Processing math: 100%
JIANG Niu, ZHAO Min, YANG Zhiyao, ZHUO Zepeng, CHEN Guolong. Characterization and Properties of Bent-Negabent Functions[J]. Chinese Journal of Electronics, 2022, 31(4): 786-792. DOI: 10.1049/cje.2021.00.417
Citation: JIANG Niu, ZHAO Min, YANG Zhiyao, ZHUO Zepeng, CHEN Guolong. Characterization and Properties of Bent-Negabent Functions[J]. Chinese Journal of Electronics, 2022, 31(4): 786-792. DOI: 10.1049/cje.2021.00.417

Characterization and Properties of Bent-Negabent Functions

Funds: This work was supported by the Graduate Scientific Research Project of Anhui University (YJS20210464), the Key Research and Development Projects in Anhui Province (202004a05020043), the Natural Science Foundation of Anhui Higher Education Institutions of China (KJ2020ZD008), and the Graduate Innovation Fund of Huaibei Normal University (yc2021022)
More Information
  • Author Bio:

    JIANG Niu: is a graduate in the School of Mathematical Sciences, Huaibei Normal University. Her research interests include cryptography and information theory. (Email: 1401471403@qq.com)

    ZHUO Zepeng: (corresponding author) received the M.S. degree from Huaibei Normal University in 2007, and the Ph.D. degree from Xidian University in 2012. Since 2002, he has been with the School of Mathematical Science, Huaibei Normal University, where he is now a Professor. His research interests include cryptography and information theory. (Email: zzp781021@sohu.com)

  • Received Date: November 27, 2021
  • Accepted Date: March 20, 2022
  • Available Online: June 15, 2022
  • Published Date: July 04, 2022
  • A further characterization of the bent-negabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to be bent-negabent. A new characterization of negabent functions can be described by using the parity of Hamming weight. We further generalize the classical convolution theorem and give the nega-Hadamard transform of the composition of a Boolean function and a vectorial Boolean function. The nega-Hadamard transform of a generalized indirect sum is calculated by this composition method.
  • Throughout this paper, Fn2 be the n-dimensional vector space over the field F2 with two elements, F2n be the finite field consisting 2n elements. Let Bn be the set of all n-variable Boolean functions. The set of integers, real numbers, and complex numbers are denoted by Z, R, and C, respectively. If z=r+tiC, then |z|=r2+t2 denotes the absolute value of z, and ˉz=rti denotes the complex conjugate of z, where i2=1, r,tR. Let Vn denote a vector space of dimension n over F2, we identify Vn by Fn2 or F2n. Let , denote the inner product on Vn, then for any a,xVn

    a,x={ax,whenVn=Fn2Trn1(ax),whenVn=F2n

    where ax=a1x1++anxn, Trn1(ax) denotes the absolute trace of axF2n. For any positive integer k|n, the trace function from F2n to F2k is the mapping defined as

    Trnk(x)=nk1i=0x2ik=x+x2k+x22k++x2n1,xF2n

    Boolean bent functions were introduced by Rothaus in 1976[1], which play an important role in both symmetric cryptography and error-correcting codes. An n-variable Boolean function from Vn to F2 is bent if it has maximal Hamming distance to the set of affine Boolean functions (this maximum distance is the nonlinearity[2]). The Walsh-Hadamard transform of fBn at aVn is defined as

    Wf(a)=2n2xVn(1)f(x)+a,x

    It is a powerful tool for analyzing Boolean functions. A function fBn is bent only if |Wf(a)|=1 for all aVn, therefore bent functions only exist for n even.

