Author:
Djurasevic Marko,Jakobovic Domagoj,Mariot Luca,Picek Stjepan
Abstract
AbstractBoolean functions are mathematical objects used in diverse domains and have been actively researched for several decades already. One domain where Boolean functions play an important role is cryptography. There, the plethora of settings one should consider and cryptographic properties that need to be fulfilled makes the search for new Boolean functions still a very active domain. There are several options to construct appropriate Boolean functions: algebraic constructions, random search, and metaheuristics. In this work, we concentrate on metaheuristic approaches and examine the related works appearing in the last 25 years. To the best of our knowledge, this is the first survey work on this topic. Additionally, we provide a new taxonomy of related works and discuss the results obtained. Finally, we finish this survey with potential future research directions.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference86 articles.
1. Aguirre, H., Okazaki, H., Fuwa, Y.: An evolutionary multiobjective approach to design highly non-linear boolean functions. In Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, GECCO ’07, page 749-756, New York, NY, USA . Association for Computing Machinery (2007)
2. Ashlock, D.: Finding designs with genetic algorithms. In Computational and Constructive Design Theory, pages 49–65. Springer, Boston, MA (1996)
3. Behera, P.K., Gangopadhyay, S.: An improved hybrid genetic algorithm to construct balanced boolean function with optimal cryptographic properties. Evol. Intell. 15(1), 639–653 (2022)
4. Bernasconi, A., Codenotti, B., Vanderkam, J.M.: A characterization of bent functions in terms of strongly regular graphs. IEEE. Trans. Comput. 50(9), 984–985 (2001)
5. Burnett, L., Millan, W., Dawson, E., Clark, A.: Simpler methods for generating better boolean functions with good cryptographic properties. Australas. J. Combin. 29, 231–248 (2004)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献