{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:29:57Z","timestamp":1765232997713},"reference-count":27,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p xml:lang=\"fr\">&lt;p style='text-indent:20px;'&gt;The concept of the signal-to-noise ratio (SNR) as a useful measure indicator of the robustness of &lt;inline-formula&gt;&lt;tex-math id=\"M1\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions &lt;inline-formula&gt;&lt;tex-math id=\"M2\"&gt;\\begin{document}$ F = (f_1, \\ldots, f_m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt; (cryptographic S-boxes) against differential power analysis (DPA), has received extensive attention during the previous decade. In this paper, we give an upper bound on the SNR of balanced &lt;inline-formula&gt;&lt;tex-math id=\"M3\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions, and a clear upper bound regarding unbalanced &lt;inline-formula&gt;&lt;tex-math id=\"M4\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions. Moreover, we derive some deep relationships between the SNR of &lt;inline-formula&gt;&lt;tex-math id=\"M5\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions and three other cryptographic parameters (the maximum value of the absolute value of the Walsh transform, the sum-of-squares indicator, and the nonlinearity of its coordinates), respectively. In particular, we give a trade-off between the SNR and the refined transparency order of &lt;inline-formula&gt;&lt;tex-math id=\"M6\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions. Finally, we prove that the SNR of &lt;inline-formula&gt;&lt;tex-math id=\"M7\"&gt;\\begin{document}$ (n, m) $\\end{document}&lt;\/tex-math&gt;&lt;\/inline-formula&gt;-functions is not affine invariant, and data experiments verify this result.&lt;\/p&gt;<\/jats:p>","DOI":"10.3934\/amc.2020117","type":"journal-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T09:27:30Z","timestamp":1605864450000},"page":"413","source":"Crossref","is-referenced-by-count":3,"title":["A note on the Signal-to-noise ratio of $ (n, m) $-functions"],"prefix":"10.3934","volume":"16","author":[{"given":"Yu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xinfeng","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yongzhuang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Fengrong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2020117-1","doi-asserted-by":"publisher","unstructured":"S. Banik, A. Bogdanov and T. Isobe, et al., Midori: A block cipher for low energy, in <i>Advances in Cryptology - ASIACRYPT 2015. Part II<\/i>, Lecture Notes in Comput. Sci., 9453, Springer, Heidelberg, 2015,411\u2013436.","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"key-10.3934\/amc.2020117-2","doi-asserted-by":"publisher","unstructured":"S. Banik, S. K. Pandey and T. Peyrin, et al., GIFT: A small present - Towards reaching the limit of lightweight encryption, in <i>Cryptographic Hardware and Embedded Systems<\/i>, Lecture Notes in Computer Science, 10529, Springer, Cham, 2017,321\u2013345.","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"key-10.3934\/amc.2020117-3","doi-asserted-by":"publisher","unstructured":"C. Beierle, J. Jean and S. K\u00f6lbl, et al., The SKINNY family of block ciphers and its low-latency variant MANTIS, in <i>Advances in Cryptology - CRYPTO 2016. Part II<\/i>, Lecture Notes in Comput. Sci., 9815, Springer, Berlin, 2016,123\u2013153.","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"key-10.3934\/amc.2020117-4","doi-asserted-by":"publisher","unstructured":"A. Bogdanov, L. R. Knudsen and G. Leander, et al., PRESENT: An ultra-lightweight block cipher, in <i>Cryptographic Hardware and Embedded Systems - CHES 2007<\/i>, Lecture Notes in Comput. Sci., 4727, Springer, 2007,450\u2013466.