    In Ref.[3], the concept of a bent function is extended to some generalized bent criteria for a Boolean function by analyzing Boolean functions that have flat spectrum with respect to one or more transforms from a specified set of unitary transforms.The transforms chosen by Riera and Parker are n-fold tensor products of the identity matrix, the Walsh-Hadamard matrix and the nega-Hadamard matrix, respectively:

    I=(1001),H=(1111),N=(1i1i)

    The Walsh-Hadamard transform can be described as the tensor product of several H’s, similarly, if the transform can be represented by the tensor product of several N’s, it is called the nega-Hadamard transform. The Walsh-Hadamard transform is an example of a unitary transformation on the space of all Boolean functions. The nega-Hadamard transform of f(x) at aVn is the complex valued function

    Nf(a)=2n2xVn(1)f(x)+s(x)i1n,x(1)a,x

    where 1n=(1,1,,1), and

    s(x)={σ2(x)=0i<jn1x2ix2j,ifxF2ns2(x)=1i<jnxixj,ifxFn2

    which is a generalization of Walsh-Hadamard transform. A function fBn is negabent only if |Nf(a)|=1 for all aVn. Unlike bent functions, the negabent functions exist for both even and odd variables. In particular, a negabent function is called bent-negabent if it is also a bent function.

    The nega-Hadamard transform is also a powerful tool for analyzing Boolean functions. Recently, some interesting topic focus on the construction methods and characterizations for (bent-) negabent functions[4-9]. In Ref.[10], Sarkar presented a necessary and sufficient condition such that the quadratic monomial

    f(x)=Trn1(λx2k+1) (1)

    is bent-negabent. In Ref.[11], Huang et al. further proposed the quadratic polynomial form and proved that the quadratic polynomial

    f(x)=n21i=1Trn1(cix2i+1)+Trn21(cn2x2n2+1) (2)

    where ciF2n for 1in21 and cn2F2n2 is bent if and only if Lf(x)=n21i=1(cix2i+c2niix2ni)+cn2x2n2 is a linearized permutation polynomial, that is, Lf(x)=0 only has a solution 0.

    Inspired by Refs.[10, 11], our first contribution is to provide the necessary and sufficient condition such that the quadratic polynomial f defined by Eq.(2) is bent-negabent. From this result, the bent-negabentness of quadratic Boolean functions depends on the corresponding complete mapping polynomial. Our second contribution is to provide a new efficient characterization of negabent functions by using the parity of Hamming weight. This characterization provides a new method for the study of negabent functions.

    In addition, Gupt et al.[12] presented a generalization of the convolution theorem for two n-variable Boolean functions, and the Walsh-Hadamard transform of composition of a Boolean function and a vectorial Boolean function from the convolution was provided. Then our third contribution is to present the generalized nega-convolution theorem. Furthermore, we provide the nega-Hadamard transform of composition of a Boolean function and a vectorial Boolean function. By this method, the nega-Hadamard transform of a class of generalized Carlet’s construction is calculated.

    The rest of this paper is organized as follows. Section Ⅱ, we give a necessary and sufficient condition such that the quadratic Boolean function defined as Eq.(2) is bent-negabent. Section Ⅲ, we first present a new characterization of negabent functions. Further, a generalized nega-convolution theorem and the composition nega-Hadamard transform are presented and the nega-Hadamard transform of a class of generalized Carlet’s construction is calculated. Section Ⅳ gives some conclusions.

    In this section, we will give a necessary and sufficient condition for a class of quadratic Boolean functions to be bent-negabent. First of all, let us recall a characterization of bent-negabent functions as follows.

    Lemma 1[10] The function f:F2nF2 is negabent if and only if

    xF2n(1)f(x)+f(x+a)+Trn1(ax)=0,forallaF2n (3)

    It is known that the function f:F2nF2 is bent if and only if

    xF2n(1)f(x)+f(x+a)=0,forallaF2n (4)

    A function for which both Eqs.(3) and (4) hold is a bent-negabent function.

    Similar to the method proposed in Ref.[11], we prove that the function f defined in Eq.(2) is a negabent function.

    Theorem 1 Let f be the same those in Eq.(2). Then f is negabent if and only if

    L(a)=a+n21i=1cia2i+c2niia2ni+cn2a2n2,forallaF2n

    is a linearized permutation polynomial, that is, L(a)=0 only has a solution 0.

