on finding affine approximations to the action of a cipher [33]. The nonlinearity NL(F) of an (n, m)-function F is the minimum Hamming distance between all the component functions of F (that is, the functions \(\mathrm{{tr}}_1^m(v F(x))\) where
denotes the absolute trace function of \({{\mathrm{\mathbb {F}}}}_{2^m}\) and v is any nonzero element of \({{\mathrm{\mathbb {F}}}}_{2^m}\)) and all affine Boolean functions over \({{\mathrm{\mathbb {F}}}}_{2^n}\). The nonlinearity quantifies the level of resistance of the function to the linear attack: the higher is the nonlinearity NL(F) the better is the resistance of F [21]. The functions achieving the upper bound on nonlinearity are called bent functions. All bent functions are also PN and vice versa, that is, these functions have optimal resistance against both linear and differential attacks. As mentioned above, PN (or bent) functions do not exist when \(m=n\). In this case, when also n is odd, functions with the best possible nonlinearity are called almost bent (AB). When n is even the upper bound on nonlinearity is still to be determined. All AB functions are APN, but the converse is not true in general. However, for n odd all quadratic APN functions are also AB.
The nonlinearity NL(F) of an (n, m) function F can be expressed by means of the Walsh transform. The Walsh transform of F at \((\alpha ,\beta )\in {\mathbb F}_{2^n}\times {\mathbb F}_{2^m}\) is defined by
and the Walsh spectrum of F is the set
Then
The Walsh spectrum of AB functions consists of three values \(0,\pm 2^{\frac{n+1}{2}}\). The Walsh spectrum of a bent function is \(\{\pm 2^\frac{n}{2}\}\).
There are several equivalence relations of functions for which differential uniformity and nonlinearity are invariant. Due to these equivalence relations, having only one APN (respectively, AB) function, one can generate a huge class of APN (respectively, AB) functions.
Two functions F and \(F^\prime \) from \({\mathbb F}_{2^n}\) to \({\mathbb F}_{2^m}\) are called
-
affine equivalent (or linear equivalent) if \(F^\prime =A_1\circ F\circ A_2 \), where the mappings \( A_{1}\) and \(A_{2}\) are affine (resp. linear) permutations of \({\mathbb F}_{2^m}\) and \({\mathbb F}_{2^n}\), respectively;
-
extended affine equivalent (EA-equivalent) if \(F^\prime =A_1\circ F\circ A_2 +A\), where the mappings \(A:{\mathbb F}_{2^n}\rightarrow {\mathbb F}_{2^m},\ A_{1}:{\mathbb F}_{2^m}\rightarrow {\mathbb F}_{2^m},\ A_{2}:{\mathbb F}_{2^n}\rightarrow {\mathbb F}_{2^n}\) are affine, and where \(A_{1},A_{2}\) are permutations;
-
Carlet-Charpin-Zinoviev equivalent (CCZ-equivalent) if for some affine permutation \(\mathcal {L}\) of \({\mathbb F}_{2^n}\times {\mathbb F}_{2^m}\) the image of the graph of F is the graph of \(F'\), that is, \(\mathcal {L}(G_F)=G_{F'}\) where \(G_F=\{(x,F(x)) \ | \ x\in {\mathbb F}_{2^n}\}\) and \(G_{F'}=\{(x,F'(x)) \ | \ x\in {\mathbb F}_{2^n}\}\).
Although different, these equivalence relations are connected to each other. It is obvious that linear equivalence is a particular case of affine equivalence, and that affine equivalence is a particular case of EA-equivalence. As shown in [20], EA-equivalence is a particular case of CCZ-equivalence and every permutation is CCZ-equivalent to its inverse. The algebraic degree of a function (if it is not affine) is invariant under EA-equivalence but, in general, it is not preserved by CCZ-equivalence.
There are six known infinite families of power APN functions. They are presented in Table 1. There are also eleven known infinite families of quadratic APN polynomilas CCZ-inequivalent to power functions. They are given in Table 2. Families 3, 4 and 11 in Table 2 are proven to be a part of a general binary construction of APN functions [18].
