Vector Boolean Functions Library: User Manual, Analysis and Design of Cryptographic Algorithms¶

Table of Contents:
- 1. Preface
- 1.1. Authors
- 1.2. Dedications
- 1.3. Acknowledgements
- 1.4. Book Writing Methodology
- 1.5. Who Should Read This Book?
- 1.6. Book Objectives
- 1.7. Organization of this Book
- 1.7.1. Section 1: Introduction
- 1.7.2. Section 2: Using the library
- 1.7.3. Section 3: Representations and characterizations
- 1.7.4. Section 4: Cryptographic Criteria
- 1.7.5. Section 5: Constructions for Vector Boolean functions
- 1.7.6. Section 6: Analysis of AES competition cryptographic algorithms
- 1.7.7. Section 7: Analysis of CRYPTEC project cryptographic algorithms
- 1.7.8. Section 8: Analysis of NESSIE project cryptographic algorithms
- 1.7.9. Section 9: Analysis of other cryptographic algorithms
- 1.7.10. Section 10: Design of cryptographically robust Vector Boolean functions
- 1.7.11. Section 11: FAQs
- 1.7.12. Section 12: Bibliography
- 1.7.13. Section 13: Appendix
- 2. Introduction
- 3. Using the library
- 4. Representations and characterizations
- 4.1. Truth Table
- 4.2. Trace representation
- 4.3. Polynomials in ANF
- 4.4. ANF table
- 4.5. Characteristic Function
- 4.6. Walsh Spectrum
- 4.7. Linear Profile
- 4.8. Differential Profile
- 4.9. Autocorrelation Spectrum
- 4.10. Affine function and affine equivalence
- 4.11. Cycle structure, fixed points and negated fixed points
- 4.12. Permutation matrix
- 4.13. DES representations
- 4.14. Auxiliary functions
- 4.15. Summary
- 5. Cryptographic Criteria
- 6. Operations and constructions over Vector Boolean Functions
- 7. Analysis of AES competition cryptographic algorithms
- 8. Analysis of CRYPTEC project cryptographic algorithms
- 9. Analysis of NESSIE project cryptographic algorithms
- 10. Analysis of other cryptographic algorithms
- 11. Design of cryptographically robust Vector Boolean functions
- 12. FAQ
- 13. Bibliography