    Proof Since Trnn2() is a surjective mapping from F2n to F2n2, there exists cn2F2n satisfying cn2=Trnn2(cn2)=cn2+cn2n2. For f defined as in Eq.(2), we only need to prove that for all aF2n

    xF2n(1)n21i=1Trn1(cix2i+1)+Trn1(cn2x2n2+1)×(1)n21i=1Trn1(ci(x+a)2i+1)+Trn1(cn2(x+a)2n2+1)+Trn1(ax)=0

    from Lemma 1. For simplicity, we denote

    h(x)=n21i=1Trn1(cix2i+1)+Trn1(cn2x2n2+1)+n21i=1Trn1(ci(x+a)2i+1)+Trn1(cn2(x+a)2n2+1)+Trn1(ax)

    It follows from the properties of trace functions that

    h(x)=Trn1(n21i=1cix2i+1+cn2x2n2+1+n21i=1ci(x+a)2i+1+cn2(x+a)2n2+1+ax)=Trn1(n21i=1(cia2i+c2niia2ni+cn2a2n2+a)x+n21i=1cia2i+1+cn2a2n2+1)

    Then one can easily see that

    xF2n(1)Trn1(n21i=1(cia2i+c2niia2ni+cn2a2n2+a)x)×(1)Trn1(n21i=1cia2i+1+cn2a2n2+1)=0

    hold if and only if n21i=1(cia2i+c2niia2ni)+cn2a2n2+a0 for all aF2n. It means that for such ciF2n and cn2F2n2, the polynomial

    L(a)=a+n21i=1(cia2i+c2niia2ni)+cn2a2n2

    has no nonzero root in F2n. Note that L(a) is a linearized polynomial and linearized polynomial is permutation if it has no nonzero root. The proof is then completed.

    From Theorem 1, we have the following result immediately.

    Theorem 2 Let f be as in Eq.(2). Then f is bent-negabent if and only if

    Lf(a)=n21i=1(cia2i+c2niia2ni)+cn2a2n2

    is a complete mapping polynomial.

    Proof From the proof of Theorem 1, we denote L(a) as

    L(a)=a+n21i=1(cia2i+c2niia2ni)+cn2a2n2=a+Lf(a)

    From the result in Ref.[11] we know that Lf(a) is a linearized permutation polynomial and Theorem 1 indicates that L(a) is also a linearized permutation polynomial. Thus, Lf(a) is a complete mapping polynomial from the definition of complete mapping polynomial[13]. The proof is thus finished.

    In this section, we present the characterization of negabent functions, by dividing the vector xFn2 into the even weight En and the odd weight On. Firstly, we will employ Jacobi’s two-square theorem as a lemma, which will be used to the proof of Theorem 3.

    Lemma 2 Let n be a non-negative integer. Then the integer solutions of the Diophantine equation R2+I2=2n are:

    1) If n is even, (R,I)=(0,±2n2) or (±2n2,0);

    2) If n is odd, (R,I)=(±2n12,±2n12).

    In the following, we give a new characterization of negabent functions.

    Theorem 3 Let En and On be the set of vectors of even weight and odd weight over Fn2, respectively. Then the Boolean function fBn is negabent if and only if

    (Xe,Xo)={(0,±2n2)or(±2n2,0),ifniseven(±2n12,±2n12),ifnisodd

    where

    Xe=xEn(1)f(x)+s2(x)+ax,Xo=xOn(1)f(x)+s2(x)+ax

    Proof By dividing the vector xFn2, we have the even weight vectors set En and the odd weight vectors set On. We denote

    Xe=xEn(1)f(x)+s2(x)+axXo=xOn(1)f(x)+s2(x)+ax

    The nega-Hadamard transform of fBn at aFn2 can be represented as

    Nf(a)=2n2xFn2(1)f(x)+s2(x)+axi1nx=2n2(Xe+iXo) (5)

    where 1nx=x1+x2++xn{0,1}.

    It follows from Eq.(5) that fBn is negabent if and only if X2e+X2o=2n. By using Lemma 2, if n is even, we have

    (Xe,Xo)=(0,±2n2)or(±2n2,0)

    and if n is odd, we have (Xe,Xo)=(±2n12,±2n12). The theorem follows.

    By Theorem 3, we reprove the Lemma 1 of Ref.[14] by a simpler method.