Classification of APN functions is complete for \(n\le 5\) [9]: for these values of n the only APN functions, up to CCZ-equivalence, are power APN functions, and up to EA-equivalence, are power APN functions and those APN functions constructed in [16]. For \(n=6\) classification is complete for quadratic APN functions: 13 quadratic APN functions are found in [10] and, as proven in [26], up to CCZ-equivalence, these are the only quadratic APN functions. The only known APN function CCZ-inequivalent to power functions and to quadratic functions was found in [9, 27] for \(n=6\). For \(n=7\) and \(n=8\), as shown in a recent work [37], there are, respectively, more than 470 and more than a thousand CCZ-inequivalent quadratic APN functions. For n odd all power APN functions and the known APN binomials are permutations (see [13, 19]). For n even the only known APN permutation is constructed in [11] for \(n=6\). Existence of APN permutations for even \(n\ge 8\) is an open problem.
A class of APN functions over \({\mathbb F}_{2^n}\)
was constructed by Budaghyan, Carlet and Leander in [14]. Later, they generalized this result in [15] to the APN function \(F_0(x)\) of the form
for any positive integer n and any nonzero element a in \({\mathbb F}_{2^n}\), and they also obtained two other classes of APN functions over \({\mathbb F}_{2^n}\)
for any positive integer n divisible by 3 and any nonzero element a in \({\mathbb F}_{2^n}\) and where \(\mathrm{{tr}}_3^n(x)=\sum _{i=0}^{n/3-1}x^{2^{3i}}\) is the trace function from \({\mathbb F}_{2^n}\) to its subfield \({{\mathrm{\mathbb {F}}}}_{2^3}\). When n is even each of the functions \(F_0\), \(F_1\) and \(F_2\) defines two CCZ-inequivalent functions one for \(a=1\) and one for any \(a\ne 1\), that is, all together they give six different functions. When n is odd each of the functions \(F_0\), \(F_1\) and \(F_2\) defines only one function, up to CCZ-inequivalence, that is, all together they give three different functions [15]. In Table 2 the functions \(F_0\), \(F_1\) and \(F_2\) correspond to families 5, 6 and 7, respectively. In the present paper we determine the Walsh spectra of the functions \(F_0\), \(F_1\) and \(F_2\). The Walsh spectra of the remaining functions in Tables 1 and 2 have been determined in [6,7,8, 17, 28, 30, 36]. Note that the Walsh spectrum of the function \(F_0\) with \(a=1\) was previously found in [5] and we generalize this result to any \(a\ne 0\). The results on the Walsh spectra show that all the known families of quadratic APN functions have Gold like Walsh spectra. Note that there exists a quadratic APN function for \(n=6\) with Walsh spectrum different from Gold [10].
In 2015 a family of quadratic APN trinomials on \({{\mathrm{\mathbb {F}}}}_{2^n}\)
with \(\gcd (k, n) =1\) and \(n =2m =4t\), was constructed in [29]. It was claimed there to be CCZ-inequivalent to power functions. However, in the present paper we prove that this family is in fact affine equivalent to Gold power functions.
2 Walsh Spectra of \(F_1\) and \(F_2\)
In this section, we determine the Walsh spectra of the APN functions \(F_1\) and \(F_2\). According to the definition, for any \(b,c\in {\mathbb F}_{2^n}\), one gets
for \(i\in \{1,2\}\). For simplicity, denote \(\mathrm{{tr}}_3^n(ba^{-1})=\delta ^2\). By a direct calculation, one obtains that
which implies that
where \(L^i_{a,b,\delta }(u)\) is defined as
Note that \(g_i(u)+g_i(u+v)+g_i(v)=\mathrm{{tr}}_1^n(vL^i_{a,b,\delta }(u))\) due to (5) and (6). This means that for any u satisfying \(L^i_{a,b,\delta }(u)=0\) and any \(v\in {\mathbb F}_{2^n}\) we have
which implies that
In what follows, we discuss the number of solutions \(u\in {\mathbb F}_{2^n}\) to \(L^i_{a,b,\delta }(u)=0\) by adopting Dobbertin’s method [25], which also was used by Bracken et al. in [5] to determine the Walsh spectrum of \(F_0(x)\) for the case of \(a=1\).
For simplicity, define \(\theta _i=(\delta ^{2/i}+\delta ^{1/i})a^3\) for \(i=1,2\). Then \(L^i_{a,b,\delta }(u)=0\) can be written as \(\theta _iu^8+bu^2+(bu)^{2^{-1}}+(\theta _iu)^{2^{-3}}=0\) and it can be readily verified that
where \(\phi _i(u)\) is given as
Then, if \(L^i_{a,b,\delta }(u)=0\), we must have \(\phi _i(u)\in {\mathbb F}_{2}\).
