The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed
in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and
access to the full text.
On the second hand, it deals with Ph.D. subjects
currently under investigation. This way, we provide a timely
map of contemporary research in cryptology.
All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.
Julien Bringer (#557)
Topic of his/her doctorate.
Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory
Boolean functions, nonlinearity, Patterson and Wiedemann’s conjecture, Gauss sums, cryptography, RFID, correcting codes, McEliece’s cryptosystem, secure sketch
Year of completion
This thesis mainly focuses on coding theory and boolean functions which are connected with cryptography. Two research's trends are followed: the first part is dedicated to the nonlinearity of boolean functions whereas the second one shows cryptographic applications of objects coming from these theory.
Interested in Patterson and Wiedemann's conjecture, we propose to generalize their construction based on union of orbits under the action of a group from which the determination of the minimum spectral magnitude reduces to two sub-problems that we intensely study: the evaluation of Gauss sums and the estimation of some partial exponential sums. Several conditions and ideas which may help to confirm the conjecture are thus detailed. This work allows us to construct functions with a nonlinearity greater than the asymptotic mean. Moreover, thanks to this technique, we obtain an example of a quadratic spread which is highly nonlinear and close to the Patterson and Wiedemann bound in IS variables.
In the second part, we first turn our attention to the field of lightweight cryptographic protocols. Boolean functions with specific resistance to differential cryptanalysis are introduced in the HB+ protocol to strengthen it against man-in-the-middle attacks. Starting from a second protocol using the idea of background noise, we exploit the link with the wiretap channel theory of Wyncr to show how to increase the security. At last we deal with authentication of noisy data and secure sketches in which a modification of the McEliece's cryptosystem is explained in order to restrict the access to checking functions.