Enes Pasalic

Orcid: 0000-0001-6343-8796

According to our database1, Enes Pasalic authored at least 124 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound.
Des. Codes Cryptogr., March, 2024

Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers.
IEEE Trans. Circuits Syst. I Regul. Pap., January, 2024

Vectorial Negabent Concepts: Similarities, Differences, and Generalizations.
CoRR, 2024

2023
A theoretical analysis of generalized invariants of bijective S-boxes.
Cryptogr. Commun., May, 2023

Vectorial Bent-Negabent Functions - Their Constructions and Bounds.
IEEE Trans. Inf. Theory, April, 2023

A design and flexible assignment of orthogonal binary sequence sets for (QS)-CDMA systems.
Des. Codes Cryptogr., February, 2023

Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model.
IACR Cryptol. ePrint Arch., 2023

Minimal p-ary codes from non-covering permutations.
IACR Cryptol. ePrint Arch., 2023

Explicit infinite families of bent functions outside the completed Maiorana-McFarland class.
Des. Codes Cryptogr., 2023

Bent functions satisfying the dual bent condition and permutations with the A<sub>m</sub> property.
CoRR, 2023

Design and analysis of bent functions using M-subspaces.
CoRR, 2023

2022
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher.
Int. J. Distributed Sens. Networks, 2022

Applications of the indirect sum in the design of several special classes of bent functions outside the completed <i>MM</i> class.
IACR Cryptol. ePrint Arch., 2022

Explicit infinite families of bent functions outside <i>MM</i><sup>#</sup>.
IACR Cryptol. ePrint Arch., 2022

Two secondary constructions of bent functions without initial conditions.
Des. Codes Cryptogr., 2022

Phase orthogonal sequence sets for (QS)CDMA communications.
Des. Codes Cryptogr., 2022

Minimal binary linear codes: a general framework based on bent concatenation.
Des. Codes Cryptogr., 2022

A complete characterization of ${\mathcal {D}}_0 \cap {\mathcal {M}}^\#$ and a general framework for specifying bent functions in <i>C</i> outside <i>M</i><sup>#</sup>.
Des. Codes Cryptogr., 2022

Quadratic almost bent functions - Their partial characterization and design in the spectral domain.
Discret. Appl. Math., 2022

Constructions of (vectorial) bent functions outside the completed Maiorana-McFarland class.
Discret. Appl. Math., 2022

Permutations without linear structures inducing bent functions outside the completed Maiorana-McFarland class.
Cryptogr. Commun., 2022

Constructing new superclasses of bent functions from known ones.
Cryptogr. Commun., 2022

2021
Characterization of Basic 5-Value Spectrum Functions Through Walsh-Hadamard Transform.
IEEE Trans. Inf. Theory, 2021

Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo.
Secur. Commun. Networks, 2021

Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra 2n2<sup>☆</sup>.
Inf. Sci., 2021

Three classes of balanced vectorial semi-bent functions.
Des. Codes Cryptogr., 2021

Wide minimal binary linear codes from the general Maiorana-McFarland class.
Des. Codes Cryptogr., 2021

A new method for secondary constructions of vectorial bent functions.
Des. Codes Cryptogr., 2021

Vectorial bent functions weakly/strongly outside the completed Maiorana-McFarland class.
Discret. Appl. Math., 2021

Proving the conjecture of O'Donnell in certain cases and disproving its general validity.
Discret. Appl. Math., 2021

Several classes of minimal binary linear codes violating the Ashikhmin-Barg bound.
Cryptogr. Commun., 2021

Transparency Order of (n, m)-Functions - Its Further Characterization and Applications.
Proceedings of the Information Security - 24th International Conference, 2021

Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

On Characterization of Transparency Order for (n, m)-functions.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Further study on constructing bent functions outside the completed Maiorana-McFarland class.
IET Inf. Secur., 2020

A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg's bound.
IACR Cryptol. ePrint Arch., 2020

Bent functions stemming from Maiorana-McFarland class being provably outside its completed version.
IACR Cryptol. ePrint Arch., 2020

Cycle structure of generalized and closed loop invariants.
IACR Cryptol. ePrint Arch., 2020

Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound.
IACR Cryptol. ePrint Arch., 2020

Specifying cycles of minimal length for commonly used linear layers in block ciphers.
IACR Cryptol. ePrint Arch., 2020

A general framework for secondary constructions of bent and plateaued functions.
Des. Codes Cryptogr., 2020

Generic constructions of $\mathbb {Z}$-bent functions.
Des. Codes Cryptogr., 2020

Further analysis of bent functions from C and D which are provably outside or inside M#.
Discret. Appl. Math., 2020

Efficient design methods of low-weight correlation-immune functions and revisiting their basic characterization.
Discret. Appl. Math., 2020

2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019

Correction to "Large Sets of Orthogonal Sequences Suitable for Applications in CDMA Systems".
IEEE Trans. Inf. Theory, 2019

Generic Constructions of Five-Valued Spectra Boolean Functions.
IEEE Trans. Inf. Theory, 2019

Designing Plateaued Boolean Functions in Spectral Domain and Their Classification.
IEEE Trans. Inf. Theory, 2019

Design methods for semi-bent functions.
Inf. Process. Lett., 2019

New second-order threshold implementation of AES.
IET Inf. Secur., 2019

Guess and determine cryptanalysis with variable sampling and its applications.
IET Inf. Secur., 2019

Bent functions from nonlinear permutations and conversely.
Cryptogr. Commun., 2019

An iterative method for linear decomposition of index generating functions.
Cryptogr. Commun., 2019

Frobenius linear translators giving rise to new infinite classes of permutations and bent functions.
Cryptogr. Commun., 2019

2018
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.
IACR Trans. Symmetric Cryptol., 2018

Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions.
IEEE Trans. Inf. Theory, 2018

On the Maximum Number of Bent Components of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018

Full Characterization of Generalized Bent Functions as (Semi)-Bent Spaces, Their Dual, and the Gray Image.
IEEE Trans. Inf. Theory, 2018

On derivatives of planar mappings and their connections to complete mappings.
Discret. Appl. Math., 2018

Construction methods for generalized bent functions.
Discret. Appl. Math., 2018

Generic constructions of 5-valued spectra Boolean functions.
CoRR, 2018

2017
Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus.
IEEE Trans. Inf. Theory, 2017

Efficient implementation of generalized Maiorana-McFarland class of cryptographic functions.
J. Cryptogr. Eng., 2017

Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria.
Inf. Sci., 2017

New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.
Inf. Sci., 2017

Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n.
Inf. Sci., 2017

A note on non-splitting Z-bent functions.
Inf. Process. Lett., 2017

Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity.
IET Inf. Secur., 2017

Permutations via linear translators.
Finite Fields Their Appl., 2017

On derivatives of polynomials over finite fields through integration.
Discret. Appl. Math., 2017

An analysis of root functions - A subclass of the Impossible Class of Faulty Functions (ICFF).
Discret. Appl. Math., 2017

Generalized bent functions - sufficient conditions and related constructions.
Adv. Math. Commun., 2017

Bent Functions in C and D Outside the Completed Maiorana-McFarland Class.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
Large Sets of Orthogonal Sequences Suitable for Applications in CDMA Systems.
IEEE Trans. Inf. Theory, 2016

On algebraic properties of S-boxes designed by means of disjoint linear codes.
Int. J. Comput. Math., 2016

A GMM type construction for resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity.
IACR Cryptol. ePrint Arch., 2016

An Analysis of the 풞 Class of Bent Functions.
Fundam. Informaticae, 2016

Infinite classes of vectorial plateaued functions, permutations and complete permutations.
Discret. Appl. Math., 2016

Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling.
CoRR, 2016

2015
Constructions of Bent - Negabent Functions and Their Relation to the Completed Maiorana - McFarland Class.
IEEE Trans. Inf. Theory, 2015

On cross-correlation properties of S-boxes and their design using semi-bent functions.
Secur. Commun. Networks, 2015

Corrigendum to "A note on nonexistence of vectorial bent functions with binomial trace representation in the PS<sup>-</sup> class" [Information Processing Letters 115 (2) (2015) 139-140].
Inf. Process. Lett., 2015

A note on nonexistence of vectorial bent functions with binomial trace representation in the PS<sup>-</sup> class.
Inf. Process. Lett., 2015

An analysis of the C class of bent functions.
IACR Cryptol. ePrint Arch., 2015

Generalized Bent Functions - Some General Construction Methods and Related Necessary and Sufficient Conditions.
Cryptogr. Commun., 2015

2014
Highly Nonlinear Balanced S-Boxes With Good Differential Properties.
IEEE Trans. Inf. Theory, 2014

Generalized Maiorana-McFarland Construction of Resilient Boolean Functions With High Nonlinearity and Good Algebraic Properties.
IEEE Trans. Inf. Theory, 2014

Constructions of Resilient S-Boxes With Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes.
IEEE Trans. Inf. Theory, 2014

Vectorial Hyperbent Trace Functions From the ℙ𝕊<sub>ap</sub> Class - Their Exact Number and Specification.
IEEE Trans. Inf. Theory, 2014

Vectorial Bent Functions From Multiple Terms Trace Functions.
IEEE Trans. Inf. Theory, 2014

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher.
Theor. Comput. Sci., 2014

On generalized bent functions with Dillon's exponents.
Inf. Process. Lett., 2014

Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function.
IACR Cryptol. ePrint Arch., 2014

A note on complete polynomials over finite fields and their applications in cryptography.
Finite Fields Their Appl., 2014

Optimizing the Placement of Tap Positions.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
A Note on Generalized Bent Criteria for Boolean Functions.
IEEE Trans. Inf. Theory, 2013

On the approximation of S-boxes via Maiorana-McFarland functions.
IET Inf. Secur., 2013

Generic related-key and induced chosen IV attacks using the method of key differentiation.
IACR Cryptol. ePrint Arch., 2013

2012
Guess and Determine Attacks on Filter Generators - Revisited.
IEEE Trans. Inf. Theory, 2012

On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces.
IEEE Trans. Inf. Theory, 2012

On multiple output bent functions.
Inf. Process. Lett., 2012

A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation.
Cryptogr. Commun., 2012

Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.
Proceedings of the Advances in Information and Computer Security, 2012

2011
A New Correlation Attack on Nonlinear Combining Generators.
IEEE Trans. Inf. Theory, 2011

2010
Collisions for variants of the BLAKE hash function.
Inf. Process. Lett., 2010

Some results concerning cryptographically significant mappings over GF(2<sup><i>n</i></sup>).
Des. Codes Cryptogr., 2010

2009
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison.
IEEE Trans. Inf. Theory, 2009

On guess and determine cryptanalysis of LFSR-based stream ciphers.
IEEE Trans. Inf. Theory, 2009

2008
Key differentiation attacks on stream ciphers.
IACR Cryptol. ePrint Arch., 2008

On Cryptographically Significant Mappings over GF(2<sup>n</sup>).
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008

Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis.
Proceedings of the Information Security and Cryptology, 2008

2006
Maiorana-McFarland Class: Degree Optimization and Algebraic Properties.
IEEE Trans. Inf. Theory, 2006

A Maiorana-McFarland type construction for resilient Boolean functions on <i>n</i> variables (<i>n</i> even) with nonlinearity >2<sup><i>n</i>-1</sup>-2<sup><i>n</i>/2</sup>+2<sup><i>n</i>/2-2</sup>.
Discret. Appl. Math., 2006

2005
On bent and semi-bent quadratic Boolean functions.
IEEE Trans. Inf. Theory, 2005

Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces.
Des. Codes Cryptogr., 2005

2004
Algebraic Attacks and Decomposition of Boolean Functions.
Proceedings of the Advances in Cryptology, 2004

2003
A construction of resilient functions with high nonlinearity.
IEEE Trans. Inf. Theory, 2003

Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class.
Proceedings of the Cryptography and Coding, 2003

2002
Linear codes in generalized construction of resilient functions with very high nonlinearity.
IEEE Trans. Inf. Theory, 2002

Further constructions of resilient Boolean functions with very high nonlinearity.
IEEE Trans. Inf. Theory, 2002

On Propagation Characteristics of Resilient Functions.
Proceedings of the Selected Areas in Cryptography, 2002

2001
Linear Codes in Constructing Resilient Functions with High Nonlinearity.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptol. ePrint Arch., 2000

1999
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.
Proceedings of the Cryptography and Coding, 1999


  Loading...