Bent Functions

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more. Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers

Produk Detail:

  • Author : Natalia Tokareva
  • Publisher : Academic Press
  • Pages : 220 pages
  • ISBN : 0128025557
  • Rating : 4/5 from 21 reviews
CLICK HERE TO GET THIS BOOKBent Functions

Bent Functions

Bent Functions
  • Author : Natalia Tokareva
  • Publisher : Academic Press
  • Release : 24 August 2015
GET THIS BOOKBent Functions

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and

Bent Functions

Bent Functions
  • Author : Sihem Mesnager
  • Publisher : Springer
  • Release : 09 August 2016
GET THIS BOOKBent Functions

This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several results. This book uniquely provides a necessary comprehensive coverage of bent functions.It serves as a useful reference for researchers in discrete mathematics, coding and cryptography. Students and professors in mathematics and computer science will also find the content

Cryptographic Boolean Functions and Applications

Cryptographic Boolean Functions and Applications
  • Author : Thomas W. Cusick,Pantelimon Stanica
  • Publisher : Academic Press
  • Release : 04 March 2009
GET THIS BOOKCryptographic Boolean Functions and Applications

Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles

Boolean Functions in Cryptology and Information Security

Boolean Functions in Cryptology and Information Security
  • Author : Bart Preneel,Oleg A. Logachev
  • Publisher : IOS Press
  • Release : 01 January 2008
GET THIS BOOKBoolean Functions in Cryptology and Information Security

This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of Boolean function theory that are of primary importance for cryptology. These lectures were delivered by leading researchers from many countries and contain both classic and recent results. The second part contains research papers written by graduate and

Construction and Analysis of Cryptographic Functions

Construction and Analysis of Cryptographic Functions
  • Author : Lilya Budaghyan
  • Publisher : Springer
  • Release : 06 January 2015
GET THIS BOOKConstruction and Analysis of Cryptographic Functions

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence

Information Security and Cryptology

Information Security and Cryptology
  • Author : Dengguo Feng
  • Publisher : Springer Science & Business Media
  • Release : 07 December 2005
GET THIS BOOKInformation Security and Cryptology

This book constitutes the refereed proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005, held in Beijing, China in December 2005. The 33 revised full papers and 32 short papers presented together with 2 invited papers were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, zero-knowledge and secure computations, threshold cryptography, intrusion detection systems, protocol cryptanalysis, ECC

Sequences, Subsequences, and Consequences

Sequences, Subsequences, and Consequences
  • Author : Solomon W. Golomb,Guang Gong,Tor Helleseth,Hong-Yeop Song
  • Publisher : Springer Science & Business Media
  • Release : 13 December 2007
GET THIS BOOKSequences, Subsequences, and Consequences

Interested readers will find here the thoroughly refereed post-proceedings of the International Workshop of Sequences, Subsequences and Consequences, SSC 2007, held in Los Angeles, USA, in 2007. The 16 revised invited full papers and one revised contributed paper are presented together with three keynote lectures and were carefully reviewed and selected for the book. The theory of sequences has found practical applications in many areas of coded communications and in cryptography.

Finite Fields and Applications

Finite Fields and Applications
  • Author : Gary L. Mullen,Daniel Panario,Igor E. Shparlinski
  • Publisher : American Mathematical Soc.
  • Release : 14 August 2022
GET THIS BOOKFinite Fields and Applications

This volume contains the proceedings of the Eighth International Conference on Finite Fields and Applications, held in Melbourne, Australia, July 9-13, 2007. It contains 5 invited survey papers as well as original research articles covering various theoretical and applied areas related to finite fields. Finite fields, and the computational and algorithmic aspects of finite field problems, continue to grow in importance and interest in the mathematical and computer science communities because of their applications in so many diverse areas. In particular, finite

Fast Software Encryption

Fast Software Encryption
  • Author : Bart Preneel
  • Publisher : Springer Science & Business Media
  • Release : 25 October 1995
GET THIS BOOKFast Software Encryption

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an

Discrete Geometry and Algebraic Combinatorics

Discrete Geometry and Algebraic Combinatorics
  • Author : Alexander Barg,Oleg R. Musin
  • Publisher : American Mathematical Society
  • Release : 28 August 2014
GET THIS BOOKDiscrete Geometry and Algebraic Combinatorics

This volume contains the proceedings of the AMS Special Session on Discrete Geometry and Algebraic Combinatorics held on January 11, 2013, in San Diego, California. The collection of articles in this volume is devoted to packings of metric spaces and related questions, and contains new results as well as surveys of some areas of discrete geometry. This volume consists of papers on combinatorics of transportation polytopes, including results on the diameter of graphs of such polytopes; the generalized Steiner problem and related

Cryptography and Coding

Cryptography and Coding
  • Author : Matthew G. Parker
  • Publisher : Springer Science & Business Media
  • Release : 07 December 2009
GET THIS BOOKCryptography and Coding

The12thintheseriesofIMAConferencesonCryptographyandCodingwasheld at the Royal Agricultural College, Cirencester, December 15–17, 2009. The p- gram comprised 3 invited talks and 26 contributed talks. The contributed talks werechosenbyathoroughreviewingprocessfrom53submissions.Oftheinvited and contributed talks,28 arerepresentedaspapersin this volume. These papers are grouped loosely under the headings: Coding Theory, Symmetric Crypt- raphy, Security Protocols, Asymmetric Cryptography, Boolean Functions, and Side Channels and Implementations. Numerous people helped to make this conference a success. To begin with I would like to thank all members of the Technical Program Committee who put

Open Problems in Mathematics and Computational Science

Open Problems in Mathematics and Computational Science
  • Author : Çetin Kaya Koç
  • Publisher : Springer
  • Release : 25 March 2015
GET THIS BOOKOpen Problems in Mathematics and Computational Science

This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students

Modern Cryptography

Modern Cryptography
  • Author : Menachem Domb
  • Publisher : BoD – Books on Demand
  • Release : 27 November 2019
GET THIS BOOKModern Cryptography

Cyber security is taking on an important role in information systems and data transmission over public networks. This is due to the widespread use of the Internet for business and social purposes. This increase in use encourages data capturing for malicious purposes. To counteract this, many solutions have been proposed and introduced during the past 80 years, but Cryptography is the most effective tool. Some other tools incorporate complicated and long arithmetic calculations, vast resources consumption, and long execution time, resulting