Abstract
We construct two families of authentication schemes using highly nonlinear functions on finite fields of characteristic 2. This leads to improvements on an earlier construction by Ding and Niederreiter if one chooses, for instance, an almost bent function as the highly nonlinear function.
Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
A Canteaut P Charpin H Dobbertin (2000) ArticleTitleWeight divisibility of cyclic codes, highly nonlinear functions on F2 m, and crosscorrelation of maximum-length sequences SIAM J Discrete Math 13 105–138 Occurrence Handle2000m:94041 Occurrence Handle10.1137/S0895480198350057
C Carlet P Charpin V Zinoviev (1998) ArticleTitleCodes, bent functions and permutations suitable for DES-like cryptosystems Designs Codes Cryptogr 15 125–156 Occurrence Handle99k:94030 Occurrence Handle10.1023/A:1008344232130
Chabaud F, Vaudenay S (1995). Links between differential and linear cryptanalysis, Advances in Cryptology—EUROCRYPT ’94, Lecture Notes in Computer Science, vol. 950. Springer, Berlin, pp 356–365
S Chanson CS Ding A Salomaa (2003) ArticleTitleCartesian authentication codes from functions with optimal nonlinearity Theor Comput Sci 290 1737–1752 Occurrence Handle2003j:94090 Occurrence Handle10.1016/S0304-3975(02)00077-4
CS Ding H Niederreiter (2004) ArticleTitleSystematic authentication codes from highly nonlinear functions IEEE Trans Inform Theory 50 2421–2428 Occurrence Handle2097058 Occurrence Handle10.1109/TIT.2004.834788
Helleseth T, Johansson T (1996). Universal hash functions from exponential sums over finite fields and Galois rings, Advances in Cryptology—CRYPTO ’96, Lecture Notes in Computer Science, vol. 1109. Springer, Berlin, pp 31–44
Simmons GJ (1985). Authentication theory/coding theory, Advances in Cryptology—CRYPTO ’84, Lecture Notes in Computer Science, vol. 196. Springer, Berlin, pp 411–431
DR Stinson (1995) Cryptography: theory and practice CRC Press Boca Raton, FL
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by J. Wolfmann
Rights and permissions
About this article
Cite this article
Carlet, C., Ding, C. & Niederreiter, H. Authentication Schemes from Highly Nonlinear Functions. Des Codes Crypt 40, 71–79 (2006). https://doi.org/10.1007/s10623-005-6407-0
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-005-6407-0