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"key-10.3934\/amc.2020117-5","unstructured":"C. D. Canni\u00e8re, <i>Analysis and Design of Symmetric Encryption Algorithms<\/i>, Ph.D thesis, Katholieke Universiteit Leuven, 2007."},{"key":"key-10.3934\/amc.2020117-6","doi-asserted-by":"publisher","unstructured":"C. Carlet, Boolean functions for cryptography and error-correcting codes, in <i>Boolean Models\nand Methods in Mathematics, Computer Science, and Engineering<\/i>, Cambridge University\nPress, 2010,257-397.","DOI":"10.1017\/CBO9780511780448.011"},{"key":"key-10.3934\/amc.2020117-7","doi-asserted-by":"publisher","unstructured":"C. Carlet, Vectorial Boolean functions for cryptography, in <i>Boolean Models and Methods in\nMathematics, Computer Science, and Engineering<\/i>, Cambridge University Press, 2010,398-470.","DOI":"10.1017\/CBO9780511780448.012"},{"key":"key-10.3934\/amc.2020117-8","doi-asserted-by":"publisher","unstructured":"K. Chakraborty, S. Sarkar, S. Maitra.Redefining the transparency order, <i>Des. Codes Cryptogr.<\/i>, <b>82<\/b> (2017), 95-115.","DOI":"10.1007\/s10623-016-0250-3"},{"key":"key-10.3934\/amc.2020117-9","doi-asserted-by":"publisher","unstructured":"Y. Fei, Q. Luo and A. A. Ding, A statistical model for DPA with novel algorithmic confusion analysis, in <i>Cryptographic Hardware and Embedded Systems - CHES 2012<\/i>, Lecture Notes in Computer Science, 7428, Springer, 2012,233\u2013250.","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"key-10.3934\/amc.2020117-10","doi-asserted-by":"publisher","unstructured":"W. Fischer, B. M. Gammel, O. Kniffler and J. Velten, Differential power analysis of stream ciphers, in <i>Topics in Cryptology - CT-RSA 2007<\/i>, Lecture Notes in Comput. Sci., 4377, Springer, Berlin, 2006,257\u2013270.","DOI":"10.1007\/11967668_17"},{"key":"key-10.3934\/amc.2020117-11","doi-asserted-by":"publisher","unstructured":"S. Guilley, P. Hoogvorst and R. Pacalet, Differential power analysis model and some results, in <i>Smart Card Research and Advanced Applications VI<\/i>, IFIP International Federation for Information Processing, 153, Springer, Boston, MA, 2004,127\u2013142.","DOI":"10.1007\/1-4020-8147-2_9"},{"key":"key-10.3934\/amc.2020117-12","doi-asserted-by":"publisher","unstructured":"A. Heuser, O. Rioul and S. Guilley, A theoretical study of Kolmogorov-Smirnov distinguishers - Side-channel analysis vs. differential cryptanalysis, in <i>Constructive Side-Channel Analysis and Secure Design<\/i>, Lecture Notes in Comput. Sci., 8622, Springer, 2014, 9\u201328.","DOI":"10.1007\/978-3-319-10175-0_2"},{"key":"key-10.3934\/amc.2020117-13","doi-asserted-by":"publisher","unstructured":"P. Kocher, J. Jaffe and B. Jun, Differential power analysis, in <i>Advances in Cryptology - CRYPTO'99<\/i>, Lecture Notes in Comput. Sci., 1666, Springer, 1999,388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"key-10.3934\/amc.2020117-14","doi-asserted-by":"publisher","unstructured":"G. Leander and A. Poschmann, On the classification of 4 bit S-boxes, in <i>Arithmetic of Finite Fields<\/i>, Lecture Notes in Comput. Sci., 4547, Springer, Berlin, 2007,159\u2013176.","DOI":"10.1007\/978-3-540-73074-3_13"},{"key":"key-10.3934\/amc.2020117-15","doi-asserted-by":"publisher","unstructured":"E. Pasalic, S. Maitra, T. Johansson and P. Sarkar, New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity, in <i>International Workshop on Coding and Cryptography<\/i>, Electron. Notes Discrete Math., 6, Elsevier Sci. B. V., Amsterdam, 2001, 10pp.","DOI":"10.1016\/S1571-0653(04)00167-2"},{"key":"key-10.3934\/amc.2020117-16","doi-asserted-by":"publisher","unstructured":"E. Prouff, DPA attacks and S-Boxes, in <i>Fast Software Encryption<\/i>, Lecture Notes in Comput. Sci., 3557, Springer, 2005,424\u2013441.","DOI":"10.1007\/11502760_29"},{"key":"key-10.3934\/amc.2020117-17","doi-asserted-by":"publisher","unstructured":"P. Sarkar and S. Maitra, Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes, <i>Theory Comput. Syst.