Ask a Question

Prefer a chat interface with context about you and your work?

Doubly perfect nonlinear boolean permutations

Doubly perfect nonlinear boolean permutations

Abstract Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind differences. While very natural, there are many alternatives to the XOR. …