    Proposition 1 Let fBn. The relation between the nega-Hadamard transform of f and the Walsh-Hadamard transform of f can be described as

    Nf(a)=Wf+s2(a)+Wf+s2(¯a)2+iWf+s2(a)Wf+s2(¯a)2

    Proof Let a=(a1,,an)Fn2. Then ¯a=a+1n denotes the bitwise complement of a. Thus, the nega-Hadamard transform of f at aFn2 is

    Nf(a)=2n2xFn2(1)f(x)+s2(x)+axi1nx=2n2(Xe+iXo)=2n2[(Xe+Xo)+(XeXo)2+i(Xe+Xo)(XeXo)2]=Wf+s2(a)+Wf+s2(¯a)2+iWf+s2(a)Wf+s2(¯a)2

    The proposition follows.

    In the following, we further describe the generalized nega-convolution theorem. Let hBn be a n-variable Boolean function and satisfy h(x)=f(x)+g(x), where f,gBn. Then the Walsh-convolution transform of function h is given by

    Wh(u)=2n2vFn2Wf(v)Wg(u+v)

    A general result of Walsh-convolution transform theorem has been given in Ref.[12].

    Inspired by Ref.[12], we have the following theorem.

    Theorem 4 Let f1(x),,fk(x)Bn and h(x)=f1(x)++fk(x). Then the generalized nega-convolution of h at uFn2 is given by

    Nh(u)=2m2vFm2Nf1(v1)ki=2Wfi(vi+vi1) (6)

    where m=(k1)n, v=(v1,,vk1), vk=u with each viFn2. In particular, if k=2, then Nh(u)= 2n2vFn2Nf(v)Wg(u+v).

    Proof We show Eq.(6) by inducting on k. For k=2, the result is obvious. Assume that result holds for k12. We now apply the nega-convolution theorem on the fk(x) and f(x)=f1(x)++fk1(x). We obtain

    Nh(u)=2n2vk1Fn2Nf(vk1)Wfk(u+vk1)=2n2vk1Fn2Nf(vk1)Wfk(vk+vk1)

    Now we invoke the induction hypothesis for k1 on the function f to get

    Nh(u)=2n2vk1Fn2Wfk(u+vk1)×(2(k2)n2(v1,,vk1)Fm12Nf1(v1)k1i=2Wfi(vi+vi1))=2m2vFm2Nf1(v1)ki=2Wfi(vi+vi1)

    The theorem follows.

    The mappings from Fn2 to Fm2 are called (n,m)-functions (or vectorial functions), where n,mZ+. Let G:Fn2Fm2 be a vectorial Boolean function and K:Fm2F2 be an m-variable Boolean function defined by (KG)(x)=K(G(x)). Now we provide the nega-Hadamard transform of composition of a Boolean function and a vectorial Boolean function.

    Theorem 5 Let G:Fn2Fm2 and K:Fm2F2. Then the generalized composition theorem of G and K at any uFn2,vFm2 is given by

    NKG(u)=2m2vFm2WK(v)NLvG(u) (7)

    where Lv(x)=vx is a linear function and (LvG)(x)=vG(x).

    Proof It follows from the inverse Walsh-Hadamard transform that

    (1)K(x)=2m2vFm2WK(v)(1)vx

    Let y=G(x). Then

    (1)(KG)(x)=(1)K(G(x))=(1)K(y)=2m2vFm2WK(v)(1)vy=2m2vFm2WK(v)(1)vG(x)=2m2vFm2WK(v)(1)(LvG)(x)

    Therefore

    N(KG)(u)=2n2xFn2(1)(KG)(x)+uxiwt(x)=2n2xFn22m2vFm2WK(v)(1)(LvG)(x)+uxiwt(x)=2m2vFm2WK(v)2n2xFn2(1)(LvG)(x)+uxiwt(x)=2m2vFm2WK(v)NLvG(u)

    The theorem follows.

    Theorem 5 provides a new method to derive the nega-Hadamard transform of secondary construction.

    In the following, we present the nega-Hadamard transform of the Boolean function h(x,y)=f(x)g(y) by using the generalized composition method of Theorem 5. Also, in order to prove Theorem 6, we shall make use of the following lemma.

    Lemma 3[15] For any uFn2, we have

    xFn2(1)uxiwt(x)=2n2ωniwt(u)

    where ω=12(1+i) is a 8th primitive root of unity.