<\/i>, <b>35<\/b> (2002), 39\u201357.","DOI":"10.1007\/s00224-001-1019-1"},{"key":"key-10.3934\/amc.2020117-18","doi-asserted-by":"publisher","unstructured":"K. Shibutani, T. Isobe and H. Hiwatari, et al., Piccolo: An ultra-lightweight blockcipher, in <i>Cryptographic Hardware and Embedded Systems - CHES 2011<\/i>, Lecture Notes in Comput. Sci., 6917, Springer, 2011,342\u2013357.","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"key-10.3934\/amc.2020117-19","doi-asserted-by":"publisher","unstructured":"M. A. Simplicio Jr., P. D. F. F. S. Barbuda and P. S. L. M. Barreto, et al., The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme, <i>Security Comm. Networks<\/i>, <b>2<\/b> (2009), 165\u2013180.","DOI":"10.1002\/sec.66"},{"key":"key-10.3934\/amc.2020117-20","doi-asserted-by":"publisher","unstructured":"J. J. Son, J. I. Lim, S. Chee and S. H. Sung, Global avalanche characteristics and nonlinearity of balanced Boolean function, <i>Inform. Process. Lett.<\/i>, <b>65<\/b> (1998), 139\u2013144.","DOI":"10.1016\/S0020-0190(98)00009-X"},{"key":"key-10.3934\/amc.2020117-21","doi-asserted-by":"publisher","unstructured":"Q. Wang and P. St\u0103nic\u0103, Transparency order for Boolean functions: Analysis and construction, <i>Des. Codes Cryptogr.<\/i>, <b>87<\/b> (2019), 2043\u20132059.","DOI":"10.1007\/s10623-019-00604-1"},{"key":"key-10.3934\/amc.2020117-22","doi-asserted-by":"publisher","unstructured":"W. Wu and L. Zhang, LBlock: A lightweight block cipher, in <i>Applied Cryptography and Network Security<\/i>, Lecture Notes in Comput. Sci., 6715, Springer, 2011,327\u2013344.","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"key-10.3934\/amc.2020117-23","doi-asserted-by":"publisher","unstructured":"X.-M. Zhang and Y. Zheng, GAC\u2013The criterion for global avalanche characteristics of cryptographic functions, <i>J.UCS<\/i>, <b>1<\/b> (1995), 320\u2013337.","DOI":"10.1007\/978-3-642-80350-5_30"},{"key":"key-10.3934\/amc.2020117-24","doi-asserted-by":"publisher","unstructured":"Y. Zheng and X.-M. Zhang, On plateaued functions, <i>IEEE Trans. Inform. Theory<\/i>, <b>47<\/b> (2001), 1215\u20131223.","DOI":"10.1109\/18.915690"},{"key":"key-10.3934\/amc.2020117-25","doi-asserted-by":"publisher","unstructured":"Y. Zhou, L. Wang, W. Wang, X. Dong and X. Du, One sufficient and necessary condition on balanced Boolean functions with $\\sigma_f = 2^2n+2^{n+3}(m\\geq 3)$, <i>Internat. J. Found. Comput. Sci.<\/i>, <b>25<\/b> (2014), 343\u2013353.","DOI":"10.1142\/S0129054114500178"},{"key":"key-10.3934\/amc.2020117-26","doi-asserted-by":"publisher","unstructured":"Y. Zhou, M. Xie and G. Xiao, On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity, <i>Inform. Sci.<\/i>, <b>180<\/b> (2010), 256\u2013265.","DOI":"10.1016\/j.ins.2009.09.012"},{"key":"key-10.3934\/amc.2020117-27","doi-asserted-by":"publisher","unstructured":"Y. Zhou, W. Zhang, S. Zhu and G. Xiao, The global avalanche characteristics of two Boolean functions and algebraic immunity, <i>Int. J. Comput. Math.<\/i>, <b>89<\/b> (2012), 2165\u20132179.","DOI":"10.1080\/00207160.2012.712689"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"http:\/\/aimsciences.org\/\/article\/doi\/10.3934\/amc.2020117?viewType=html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:38:33Z","timestamp":1645789113000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/article\/doi\/10.3934\/amc.2020117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022]]}},"alternative-id":["1930-5346_2022_2_413"],"URL":"https:\/\/doi.org\/10.3934\/amc.2020117","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}