Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Vectorial Boolean functions and linear codes in the context of algebraic attacks (1801.01145v1)

Published 30 Dec 2017 in cs.IT and math.IT

Abstract: In this paper we study the relationship between vectorial (Boolean) functions and cyclic codes in the context of algebraic attacks. We first derive a direct link between the annihilators of a vectorial function (in univariate form) and certain $2{n}$-ary cyclic codes (which we prove that they are LCD codes) extending results due to R{\o}njom and Helleseth. The knowledge of the minimum distance of those codes gives rise to a lower bound on the algebraic immunity of the associated vectorial function. Furthermore, we solve an open question raised by Mesnager and Cohen. We also present some properties of those cyclic codes (whose generator polynomials determined by vectorial functions) as well as their weight enumerator. In addition we generalize the so-called algebraic complement and study its properties.

Summary

We haven't generated a summary for this paper yet.