Proposition 1
Let \(a,b\in {\mathbb F}_{2^n}\) with \(ab\ne 0\) and \(\delta ^2=\mathrm{{tr}}_3^n(ba^{-1})\). If \(\delta ^{2/i}+\delta ^{1/i}\not =0\), then \(L^i_{a,b,\delta }(u)=0\) if and only if \(\phi _i(u)=0\) for \(i=1,2\).
Proof
If \(\phi _i(u)=0\), we have \(L^i_{a,b,\delta }(u)=0\); and if \(L^i_{a,b,\delta }(u)=0\), we have \(\phi _i(u)\in {\mathbb F}_{2}\). Thus, to complete the proof, we need to show that \(L^i_{a,b,\delta }(u)=0\) implies that \(\phi _i(u)=0\) for \(i=1,2\). Suppose that \(\phi _i(u)=1\), one then gets \(b=\theta _iu^6+\theta _i^{1/2}u^{3/2}+\theta _i^{1/4}u^{-3/4}+u^{-3}\) which together with \(\theta _i=(\delta ^{2/i}+\delta ^{1/i})a^3\) leads to
For convenience, define \(\mathrm{{tr}}_3^n(a^2u^6)=t\) and \(\mathrm{{tr}}_3^n(a^{-1}u^{-3})=r\). Notice that \(\delta ^{\frac{1}{2}}=\delta ^4\) and \(\delta ^{\frac{1}{4}}=\delta ^2\) since \(\delta \in {\mathbb F}_{2^3}\). Then by \(\mathrm{{tr}}_3^n(ba^{-1})=\delta ^2\) and (9) one has that
Rewrite (10) with respect to the variable r we have
Note that \(\delta ^{\frac{1}{2i}}+\delta ^{\frac{1}{4i}}\ne 0\) due to \(\delta ^{\frac{2}{i}}+\delta ^{\frac{1}{i}}\not =0\). Then the above equation has solution \(r\in {\mathbb F}_{2^3}\) if and only if
It can be readily verified that for \(i=1,2\) we have
which implies that (11) holds if and only if
Observe that \((\delta ^{\frac{1}{2i}}+\delta ^{\frac{1}{4i}})\delta ^2=(\delta ^4+\delta ^2)\delta ^2=\delta ^6+\delta ^4\) if \(i=1\), and it equals \((\delta ^2+\delta )\delta ^2=\delta ^4+\delta ^3\) if \(i=2\). Thus, no matter which case we arrive at \(\mathrm{{tr}}_1^3(\delta ^3+\delta )=0\). By \(\mathrm{{tr}}_1^3(\delta ^3)=\mathrm{{tr}}_1^3(\delta )\) and \(\delta ^7=1\) we have \(\delta ^3+\delta ^6+\delta ^5=\delta +\delta ^2+\delta ^4\) which leads to \(\delta =0,1\), a contradiction with \(\delta ^{2/i}+\delta ^{1/i}\not =0\). Therefore, if \(\delta ^{2/i}+\delta ^{1/i}\not =0\), then there is no solution \(r\in {\mathbb F}_{2^3}\) to (10) and \(L^i_{a,b,\delta }(u)=0\) if and only if \(\phi _i(u)=0\). This completes the proof.
Proposition 2
Let \(a,b\in {\mathbb F}_{2^n}\) with \(ab\ne 0\) and \(\delta ^2=\mathrm{{tr}}_3^n(ba^{-1})\). Then \(L^i_{a,b,\delta }(u)=0\) defined by (6) has at most four roots in \({\mathbb F}_{2^n}\) for any \(i\in \{1,2\}\).