    Theorem 6 If f(x)Bn, g(y)Bm and h(x,y)=f(x)g(y), then the nega-Hadamard transform of h at uFn2, vFm2 is given by

    Nh(u,v)=12(ωn+miwt(u)wt(v)+ωniwt(u)Ng(v)+ωmiwt(v)Nf(u)Nf(u)Ng(v)) (8)

    where ω=12(1+i) is a primitive 8th root of unity.

    Proof Let K(x1,x2)=x1x2. Then WK=±1 and its support is F22. Since G=K(f,g), according to Eq.(7) of Theorem 5 and Lemma 3, we have

    Nh(u,v)=12xF22WK(v)Nv1f+v2g(u,v)=12(N0(u,v)+Ng(u,v)+Nf(u,v)Nf(u)Ng(v))=12(ωn+miwt(u)wt(v)+ωniwt(u)Ng(v)+ωmiwt(v)Nf(u)Nf(u)Ng(v))

    The theorem follows.

    Remark 2 In Ref.[8], with the same notation as in Theorem 6, it is proved that

    Nh(u,v)=2m2(Nf(u)Ag1(v)+ωniwt(u)Ag0(v)) (9)

    where Ag1(v)+Ag0(v)=2m2ωmiwt(v), Ag0(v)= y,g(y)=0(1)yviwt(y), Ag1(v)=y,g(y)=1(1)yviwt(y). Now, we further evaluate Ag0(v), Ag1(v) from Lemma 3 as follows

    Ag0(v)=yFm2,g(y)=0(1)yviwt(y)=yFm2(1)yviwt(y)1+(1)g(y)2=12(yFm2(1)yviwt(y)+yFm2(1)g(y)+yviwt(y))=2m21ωmiwt(v)+2m21Ng(v)
    Ag1(v)=yFm2,g(y)=1(1)yviwt(y)=yFm2(1)yviwt(y)1(1)g(y)2=12(yFm2(1)yviwt(y)yFm2(1)g(y)yviwt(y))=2m21ωmiwt(v)2m21Ng(v)

    Thus, the right of Eq.(9) can be rewritten as

    Nh(u,v)=2m2(Nf(u)Ag1(v)+ωniwt(u)Ag0(v))=2m2Nf(u)(2m21ωmiwt(v)2m21Ng(v))+ωniwt(u)(2m21ωmiwt(v)+2m21Ng(v))=12(ωn+miwt(u)wt(v)+ωniwt(u)Ng(v)+ωmiwt(v)Nf(u)Nf(u)Ng(v))

    It means that the result in Eq.(9) is equal to Eq.(8).

    The secondary construction is an efficient way to generate more Boolean (or bent) functions[1, 16, 17]. An important secondary construction of bent functions is the classical Carlet’s construction (or called the indirect sum)[16] which defined as

    h(x,y)=f1(x)+g1(y)+(f1+f2)(x)(g1+g2)(y)

    and a class of the generalized indirect sum defined as

    h(x,y)=f1(x)+g1(y)+(f1+f2)(x)(g1+g2)(y)+(f2+f3)(x)(g2+g3)(y) (10)

    which was introduced by Ref.[17]. In the following, based on the generalized composition theorem, the nega-Hadamard transform of this generalized indirect sum can be obtained easily.

    Theorem 7 Let f1,f2,f3Bn and g1,g2,g3Bm. Let function h(x,y)Bn+m be defined as in Eq.(10). Then the nega-Hadamard transform of h(x,y) at any (u,v)Fn2×Fm2 is given by

    Nh(u,v)=14Ng1(v)(Nf1(u)+Nf2(u)+Nf3(u)+Nf1+f2+f3(u))+14Ng2(v)(Nf1(u)Nf2(u)Nf3(u)+Nf1+f2+f3(u))+14Ng3(v)(Nf1(u)Nf2(u)+Nf3(u)Nf1+f2+f3(u))+14Ng1+g2+g3(v)(Nf1(u)+Nf2(u)Nf3(u)Nf1+f2+f3(u))

    Proof Let

    K(x1,x2,x3,x4)=x1+x4+(x1+x2)(x4+x5)+(x2+x3)(x5+x6)

    Then we have G=K(f1,f2,f3,g1,g2,g3). By the straight computation, we present the nonzero Walsh-Hadamard transforms of K is

