Skip to main content

Showing 1–7 of 7 results for author: Leander, G

Searching in archive cs. Search in all archives.
.
  1. Trims and Extensions of Quadratic APN Functions

    Authors: Christof Beierle, Gregor Leander, Léo Perrin

    Abstract: In this work, we study functions that can be obtained by restricting a vectorial Boolean function $F \colon \mathbb{F}_2^n \rightarrow \mathbb{F}_2^n$ to an affine hyperplane of dimension $n-1$ and then projecting the output to an $n-1$-dimensional space. We show that a multiset of $2 \cdot (2^n-1)^2$ EA-equivalence classes of such restrictions defines an EA-invariant for vectorial Boolean functio… ▽ More

    Submitted 23 March, 2022; v1 submitted 30 August, 2021; originally announced August 2021.

    MSC Class: 06E30; 94A60

    Journal ref: Des. Codes Cryptogr. 90(4): 1009-1036 (2022)

  2. arXiv:2104.11469  [pdf, other

    cs.CR cs.AR

    ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions

    Authors: Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu

    Abstract: In the recent past, we have witnessed the shift towards attacks on the microarchitectural CPU level. In particular, cache side-channels play a predominant role as they allow an attacker to exfiltrate secret information by exploiting the CPU microarchitecture. These subtle attacks exploit the architectural visibility of conflicting cache addresses. In this paper, we present ClepsydraCache, which mi… ▽ More

    Submitted 18 August, 2022; v1 submitted 23 April, 2021; originally announced April 2021.

  3. A Further Study of Quadratic APN Permutations in Dimension Nine

    Authors: Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin

    Abstract: Recently, Beierle and Leander found two new sporadic quadratic APN permutations in dimension 9. Up to EA-equivalence, we present a single trivariate representation of those two permutations as $C_u \colon (\mathbb{F}_{2^m})^3 \rightarrow (\mathbb{F}_{2^m})^3, (x,y,z) \mapsto (x^3+uy^2z, y^3+uxz^2,z^3+ux^2y)$, where $m=3$ and $u \in \mathbb{F}_{2^3}\setminus\{0,1\}$ such that the two permutations c… ▽ More

    Submitted 25 April, 2022; v1 submitted 16 April, 2021; originally announced April 2021.

    MSC Class: 06E30; 94A60

    Journal ref: Finite Fields Their Appl. 81: 102049 (2022)

  4. New Instances of Quadratic APN Functions

    Authors: Christof Beierle, Gregor Leander

    Abstract: In a recent work, Beierle, Brinkmann and Leander presented a recursive tree search for finding APN permutations with linear self-equivalences in small dimensions. In this paper, we describe how this search can be adapted to find many new instances of quadratic APN functions. In particular, we found 12,921 new quadratic APN functions in dimension eight, 35 new quadratic APN functions in dimension n… ▽ More

    Submitted 14 October, 2021; v1 submitted 15 September, 2020; originally announced September 2020.

    Comments: 18 pages. This is the version accepted to IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. Inf. Theory 68(1): 670-678 (2022)

  5. Linearly Self-Equivalent APN Permutations in Small Dimension

    Authors: Christof Beierle, Marcus Brinkmann, Gregor Leander

    Abstract: All almost perfect nonlinear (APN) permutations that we know to date admit a special kind of linear self-equivalence, i.e., there exists a permutation $G$ in their CCZ-equivalence class and two linear permutations $A$ and $B$, such that $G \circ A = B \circ G$. After providing a survey on the known APN functions with a focus on the existence of self-equivalences, we search for APN permutations in… ▽ More

    Submitted 6 April, 2021; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: 30 pages. This is the version accepted to IEEE Transactions on Information Theory. The final published version is going to appear and can be found under the provided DOI

    Journal ref: IEEE Trans. Inf. Theory 67(7): 4863-4875 (2021)

  6. arXiv:0901.4322  [pdf, ps, other

    math.AG cs.CR

    Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$

    Authors: Gregor Leander, François Rodier

    Abstract: We prove that functions $f:\f{2^m} \to \f{2^m}$ of the form $f(x)=x^{-1}+g(x)$ where $g$ is any non-affine polynomial are APN on at most a finite number of fields $\f{2^m}$. Furthermore we prove that when the degree of $g$ is less then 7 such functions are APN only if $m \le 3$ where these functions are equivalent to $x^3$.

    Submitted 27 January, 2009; originally announced January 2009.

  7. arXiv:0901.1824  [pdf, ps, other

    cs.IT

    A Highly Nonlinear Differentially 4 Uniform Power Mapping That Permutes Fields of Even Degree

    Authors: Carl Bracken, Gregor Leander

    Abstract: Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as they have good resistance to differential attacks. The AES (Advanced Encryption Standard) uses a differentially-4 uniform function called the inverse function. Any function used in a symmetric cryptosystem should be a permutation. Also, it is required that the function is highly nonlinear so that… ▽ More

    Submitted 13 January, 2009; originally announced January 2009.

    Comments: 10 pages, submitted to Finite Fields and Their Applications