The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
하자 f 부울 함수가 되어야 합니다. n 변수. 뫼비우스 변환과 그 반대 f 진리표 사이의 변환 동작을 설명할 수 있습니다. f 그리고 대수적 정규형 표현의 단항식의 계수는 다음과 같습니다. f. 이 편지에서 우리는 뫼비우스 변환과 그 변환을 보다 일반화된 형태로 개발합니다. 여기에는 1954년 Reed가 제공한 알려진 결과도 포함됩니다. 우리는 우리의 새로운 결과가 선형 코드에 대한 디코딩 방식 설계에 사용될 수 있기를 바랍니다. 대칭 암호화를 위한 암호 분석. 또한 우리는 새로운 결과를 적용하여 큐브 공격의 기본 아이디어를 매우 간단한 방법으로 검증하는데, 큐브 공격은 대칭 암호학의 암호 분석에 대한 강력한 기술입니다.
Jianchao ZHANG
Shanghai Jiao Tong University
Deng TANG
Shanghai Jiao Tong University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Jianchao ZHANG, Deng TANG, "A Note on the Transformation Behaviors between Truth Tables and Algebraic Normal Forms of Boolean Functions" in IEICE TRANSACTIONS on Fundamentals,
vol. E106-A, no. 7, pp. 1007-1010, July 2023, doi: 10.1587/transfun.2022EAL2095.
Abstract: Let f be a Boolean function in n variables. The Möbius transform and its converse of f can describe the transformation behaviors between the truth table of f and the coefficients of the monomials in the algebraic normal form representation of f. In this letter, we develop the Möbius transform and its converse into a more generalized form, which also includes the known result given by Reed in 1954. We hope that our new result can be used in the design of decoding schemes for linear codes and the cryptanalysis for symmetric cryptography. We also apply our new result to verify the basic idea of the cube attack in a very simple way, in which the cube attack is a powerful technique on the cryptanalysis for symmetric cryptography.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2022EAL2095/_p
부
@ARTICLE{e106-a_7_1007,
author={Jianchao ZHANG, Deng TANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Note on the Transformation Behaviors between Truth Tables and Algebraic Normal Forms of Boolean Functions},
year={2023},
volume={E106-A},
number={7},
pages={1007-1010},
abstract={Let f be a Boolean function in n variables. The Möbius transform and its converse of f can describe the transformation behaviors between the truth table of f and the coefficients of the monomials in the algebraic normal form representation of f. In this letter, we develop the Möbius transform and its converse into a more generalized form, which also includes the known result given by Reed in 1954. We hope that our new result can be used in the design of decoding schemes for linear codes and the cryptanalysis for symmetric cryptography. We also apply our new result to verify the basic idea of the cube attack in a very simple way, in which the cube attack is a powerful technique on the cryptanalysis for symmetric cryptography.},
keywords={},
doi={10.1587/transfun.2022EAL2095},
ISSN={1745-1337},
month={July},}
부
TY - JOUR
TI - A Note on the Transformation Behaviors between Truth Tables and Algebraic Normal Forms of Boolean Functions
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1007
EP - 1010
AU - Jianchao ZHANG
AU - Deng TANG
PY - 2023
DO - 10.1587/transfun.2022EAL2095
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E106-A
IS - 7
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - July 2023
AB - Let f be a Boolean function in n variables. The Möbius transform and its converse of f can describe the transformation behaviors between the truth table of f and the coefficients of the monomials in the algebraic normal form representation of f. In this letter, we develop the Möbius transform and its converse into a more generalized form, which also includes the known result given by Reed in 1954. We hope that our new result can be used in the design of decoding schemes for linear codes and the cryptanalysis for symmetric cryptography. We also apply our new result to verify the basic idea of the cube attack in a very simple way, in which the cube attack is a powerful technique on the cryptanalysis for symmetric cryptography.
ER -