Subtopic Deep Dive

Boolean Functions in Cryptography
Research Guide

What is Boolean Functions in Cryptography?

Boolean functions in cryptography are nonlinear mappings from binary vectors to binary outputs designed to exhibit properties like high nonlinearity, correlation immunity, and bentness for secure use in stream ciphers, block ciphers, and S-boxes.

Research focuses on constructions of Boolean functions resisting algebraic, correlation, and linear attacks (Carlet, 2010; 850 citations). Key properties include algebraic degree, nonlinearity, and propagation criteria evaluated for cryptographic primitives. Over 20 major papers document constructions and cryptanalysis techniques since the 1980s.

15
Curated Papers
3
Key Challenges

Why It Matters

Boolean functions underpin S-box designs in AES and other block ciphers, ensuring resistance to differential and linear cryptanalysis (Webster and Tavares, 2007; 705 citations; Nechvatal et al., 2001; 458 citations). They enable secure keystream generation in stream ciphers against correlation attacks (Meier and Staffelbach, 1989; 477 citations). Carlet's surveys provide constructions balancing multiple criteria for practical deployments (Carlet, 2010; 850 citations).

Key Research Challenges

Optimizing Nonlinearity and Immunity

Constructing functions with maximum nonlinearity while maintaining correlation immunity of order k remains difficult due to trade-offs (Carlet, 2010). Higher dimensions increase computational search complexity. Carlet identifies open bounds for optimal parameters (Carlet, 2010).

Resisting Algebraic Attacks

Overdefined equation systems from algebraic degree expose keys in block ciphers (Courtois and Pieprzyk, 2002; 677 citations). Functions must minimize ANF degree without sacrificing other properties. New constructions counter XL algorithm variants (Courtois and Pieprzyk, 2002).

S-Box Design Criteria Balance

S-boxes require simultaneous high nonlinearity, low differential uniformity, and avalanche effect (Webster and Tavares, 2007; 705 citations). Exhaustive search infeasible for large tables. Heuristic methods yield suboptimal trade-offs (Webster and Tavares, 2007).

Essential Papers

1.

A Survey on Homomorphic Encryption Schemes

Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac et al. · 2018 · ACM Computing Surveys · 1.2K citations

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or servic...

2.

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

Jonathan Katz, Amit Sahai, Brent Waters · 2008 · Lecture notes in computer science · 1.1K citations

3.

Report on Post-Quantum Cryptography

Lily Chen, Stephen P. Jordan, Yi-Kai Liu et al. · 2016 · 851 citations

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Natio...

4.

Boolean Functions for Cryptography and Error-Correcting Codes

Claude Carlet · 2010 · Cambridge University Press eBooks · 850 citations

A fundamental objective of cryptography is to enable two persons to communicate over an insecure channel (a public channel such as the internet) in such a way that any other person is unable to rec...

5.

Probabilistic encryption & how to play mental poker keeping secret all partial information

Shafi Goldwasser, Silvio Micali · 1982 · 849 citations

This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the ...

6.

On the Design of S-Boxes

A. F. Webster, S.E. Tavares · 2007 · Lecture notes in computer science · 705 citations

7.

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

Nicolas T. Courtois, Josef Pieprzyk · 2002 · Lecture notes in computer science · 677 citations

Reading Guide

Foundational Papers

Start with Carlet (2010; 850 citations) for comprehensive properties survey and definitions; follow with Webster and Tavares (2007; 705 citations) for S-box criteria; Goldwasser and Micali (1982; 849 citations) contextualizes probabilistic encryption foundations.

Recent Advances

Carlet (2010) vectorial extension (432 citations) for multivariate ciphers; NIST post-quantum report (Chen et al., 2016; 851 citations) evaluates Boolean roles in lattice schemes.

Core Methods

Walsh-Hadamard transform measures nonlinearity; correlation immunity via autocorrelation; algebraic normal form (ANF) for degree attacks; propagation and avalanche criteria (Carlet, 2010).

How PapersFlow Helps You Research Boolean Functions in Cryptography

Discover & Search

Research Agent uses searchPapers('Boolean functions cryptography bent correlation immunity') to retrieve Carlet (2010; 850 citations), then citationGraph to map 850+ citing works on constructions, and findSimilarPapers for vectorial extensions (Carlet, 2010). exaSearch uncovers niche preprints on high-order immunity.

Analyze & Verify

Analysis Agent applies readPaperContent on Carlet (2010) to extract nonlinearity definitions, verifyResponse with CoVe against Meier and Staffelbach (1989) correlation metrics, and runPythonAnalysis to compute Walsh spectrum statistics for custom functions using NumPy. GRADE scores evidence strength for bent function claims.

Synthesize & Write

Synthesis Agent detects gaps in correlation immunity constructions via contradiction flagging across Carlet (2010) and Courtois (2002), then Writing Agent uses latexEditText for proofs, latexSyncCitations for 10+ references, and latexCompile for camera-ready sections with exportMermaid for attack flowcharts.

Use Cases

"Compute nonlinearity of this Boolean function f(x0,x1,x2) = x0 xor (x1 and x2) for crypto use"

Research Agent → searchPapers → Analysis Agent → runPythonAnalysis (NumPy Walsh transform) → nonlinearity value 4/8 with GRADE verification.

"Write LaTeX proof of bent property for Maiorana-McFarland construction"

Synthesis Agent → gap detection → Writing Agent → latexEditText + latexSyncCitations (Carlet 2010) + latexCompile → PDF with theorem environments.

"Find GitHub repos implementing S-box optimization from Webster Tavares"

Research Agent → paperExtractUrls (Webster 2007) → Code Discovery → paperFindGithubRepo → githubRepoInspect → list of 5 repos with heuristic code.

Automated Workflows

Deep Research workflow scans 50+ papers via citationGraph from Carlet (2010), producing structured report on nonlinearity trends with GRADE tables. DeepScan applies 7-step CoVe to verify correlation attack claims in Meier (1989) against modern constructions. Theorizer generates new immunity criteria hypotheses from Carlet and Courtois patterns.

Frequently Asked Questions

What defines a bent Boolean function?

A bent function achieves maximum nonlinearity of 2^{n-1} for even n, with flat Walsh spectrum (Carlet, 2010). Used in stream ciphers for perfect nonlinear generators.

What are main construction methods?

Maiorana-McFarland and Dillon constructions build bent functions; indirect methods sum perfect nonlinear functions (Carlet, 2010). S-boxes use heuristic optimization balancing criteria (Webster and Tavares, 2007).

Which are key papers?

Carlet (2010; 850 citations) surveys properties; Webster and Tavares (2007; 705 citations) detail S-box design; Meier and Staffelbach (1989; 477 citations) analyze correlation attacks.

What open problems exist?

Optimal correlation immunity order for given nonlinearity in high dimensions; constructions resisting algebraic attacks beyond XL (Courtois and Pieprzyk, 2002; Carlet, 2010).

Research Coding theory and cryptography with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Boolean Functions in Cryptography with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers