10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

20 Chapter 2. On a conjecture about addition modulo 2 k − 12.4.1 General situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352.4.2 Combining variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.4.3 One block: d = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.4.4 A helpful constraint: min i(α i) ≥ B − 1 . . . . . . . . . . . . . . . . . 402.4.5 Analytic study: d = 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 422.4.6 Extremal value: β i = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 452.5 A closed-form expression for f d . . . . . . . . . . . . . . . . . . . . . 472.5.1 Experimental results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482.5.2 Splitting the sum into atomic parts . . . . . . . . . . . . . . . . . . . . 502.5.3 The residual term T d X . . . . . . . . . . . . . . . . . . . . . . . . . . . 532.5.4 A polynomial expression . . . . . . . . . . . . . . . . . . . . . . . . . . 582.5.5 The coefficients a d,n(i 1 ,...,i n). . . . . . . . . . . . . . . . . . . . . . . . . 602.5.6 An additional relation . . . . . . . . . . . . . . . . . . . . . . . . . . . 642.6 Asymptotic behavior: β i → ∞ . . . . . . . . . . . . . . . . . . . . . . 672.6.1 The limit f d (∞, . . . , ∞) . . . . . . . . . . . . . . . . . . . . . . . . . . 672.6.2 The limit f d (1, ∞, . . . , ∞) . . . . . . . . . . . . . . . . . . . . . . . . . 782.7 An inductive approach . . . . . . . . . . . . . . . . . . . . . . . . . . 802.7.1 Overflow and inertia . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802.7.2 Adding 0’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812.7.3 Adding 1’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822.8 Other works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.1 Cusick et al. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.2 Carlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852.8.3 Towards a complete proof . . . . . . . . . . . . . . . . . . . . . . . . . 862.9 Efficient test of the Tu–Deng conjecture . . . . . . . . . . . . . . . 862.9.1 The Tu–Deng algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 862.9.2 Necklaces and Lyndon words . . . . . . . . . . . . . . . . . . . . . . . 882.9.3 Implementation <strong>de</strong>tails . . . . . . . . . . . . . . . . . . . . . . . . . . . 89As was un<strong>de</strong>rlined in the previous chapter, the good cryptographic properties of the Booleanfunctions of the Jin et al. family [142] <strong>de</strong>scribed in Subsection 1.2.5, and more precisely theoptimality of their algebraic immunity, <strong>de</strong>pend on the validity of a combinatorial conjecture. Thepurpose of this chapter, if not to prove that conjecture in its full generality, is at least to give agood insight into its expected validity not only through a thorough theoretical study, but alsoby exposing experimental evi<strong>de</strong>nce. Part of the work presented in this chapter is the result ofcollaborations with Gérard Cohen, Sihem Mesnager and Hugues Randriam and already appearedin different forms [96, 94]. Several preprints [97, 95, 53] including additional results are availableas well.The main approach used in this chapter is that of reformulating the conjecture in terms ofcarries occurring in an addition modulo 2 k − 1. This formalism and the very basic propertiesverified by that quantity are <strong>de</strong>veloped in Section 2.1. Although such an approach may at firstseem quite naive to the rea<strong>de</strong>r, what makes the study of the conjecture seemingly so difficult isprecisely that a suitable algebraic structure to cast upon the problem has yet to be found, sothat only a purely combinatorial point of view is possible as of today.Nevertheless, the point of view adopted <strong>here</strong> provi<strong>de</strong>s already enough information to prove inSection 2.2 that the special case of the conjecture required by the family of Tang, Carlet and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!