L. Budaghyan, M. Calderini and I. Villa

On equivalence between some families of APN functions

Proceedings WCC 2019

Abstract

L. Budaghyan, M. Calderini, C. Carlet, R. Coulter and I. Villa

Generalized Isotopic Shift of Gold Functions

Proceedings WCC 2019

Abstract

L. Budaghyan, M. Calderini, C. Carlet, R. Coulter and I. Villa

On Isotopic Shift Construction for Planar Functions

Proceedings ISIT2019

Abstract

L. Budaghyan, M. Calderini, and I. Villa

On relations between CCZ- and EA-equivalences

Cryptography and Communications, 2019. https://doi.org/10.1007/s12095-019-00367-5

Abstract

N. Kaleyski

Changing APN Functions at Two Points

Cryptography and Communications, 2019. https://doi.org/10.1007/s12095-019-00366-6

Abstract

L. Budaghyan, N. S. Kaleyski, S. Kwon, C. Riera, and P. Stanica

Partially APN Boolean functions and classes of functions that are not APN infinitely often

Cryptography and Communications, 2019. https://doi.org/10.1007/s12095-019-00372-8

Abstract

Y. Xu, C. Carlet, S. Mesnager, and C. Wu

Classification of bent monomials, constructions of bent multinomials and upper bounds on the nonlinearity of vectorial functions

IEEE Transactions on Information Theory 64, Issue:1, pp. 367-383, 2018

Abstract

C. Carlet

On the nonlinearity of monotone Boolean functions

Proceedings of SETA 2016, Chengdu, China, 09-14 October 2016 and Cryptography and Communications, 10(6), pp. 1051-1061, 2018.

Abstract

L. Budaghyan, C. Carlet, T. Helleseth, N. Li and B. Sun

On upper bounds for algebraic degrees of APN functions

IEEE Transactions on Information Theory 64(6), pp. 4399-4411, 2018.

Abstract

C. Carlet

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

IEEE Transactions on Information Theory, Volume: 64, Issue:9, pp. 6443-6453, 2018.

Abstract

C. Carlet and X. Chen

Constructing low-weight $d$th-order correlation-immune Boolean functions through the Fourier-Hadamard transform

IEEE Transactions on Information Theory 64(4) (Special Issue in honor of Solomon Golomb), pp. 2969-2978, 2018.

Abstract

C. Carlet and S. Guilley.

Statistical properties of side-channel and fault injection 1 attacks using coding theory

To appear in Cryptography and Communications 10(5), Special Issue: Statistics in Design and Analysis of Symmetric Ciphers, S. Maitra Editor, pp. 909-933, 2018.

Abstract

C. Carlet, S. Mesnager, C. Tang, Y. Qi and R. Pellikaan

Linear codes over F_q are equivalent to LCD codes for q>3

IEEE Transactions on Information Theory 64(4) (Special Issue in honor of Solomon Golomb), pp. 3010-3017, 2018.

Abstract

C. Carlet, C. Guneri, F. Ozbudak, B. Ozkaya and P. Sole

On Linear Complementary Pairs of Codes

IEEE Transactions on Information Theory 64, Issue:10, pp. 6583-6589, 2018.

Abstract

C. Carlet, S. Mesnager, C. Tang and Y. Qi

Euclidean and Hermitian LCD MDS codes

Designs, Codes and Cryptography 86(11), pp. 2605-2618, 2018.

Abstract

C. Carlet, C. Guneri, F. Ozbudak and P. Sole

A new concatenated type construction for LCD codes and isometry codes

Discrete Mathematics 341(3), pp. 830-835, 2018.

Abstract

C. Carlet, S. Mesnager, C. Tang and Y. Qi

New characterization and parametrization of LCD Codes

IEEE Transactions on Information Theory 65(1), pp. 39-49, 2019.

Abstract

C. Carlet

Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets

Finite Fields and Their Applications, Volume 53, pp. 226-253, 2018

Abstract

C. Carlet, S. Mesanger, C. Tang and Y. Qi

On sigma-LCD codes

IEEE Transactions on Information Theory 65(3), pp. 1694-1704, 2019

Abstract

C. Carlet, A. Daif, S. Guilley and C. Tavernier

Polynomial direct sum masking to protect against both SCA and FIA

To appear in the Journal of Cryptographic Engineering (JCEN)

Abstract

C. Carlet, X. Chen and L. Qu

Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$

Designs, Codes and Cryptography 87(7), pp.1577-1599, 2019.

Abstract

C. Carlet, C. Guneri, S. Mesnager and F. Ozbudak

Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks

Proceedings of WAIFI 2017, Lecture Notes in Computer Science 11321, pp.95-107, 2018

Abstract

S. Picek, K. Knezevic, D. Jakobovic and C. Carlet

A Search for Differentially-6 Uniform (n, n-2) Functions

Proceedings of IEEE CEC 2018, pp. 1-7, 2018.