Proof
If \(\theta _i=0\), i.e., \(\delta ^{2/i}+\delta ^{1/i}=0\), then (6) is reduced to \(bu^2+(bu)^{2^{-1}}=0\) which has at most four roots in \({\mathbb F}_{2^n}\) for any nonzero b. Next we consider the case \(\theta _i\ne 0\). By Proposition 1, for this case we have \(L^i_{a,b,\delta }(u)=0\) if and only if \(\phi _i(u)=0\). Thus, to complete the proof, it suffices to show that \(\phi _i(u)=0\) has at most four roots in \({\mathbb F}_{2^n}\) for any \(i\in \{1,2\}\). If \(\phi _i(u)=0\) has no nonzero solution for some \(\theta _i\) and b, then the desired result follows. Now let v be any fixed nonzero solution of \(\phi _i(u)=0\), then for any u satisfying \(\phi _i(u)=0\) we have
A direct calculation based on (8) gives
which can be written as
since \(\theta _i \ne 0\). Then, let \(u=vz\), one obtains that
Note that v is a fixed nonzero element which means that z is uniquely determined by u. Thus, one can conclude that the number of solutions \(z\in {\mathbb F}_{2^n}\) to (13) is no less than that of \(u\in {\mathbb F}_{2^n}\) to \(\phi _i(u)=0\). Let \(w=z^2+z\) and rewrite (13) as
Observe that (12) holds for any u satisfying \(\phi _i(u)=0\) and the solution set of \(\phi _i(u)=0\) is an \({\mathbb F}_{2}\)-linear space due to Proposition 1. Then, one can conclude that the solution sets of both (13) and (14) are \({\mathbb F}_{2}\)-linear spaces. Assume that \(w_1, w_2\) and \(w_1+w_2\) are solutions of (14), then we have
since (14) holds if and only if \(\varOmega _i(w)=0\), which leads to \(w_1w_2^2+w_2^2w_1=w_1w_2(w_1+w_2)=0\), i.e., \(w_1=0\), \(w_2=0\) or \(w_1=w_2\). This means that (14) has at most two distinct solutions in \({\mathbb F}_{2^n}\) and then (13) has at most four solutions in z since \(w=z^2+z\). This completes the proof.
Theorem 1
The Walsh spectra of both functions \(F_1\) and \(F_2\) defined by (2) and (3) respectively are \(\{0,\pm 2^{(n+1)/2}\}\) if n is odd and \(\{0,\pm 2^{n/2},\pm 2^{(n+2)/2}\}\) otherwise.
Proof
The Walsh transform of \(F_i\), \(i=1,2\), takes values from \(\{0,\pm 2^{(n+1)/2}\}\) if n is odd and takes values from \(\{0,\pm 2^{n/2},\pm 2^{(n+2)/2}\}\) if n is even. This follows from (7) and Proposition 2.
The Walsh transform takes all three values for n odd and all 5 values for n even since quadratic functions are plateaud and there exists no bent function from \({{\mathrm{\mathbb {F}}}}_{2^n}\) to itself, while in case of n even quadratic APN functions have some bent components.
3 Walsh Spectrum of \(F_0\)
Bracken et al. in [5] had determined the Walsh spectrum of the APN function \(F_0\) for the case of \(a=1\). In this section, we determine its Walsh spectrum for any nonzero element \(a\in {\mathbb F}_{2^n}\) by using the same techniques. By the definition, for any \(b,c\in {\mathbb F}_{2^n}\), one gets
For simplicity, let \(\mathrm{{tr}}_1^n(ba^{-1})=\delta \) and \(g_0(x)=\mathrm{{tr}}_1^n(bF_0(x)+cx)\). Then, by a direct calculation, one obtains that
which implies that
where \(L^0_{a,b,\delta }(u)\) is defined as
Note that \(g_0(u)+g_0(u+v)+g_0(v)=\mathrm{{tr}}_1^n(vL^0_{a,b,\delta }(u))\) due to (15) and (16). This means that for any u satisfying \(L^0_{a,b,\delta }(u)=0\) and any \(v\in {\mathbb F}_{2^n}\) we have
which implies that
Next we aim to determine the number of solutions to \(L^0_{a,b,\delta }(u)=0\) in order to determine the possible values of the Walsh spectrum of \(F_0(x)\). First, if \(\delta =\mathrm{{tr}}_1^n(ba^{-1})=0\), then \(L^0_{a,b,\delta }(u)=0\) is reduced to \(L^0_{a,b,0}(u)=(bu)^{2^{-1}}+bu^2=0\) which has at most 4 roots in \({\mathbb F}_{2^n}\). Now we assume that \(\delta =\mathrm{{tr}}_1^n(ba^{-1})=1\), then \(L^0_{a,b,\delta }(u)=0\) is reduced to \(L^0_{a,b,1}(u)=(bu)^{2^{-1}}+bu^2+(a^3u)^{2^{-3}}+ a^3u^8=0\), and it is straightforward to verify that
where \(\phi _0(u)\) is defined by
Proposition 3
Let \(a,b\in {\mathbb F}_{2^n}\) with \(\delta =\mathrm{{tr}}_1^n(ba^{-1})=1\). Then \(L^0_{a,b,1}(u)=0\) if and only if \(\phi _0(u)=0\).
Proof
According to (18), we have \(L^0_{a,b,1}(u)=0\) if \(\phi _0(u)=0\); and \(\phi _0(u)\in {\mathbb F}_{2}\) if \(L^0_{a,b,1}(u)=0\). Thus, to complete the proof, we need to show that \(L^0_{a,b,1}(u)=0\) implies that \(\phi _0(u)=0\). Suppose that \(\phi _0(u)=1\), one then gets \(b=a^3u^6+a^{3/2}u^{3/2}+a^{3/4}u^{-3/4}+u^{-3}\) which leads to
This contradicts with the condition that \(\mathrm{{tr}}_1^n(ba^{-1})=1\). This completes the proof.
Proposition 4
Let \(a,b\in {\mathbb F}_{2^n}\) with \(ab\ne 0\) and \(\delta =\mathrm{{tr}}_1^n(ba^{-1})\). Then \(L^0_{a,b,\delta }(u)=0\) defined by (16) has at most four roots in \({\mathbb F}_{2^n}\).
Proof
This can be proved completely the same as Proposition 2.
Theorem 2
The Walsh spectrum of the function \(F_0\) defined by (1) is \(\{0,\pm 2^{(n+1)/2}\}\) if n is odd and \(\{0,\pm 2^{n/2},\pm 2^{(n+2)/2}\}\) otherwise.
Proof
The Walsh transform of \(F_0\) takes values from \(\{0,\pm 2^{(n+1)/2}\}\) if n is odd and takes values from \(\{0,\pm 2^{n/2},\pm 2^{(n+2)/2}\}\) if n is even. This follows from (17) and Proposition 4. The Walsh transform takes all three values for n odd and all 5 values for n even by the same reasons as in Theorem 1.
4 Equivalence of Göloğlu’s APN Trinomial to Gold Functions
In this section we prove that the function G defined by (4) is affine equivalent to the Gold function \(x^{2^{m-k}+1}\). Note first that
and it is affine equivalent to the function
Linear functions
where \(\gamma \) is a primitive element of \({{\mathrm{\mathbb {F}}}}_{2^2}\), are permutations. Indeed, it is easy to see that the equations \(L_1(x)=0\) and \(L_2(x)=0\) have only 0 as a solution. Note that \(L_1(x)=0\) implies \(L_1(x)^{2^m}=0\) which give
Hence, assuming \(x\ne 0\) and multiplying both sides of the equalities above gives \(\gamma ^{2^k+2^{m+k}} = \gamma ^{2^m+1}\) or \(\gamma = \gamma ^2\) (see explanation below) contradicting that \(\gamma \) is primitive in \({{\mathrm{\mathbb {F}}}}_{2^2}\). The proof for \(L_2\) being a permutation is similar.
Further we have
and
since \(\gcd (k, n) =1\), \(n =2m =4t\), and then
Hence \(\big (L_1(x)\big )^{2^{m-k}+1}=L_2\circ G'(x)=L_2'\circ G(x)\) where \(L_2'(x)=L_2(x^{2^m})\) is, obviously, a linear permutation. Therefore \(x^{2^{m-k}+1}\) and G are affine equivalent.
Proposition 5
Let k, n, m, t be positive integers such that \(\gcd (k, n) =1\), \(n =2m =4t\). Then the function G defined by (4) and the function \(x^{2^{m-k}+1}\) over \({{\mathrm{\mathbb {F}}}}_{2^n}\) are affine equivalent.
Remark 1
For \(k=1\) the APN function G and its equivalence to Gold functions were known from [14].
We note that it is possible to check CCZ-equivalence of functions with a computer for n up to 12. However, since most of the known families of APN functions are defined for many different parameters and coefficients it becomes extremely difficult to check CCZ-equivalence of a given function to all of them. For this reason we tested all possible parameters and coefficients to produce Table 3 of all CCZ-inequivalent functions arising from the known infinite families of APN functions for \(n\le 11\).