    WK(100100)=WK(010100)=WK(001100)=WK(111100)=WK(100010)=WK(111010)=WK(100001)=WK(001001)=WK(100111)=WK(010111)=2,WK(010010)=WK(001010)=WK(010001)=WK(111001)=WK(001111)=WK(111111)=2

    From Eq.(7) of Theorem 5, we can obtain

    Nh(u,v)=18vF62WK(v)Nv1f1+v2f2+v3f3+v4g1+v5g2+v6g3(u,v)=18(2Nf1+g1(u,v)+2Nf2+g1(u,v)+2Nf3+g1(u,v)+2Nf1+f2+f3+g1(u,v)+2Nf1+g2(u,v)2Nf2+g2(u,v)2Nf3+g2(u,v)+2Nf1+f2+f3+g2(u,v)+2Nf1+g3(u,v)2Nf2+g3(u,v)+2Nf3+g3(u,v)2Nf1+f2+f3+g3(u,v)+2Nf1+g1+g2+g3(u,v)+2Nf2+g1+g2+g3(u,v)2Nf3+g1+g2+g3(u,v)2Nf1+f2+f3+g1+g2+g3(u,v))=14Ng1(v)(Nf1(u)+Nf2(u)+Nf3(u)+Nf1+f2+f3(u))+14Ng2(v)(Nf1(u)Nf2(u)Nf3(u)+Nf1+f2+f3(u))+14Ng3(v)(Nf1(u)Nf2(u)+Nf3(u)Nf1+f2+f3(u))+14Ng1+g2+g3(v)×(Nf1(u)+Nf2(u)Nf3(u)Nf1+f2+f3(u))

    The theorem follows.

    By Theorem 7, a sufficient condition for function h as in Eq.(10) to be negabent can be given.

    Theorem 8 Let n and m be two positive integers. Let f1,f2,f3 and f1+f2+f3 be negabent functions in n variables. Let g1,g2,g3 and g1+g2+g3 be negabent functions in m variables, and if Ng1(v)Ng2(v)=±1, Ng2(v)Ng3(v)=±1, Ng3(v)Ng1(v)=±1, Ng1(v)Ng1+g2+g3(v)=±1, Ng2(v)Ng1+g2+g3(v)=±1, and Ng3(v)Ng1+g2+g3(v)=±1, for all (u,v)Fn2×Fm2. Then the function defined as in Eq.(10) is a negabent function in n+m variables.

    Proof For simplicity, set z=Nh(u,v), z1=Nf1(u), z2=Nf2(u), z3=Nf3(u), z4=Ng1(v), z5=Ng2(v), z6=Ng3(v), z7=Nf1+f2+f3(u), z8=Nf1+f2+f3(v). By Theorem 7, for all (u,v)Fn2×Fm2, we have

    4z=z4(z1+z2+z3+z7)+z5(z1z2z3+z7)+z6(z1z2+z3z7)+z8(z1+z2z3z7) (11)

    and

    4ˉz=ˉz4(ˉz1+ˉz2+ˉz3+ˉz7)+ˉz5(ˉz1ˉz2ˉz3+ˉz7)+ˉz6(ˉz1ˉz2+ˉz3ˉz7)+ˉz8(ˉz1+ˉz2ˉz3ˉz7) (12)

    Combining Eqs.(11) and (12), since |¯z1|=|¯z2|=|¯z3|=|¯z7|=1, |¯z4|=|¯z5|=|¯z6|=|¯z8|=1, and z4z5=±1, z4z6=±1, z4z8=±1, z5z6=±1, z5z8=±1, z6z8=±1, we have 16|z|2=16, which implies that |z|2=1. Therefore, we have |Nh(u,v)|=1, that is the function defined as in Eq.(10) is a negabent function in n+m variables. The theorem follows.

    If f2=f3 or g2=g3 in Theorem 7, the following corollary is obvious.

    Corollary 1 Let the notations be same as in Theorem 7. If f2=f3 or g2=g3, then we have

    Nh(u,v)=12Ng1(v)[Nf1(u)+Nf2(u)]+12Ng2(v)[Nf1(u)Nf2(u)] (13)

    The necessary and sufficient condition that h(x,y) defined in Corollary 1 is bent-negabent has been proposed in Ref.[18].

