Bent Functions

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more. Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers

Produk Detail:

  • Author : Natalia Tokareva
  • Publisher : Academic Press
  • Pages : 220 pages
  • ISBN : 0128025557
  • Rating : 4/5 from 21 reviews
CLICK HERE TO GET THIS BOOKBent Functions

Bent Functions

Bent Functions
  • Author : Natalia Tokareva
  • Publisher : Academic Press
  • Release : 24 August 2015
GET THIS BOOKBent Functions

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and

Bent Functions

Bent Functions
  • Author : Sihem Mesnager
  • Publisher : Springer
  • Release : 09 August 2016
GET THIS BOOKBent Functions

This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several results. This book uniquely provides a necessary comprehensive coverage of bent functions.It serves as a useful reference for researchers in discrete mathematics, coding and cryptography. Students and professors in mathematics and computer science will also find the content

Cryptographic Boolean Functions and Applications

Cryptographic Boolean Functions and Applications
  • Author : Thomas W. Cusick,Pantelimon Stanica
  • Publisher : Academic Press
  • Release : 04 March 2009
GET THIS BOOKCryptographic Boolean Functions and Applications

Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles

Boolean Functions in Cryptology and Information Security

Boolean Functions in Cryptology and Information Security
  • Author : Bart Preneel,Oleg A. Logachev
  • Publisher : IOS Press
  • Release : 01 January 2008
GET THIS BOOKBoolean Functions in Cryptology and Information Security

This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of Boolean function theory that are of primary importance for cryptology. These lectures were delivered by leading researchers from many countries and contain both classic and recent results. The second part contains research papers written by graduate and

Construction and Analysis of Cryptographic Functions

Construction and Analysis of Cryptographic Functions
  • Author : Lilya Budaghyan
  • Publisher : Springer
  • Release : 06 January 2015
GET THIS BOOKConstruction and Analysis of Cryptographic Functions

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence

Finite Fields and Applications

Finite Fields and Applications
  • Author : Gary L. Mullen,Daniel Panario,Igor E. Shparlinski
  • Publisher : American Mathematical Soc.
  • Release : 23 July 2021
GET THIS BOOKFinite Fields and Applications

This volume contains the proceedings of the Eighth International Conference on Finite Fields and Applications, held in Melbourne, Australia, July 9-13, 2007. It contains 5 invited survey papers as well as original research articles covering various theoretical and applied areas related to finite fields. Finite fields, and the computational and algorithmic aspects of finite field problems, continue to grow in importance and interest in the mathematical and computer science communities because of their applications in so many diverse areas. In particular, finite

Discrete Geometry and Algebraic Combinatorics

Discrete Geometry and Algebraic Combinatorics
  • Author : Alexander Barg,Oleg R. Musin
  • Publisher : American Mathematical Society
  • Release : 28 August 2014
GET THIS BOOKDiscrete Geometry and Algebraic Combinatorics

This volume contains the proceedings of the AMS Special Session on Discrete Geometry and Algebraic Combinatorics held on January 11, 2013, in San Diego, California. The collection of articles in this volume is devoted to packings of metric spaces and related questions, and contains new results as well as surveys of some areas of discrete geometry. This volume consists of papers on combinatorics of transportation polytopes, including results on the diameter of graphs of such polytopes; the generalized Steiner problem and related

Progress in Applications of Boolean Functions

Progress in Applications of Boolean Functions
  • Author : Tsutomu Sasao,Jon T. Butler
  • Publisher : Morgan & Claypool Publishers
  • Release : 23 July 2021
GET THIS BOOKProgress in Applications of Boolean Functions

This book brings together five topics on the application of Boolean functions. They are 1. Equivalence classes of Boolean functions: The number of n-variable functions is large, even for values as small as n = 6, and there has been much research on classifying functions. There are many classifications, each with their own distinct merit. 2. Boolean functions for cryptography: The process of encrypting/decrypting plain text messages often depends on Boolean functions with specific properties. For example, highly nonlinear functions are valued because

Modern Cryptography

Modern Cryptography
  • Author : Menachem Domb
  • Publisher : BoD – Books on Demand
  • Release : 27 November 2019
GET THIS BOOKModern Cryptography

Cyber security is taking on an important role in information systems and data transmission over public networks. This is due to the widespread use of the Internet for business and social purposes. This increase in use encourages data capturing for malicious purposes. To counteract this, many solutions have been proposed and introduced during the past 80 years, but Cryptography is the most effective tool. Some other tools incorporate complicated and long arithmetic calculations, vast resources consumption, and long execution time, resulting

Combinatorics and Finite Fields

Combinatorics and Finite Fields
  • Author : Kai-Uwe Schmidt,Arne Winterhof
  • Publisher : Walter de Gruyter GmbH & Co KG
  • Release : 08 July 2019
GET THIS BOOKCombinatorics and Finite Fields

Combinatorics and finite fields are of great importance in modern applications such as in the analysis of algorithms, in information and communication theory, and in signal processing and coding theory. This book contains survey articles on topics such as difference sets, polynomials, and pseudorandomness.

Further Improvements in the Boolean Domain

Further Improvements in the Boolean Domain
  • Author : Bernd Steinbach
  • Publisher : Cambridge Scholars Publishing
  • Release : 18 January 2019
GET THIS BOOKFurther Improvements in the Boolean Domain

The amount of digital systems supporting our daily life is increasing continuously. Improved technical facilities for their production have led to growing challenges for engineers and scientists working in the Boolean domain. A Boolean variable can only carry two different Boolean values: FALSE or TRUE (0 or 1), and has the best interference resistance in technical systems. However, a Boolean function exponentially depends on the number of its variables. This exponential complexity is the reason for major problems in the process of

Sequences and Their Applications - SETA 2004

Sequences and Their Applications - SETA 2004
  • Author : Tor Helleseth,Dilip Sarwate,Hong-Yeop Song,Kyeongcheol Yang
  • Publisher : Springer
  • Release : 20 May 2005
GET THIS BOOKSequences and Their Applications - SETA 2004

This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24–28, 2004. The previous two conferences, SETA 1998 and SETA 2001, were held in Singapore and Bergen, Norway, respectively. These conferences are motivated by the many widespread applications of sequences in modern communication systems. These applications include pseudorandom sequences in spread spectrum systems, code-division multiple-access, stream ciphers in cryptography and several connections to coding theory. The Technical Program Committee of

Claudio Moraga: A Passion for Multi-Valued Logic and Soft Computing

Claudio Moraga: A Passion for Multi-Valued Logic and Soft Computing
  • Author : Rudolf Seising,Héctor Allende-Cid
  • Publisher : Springer
  • Release : 20 October 2016
GET THIS BOOKClaudio Moraga: A Passion for Multi-Valued Logic and Soft Computing

The book is an authoritative collection of contributions by leading experts on the topics of fuzzy logic, multi-valued logic and neural network. Originally written as an homage to Claudio Moraga, seen by his colleagues as an example of concentration, discipline and passion for science, the book also represents a timely reference guide for advance students and researchers in the field of soft computing, and multiple-valued logic.