Abstract

W. Cheng, S. Guilley, C. Carlet, J.-L. Danger and A. Schaub

Optimal Codes for Inner Product Masking

Cryptographic architectures embedded in logic devices 2019

Abstract

W. Cheng, C. Carlet, K. Goli, S. Guilley and J.-L. Danger

Detecting Faults in Inner Product Masking Scheme

IACR Cryptology ePrint Archive (http://eprint.iacr.org/) 2019/919. Presented at PROOFS 2019, 8th International Workshop on Security Proofs for Embedded Systems, Atlanta, USA, 2019. https://easychair.org/publications/paper/HTzP

Abstract

L.Budaghyan, T.Helleseth, N.Li, B.Sun

Some Results on the Known Classes of Quadratic APN Functions

C2SI 2017, LNCS, pp.3-16, 2017

Abstract

N. Bruneau, C. Carlet, S. Guilley, A. Heuser, E. Prouff and O. Rioul

Stochastic Collision Attack

Transactions on Information Forensics \& Security Vol. 12, Issue: 9, pp. 2090-2104, 2017

Abstract

C. Carlet, S. Mesnager, F. Ozbudak and A. Sinak

<a href="https://link.springer.com/chapter/10.1007/978-3-319-55589-8_22"Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions

Proceedings of C2SI 2017, LNCS volume 10194, pp. 328-345, 2017

Abstract

C. Carlet, A. Heuser and S. Picek

Trade-offs for S-boxes: Cryptographic Properties and Side-channel Resilience

Proceedings of ACNS 2017, Lecture Notes in Computer Science 10355, pp. 393-414, 2017

Abstract

R. Poussier, Q. Guo, F.-X. Standaert, C. Carlet and S. Guilley

Connecting and Improving Direct Sum Masking and Inner Product Masking

Proceedings of CARDIS 2017, Lecture Notes in Computer Science 10728, pp. 123-141, 2017

Abstract

D. Tang, C. Carlet and Z. Zhou

Binary Linear Codes From Vectorial Boolean Functions and Their Weight Distribution

Discrete Mathematics 340, no 12, pp. 3055-3072, 2017

Abstract

C. Carlet, P. Méaux and Yann Rotella

Boolean functions with restricted input and their robustness; application to the FLIP cipher

FSE 2018. IACR Trans. Symmetric Cryptol 2017, no 3, pp. 192-227, 2017

Abstract

D. Tang, C. Carlet, X. Tang and Z. Zhou

Construction of Highly Nonlinear 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity

IEEE Trans. Information Theory 63(9), pp. 6113-6125, 2017

Abstract

C. Carlet and S. Feukoua

Three basic questions on Boolean functions

Advances in Mathematics of Communications Vol. 11, no. 4, pp. 837-855, 2017

Abstract

Y. Xu, C. Carlet, S. Mesnager, and C. Wu

Classification of bent monomials, constructions of bent multinomials and upper bounds on the nonlinearity of vectorial functions

IEEE Transactions on Information Theory 64, Issue:1, pp. 367-383, 2018

Abstract

C. Carlet

On the nonlinearity of monotone Boolean functions

Proceedings of SETA 2016, Chengdu, China, 09-14 October 2016 and Cryptography and Communications, 10(6), pp. 1051-1061, 2018

Abstract

C. Carlet and S. Guilley

Statistical properties of side-channel and fault injection 1 attacks using coding theory

To appear in Cryptography and Communications 10(5), Special Issue: Statistics in Design and Analysis of Symmetric Ciphers, S. Maitra Editor, pp. 909-933, 2018

Abstract

L. Budaghyan, M. Calderini, C. Carlet, R. Coulter, I. Villa

Constructing APN functions through isotopic shifts

Proceedings of the Int. Conference on Sequences and Their Applications – SETA 2018, Hong Kong, Oct. 2018

Abstract

M. Calderini

A note on some algebraic trapdoors for block ciphers

Advances in Mathematics of Communications 2018, 12(3): 515-524.

Abstract

L. Budaghyan, C. Carlet, T. Helleseth, N. Kaleyski

Changing points in APN functions

Submitted to IEEE Trans. on Inform. Theory, presented at BFA 2018

Abstract

L. Budaghyan, N. Kaleyski, S. Kwon, C. Riera, P. Stanica

Partially APN Boolean Functions

Proceedings of the Int. Conference on Sequences and Their Applications – SETA 2018, Hong Kong, Oct. 2018

Abstract

N. Kaleyski

Changing two points in an APN functions

Proceedings of the Int. Conference on Sequences and Their Applications – SETA 2018, Hong Kong, Oct. 2018

Abstract

Movsisyan Yu.

On functional equations and distributive second order formulae with specialized quantifiers

Algebra and Discrete Mathematics, 45(2),2018, pp. 269-285.

Abstract

Movsisyan Yu., Davidov S., Krapez A.

Functional equations with division and regular operations

Asian-European Journal of Mathematics, Vol.11,No.3, 2018

Abstract

Movsisyan Yu.

Representations of Free Algebras of Varieties and Hypervarieties

IX International Conference of the Georgian Mathematical Union, Dedicated to 100-th Anniversary of Ivane Javakhishvili Tbilisi State University, Abstracts, p55

Abstract

Movsisyan Yu., Gevorgyan A.

Schauffler Type Theorems for New Second Order Formulas

IX International Conference of the Georgian Mathematical Union, Dedicated to 100-th Anniversary of Ivane Javakhishvili Tbilisi State University, Abstracts, p.119

Abstract

L. Budaghyan, P. Stanica.

What is a cryptographic Boolean function

Notices of American Mathematical Society, 2019

Abstract

A. De Trano, N. Karimi, R. Karri, X. Guo, C. Carlet and S. Guilley

Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack

To appear in The Scientific World Journal. Hindawi Publishing Corporation. Doi: 10.1155/2015/743618

Abstract

C. Carlet

On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures

Proceedings of WCC 2017. To appear in Designs, Codes and Cryptography, 2019

Abstract

R. Aragona, M. Calderini, R. Civino, M. Sala and I. Zappatore

Wave-Shaped Round Functions and Primitive Groups

To be published in Advances in Mathematics of Communications

Abstract

C. Brunetta, M. Calderini and M. Sala

On Hidden Sums Compatible with A Given Block Cipher Diffusion Layer

To be published in Discrete Mathematics

Abstract