References
Beth, T., Ding, C.: On almost perfect nonlinear permutations. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 65–76. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_7
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3–72 (1991)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Crypt. Commun. 3(1), 43–53 (2011)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: New families of quadratic almost perfect nonlinear trinomials and multinomials. Finite Fields Appl. 14(3), 703–714 (2008)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: On the Walsh spectrum of a new APN function. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 92–98. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77272-9_6
Bracken, C., Byrne, E., Markin, N., McGuire, G.: On the Fourier spectrum of binomial APN functions. SIAM J. Discrete Math. 23(2), 596–608 (2009)
Bracken, C., Byrne, E., Markin, N., McGuire, G.: Determining the nonlinearity of a new family of APN functions. In: Boztaş, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 72–79. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77224-8_11
Bracken, C., Zha, Z.: On the Fourier spectra of the infinite families of quadratic APN functions. Finite Fields Appl. 18(3), 537–546 (2012)
Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Crypt. 49(1–3), 273–288 (2008)
Browning, A.K., Dillon, F.J., Kibler, E.R., McQuistan, T.M.: APN polynomials and related codes. J. Comb. Inf. Syst. Sci. 34(1–4), 135–159 (2009). Special Issue in Honor of Prof. D.K Ray-Chaudhuri on the occasion of his 75th birthday
Browning, A.K., Dillon, F.J., McQuistan, T.M., Wolfe, J.A.: An APN permutation in dimension six. In: Post-proceedings of the 9-th International Conference on Finite Fields and Their Applications Fq 2009, Contemporary Math, AMS, vol. 518, pp. 33–42 (2010)
Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inform. Theor. 54(5), 2354–2357 (2008)
Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inform. Theor. 54(9), 4218–4229 (2008)
Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150–159 (2009)
Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In: IEEE Information Theory Workshop, pp. 374–378 (2009)
Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear functions. IEEE Trans. Inform. Theor. 52(3), 1141–1152 (2006)
Canteaut, A., Charpin, P., Dobbertin, H.: Binary \(m\)-sequences with three-valued crosscorrelation: a proof of Welch’s conjecture. IEEE Trans. Inform. Theor. 46(1), 4–8 (2000)
Carlet, C.: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Crypt. 59(1–3), 89–109 (2011)
Carlet, C.: Vectorial Boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models. Cambridge University Press (2005–2006, to appear). Chapter of the Monography
Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125–156 (1998)
Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356–365. Springer, Heidelberg (1995). doi:10.1007/BFb0053450
Dobbertin, H.: Almost perfect nonlinear power functions over \(GF(2^n)\): the Niho case. Inform. Comput. 151, 57–72 (1999)
Dobbertin, H.: Almost perfect nonlinear power functions over \(GF(2^n)\): the Welch case. IEEE Trans. Inform. Theor. 45, 1271–1275 (1999)
Dobbertin, H.: Almost perfect nonlinear power functions over \(GF(2^n)\): a new case for \(n\) divisible by 5. In: Proceedings of Finite Fields and Applications Fq5, pp. 113–121 (2000)
Dobbertin, H.: Another proof of Kasami’s theorem. Des. Codes Crypt. 17, 177–180 (1999)
Edel, Y.: Quadratic APN functions as subspaces of alternating bilinear forms. In: Contact Forum Coding Theory and Cryptography III 2009, Belgium, pp. 11–24 (2011)
Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59–81 (2009)
Gold, R.: Maximal recursive sequences with 3-valued recursive crosscorrelation functions. IEEE Trans. Inform. Theor. 14, 154–156 (1968)
Göloğlu, F.: Almost perfect nonlinear trinomials and hexanomials. Finite Fields Appl. 33, 258–282 (2015)
Hollmann, H., Xiang, Q.: A proof of the Welch and Niho conjectures on crosscorrelations of binary \(m\)-sequences. Finite Fields Appl. 7, 253–286 (2001)
Janwa, H., Wilson, R.M.: Hyperplane sections of fermat varieties in \(P^{3}\) in char. 2 and some applications to cyclic codes. In: Cohen, G., Mora, T., Moreno, O. (eds.) AAECC 1993. LNCS, vol. 673, pp. 180–194. Springer, Heidelberg (1993). doi:10.1007/3-540-56686-4_43
Kasami, T.: The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Inform. Control 18, 369–394 (1971)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_33
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994). doi:10.1007/3-540-48285-7_6
Nyberg, K.: Perfect nonlinear S-boxes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 378–386. Springer, Heidelberg (1991). doi:10.1007/3-540-46416-6_32
Tan, Y., Qu, L., Ling, S., Tan, C.H.: On the Fourier spectra of new APN functions. SIAM J. Discrete Math. 27(2), 791–801 (2013)
Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions. In: Pre-proceedings of the International Conference WCC 2013, Bergen, Norway (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Budaghyan, L., Helleseth, T., Li, N., Sun, B. (2017). Some Results on the Known Classes of Quadratic APN Functions. In: El Hajji, S., Nitaj, A., Souidi, E. (eds) Codes, Cryptology and Information Security. C2SI 2017. Lecture Notes in Computer Science(), vol 10194. Springer, Cham. https://doi.org/10.1007/978-3-319-55589-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-55589-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55588-1
Online ISBN: 978-3-319-55589-8
eBook Packages: Computer ScienceComputer Science (R0)