    In this paper, we have provided a necessary and sufficient condition for a class of quadratic Boolean functions to be bent-negabent, and presented another characterization of negabent functions. Furthermore, we give the generalized nega-convolution theorem, and present the composition nega-Hadamard transform for a Boolean function and a vectorial Boolean function. It would be interesting to study more efficient constructions using this composition method.

  • [1]
    O. S. Rothaus, “On “bent” functions,” Journal of Combinatorial Theory, Series A, vol.20, no.3, pp.300–305, 1976. DOI: 10.1016/0097-3165(76)90024-8
    [2]
    C. Carlet and S. Mesnager, “Four decades of research on bent functions,” Designs, Codes and Cryptography, vol.78, no.1, pp.5–50, 2016. DOI: 10.1007/s10623-015-0145-8
    [3]
    C. Riera and M. G. Parker, “Generalized bent criteria for Boolean functions (I),” IEEE Transactions on Information Theory, vol.52, no.9, pp.4142–4159, 2006. DOI: 10.1109/TIT.2006.880069
    [4]
    P. Stănică, B. Mandal, and S. Maitra, “The connection between quadratic bent-negabent functions and the Kerdock code,” Applicable Algebra in Engineering, Communication and Computing, vol.30, no.5, pp.387–401, 2019. DOI: 10.1007/s00200-019-00380-4
    [5]
    F. Zhang, Y. Wei, and E. Pasalic, “Constructions of bent-Negabent functions and their relation to the completed maiorana—McFarland class,” IEEE Transactions on Information Theory, vol.61, no.3, pp.1496–1506, 2015. DOI: 10.1109/TIT.2015.2393879
    [6]
    Y. Zhou and L. Qu, “Constructions of negabent functions over finite fields,” Cryptography and Communications, vol.9, no.2, pp.165–180, 2017. DOI: 10.1007/s12095-015-0167-0
    [7]
    B. Mandal, S. Maitra, and P. Stănică, “On the existence and non-existence of some classes of bent-negabent functions,” Applicable Algebra in Engineering, Communication and Computing, vol.33, no.3, pp.237–260, 2022. DOI: 10.1007/s00200-020-00444-w
    [8]
    P. Stanica, S. Gangopadhyay, A. Chaturvedi, et al., “Investigations on bent and negabent functions via the nega-hadamard transform,” IEEE Transactions on Information Theory, vol.58, no.6, pp.4064–4072, 2012. DOI: 10.1109/TIT.2012.2186785
    [9]
    M. G. Parker and A. Pott, “On Boolean functions which are bent and negabent,” in Proceedings of the 2007 International Conference on Sequences, Subsequences, and Consequences, Los Angeles, CA, USA, pp.9–23, 2007.
    [10]
    S. Sarkar, “Characterizing negabent Boolean functions over finite fields,” Sequences and Their Applications - SETA 2012, Berlin, Germany, pp.77–88, 2012.
    [11]
    D. Huang, C. Tang, Y. Qi, et al., “New quadratic bent functions in polynomial forms with coefficients in extension fields,” Applicable Algebra in Engineering, Communication and Computing, vol.30, no.4, pp.333–347, 2019. DOI: 10.1007/s00200-018-0376-9
    [12]
    K. C. Gupta and P. Sarkar, “Toward a general correlation theorem,” IEEE Transactions on Information Theory, vol.51, no.9, pp.3297–3302, 2005. DOI: 10.1109/TIT.2005.853326
    [13]
    Y. Yuan, Y. Tong, and H. Zhang, “Complete mapping polynomials over finite field F16,” in Proceedings of the 1st International Workshop on Arithmetic of Finite Fields, Madrid , Spain, pp.147–158, 2007.
    [14]
    W. Su, A. Pott, and X. Tang, “Characterization of negabent functions and construction of bent-negabent functions with maximum algebraic degree,” IEEE Transactions on Information Theory, vol.59, no.6, pp.3387–3395, 2013. DOI: 10.1109/TIT.2013.2245938
    [15]
    K. U. Schmidt, M. G. Parker, and A. Pott. “Negabent functions in the Maiorana–McFarland class.” Sequences and Their Applications-SETA 2008. Springer, Berlin, Heidelberg, pp.390–402, 2008.
    [16]
    C. Carlet, “On the Secondary Constructions of Resilient and Bent Functions,” Coding, Cryptography and Combinatorics, Birkhäuser Verlag, Basel, pp.3–28, 2004.
    [17]
    C. Carlet, F. R. Zhang, Y. P. Hu, et al., “Secondary constructions of bent functions and their enforcement,” Advances in Mathematics of Communications, vol.6, no.3, pp.305–314, 2012. DOI: 10.3934/amc.2012.6.305
    [18]
    S. Mesnager, B. ben Moussat, and Z. P. Zhuo, “Further results on bent-negabent Boolean functions,” Lecture Notes in Electrical Engineering, Springer, Singapore, pp.47–66, 2021.
  • Related Articles

    [1]YANG Zhiyao, KE Pinhui, CHEN Zhixiong. New Secondary Constructions of Generalized Bent Functions[J]. Chinese Journal of Electronics, 2021, 30(6): 1022-1029. DOI: 10.1049/cje.2021.08.003
    [2]SUN Tianfeng, HU Bin. Boolean Functions with Multiple-Valued Walsh Spectra[J]. Chinese Journal of Electronics, 2019, 28(6): 1165-1169. DOI: 10.1049/cje.2019.07.004
    [3]PANG Shanqi, WANG Jing, WANG Xunan, WANG Xiaoli. Application of Orthogonal Array and Walsh Transform in Resilient Function[J]. Chinese Journal of Electronics, 2018, 27(2): 281-286. DOI: 10.1049/cje.2017.09.011
    [4]RAO Yanyi, ZHANG Xianda. The Characterizations of Hyper-Star Graphs Induced by Linearly Separable Boolean Functions[J]. Chinese Journal of Electronics, 2018, 27(1): 19-25. DOI: 10.1049/cje.2017.08.015
    [5]ZHUO Zepeng, CHONG Jinfeng, WEI Shimin. Some Properties of Correlation Function on Generalized Boolean Functions[J]. Chinese Journal of Electronics, 2015, 24(1): 166-169.
    [6]ZHENG Dabin, YU Long, HU Lei. Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic[J]. Chinese Journal of Electronics, 2014, 23(4): 767-772.
    [7]ZHUO Zepeng, CHONG Jinfeng, CAO Hao, XIAO Guozhen. Spectral Analysis of Two Boolean Functions and Their Derivatives[J]. Chinese Journal of Electronics, 2011, 20(4): 747-749.
    [8]JIANG Jie, GUO Baolong, LAI Changcai, MO Wei. Line Prediction and Transform for Intra Coding[J]. Chinese Journal of Electronics, 2011, 20(3): 516-520.
    [9]ZHUO Zepeng, ZHANG Weiguo, GAO Sheng, XIAO Guozhen. On Correlation Properties of Boolean Functions[J]. Chinese Journal of Electronics, 2011, 20(1): 143-146.
    [10]SUN Guanghong, WU Chuankun. Construction of Semi-Bent Boolean Functions in Even Number of Variables[J]. Chinese Journal of Electronics, 2009, 18(2): 231-237.
  • Cited by

    Periodical cited type(3)

    1. Singh, D., Mohanta, B.B., Paul, A. et al. Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform. International Journal of Mathematical, Engineering and Management Sciences, 2024, 9(6): 1382-1393. DOI:10.33889/IJMEMS.2024.9.6.074
    2. Singh, D., Chawla, A., Bhogta, P. et al. A Characterization of Generalized Boolean Functions Employed in CDMA Communications. International Journal of Mathematical, Engineering and Management Sciences, 2024, 9(2): 352-365. DOI:10.33889/IJMEMS.2024.9.2.019
    3. Zhao, H., Li, W., Wei, Y. Construction of Negabent Function Based on Trace Function over Finite Field | [基于迹函数的negabent函数构造]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46(1): 335-343. DOI:10.11999/JEIT230001

    Other cited types(0)

Catalog

    Article Metrics

    Article views (476) PDF downloads (65) Cited by(3)
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return