Format:
Online Ressource (xii, 232 p.)
,
ill.
,
25 cm.
Edition:
1st ed
Edition:
Online-Ausg. Amsterdam Elsevier Science & Technology
ISBN:
9780123748904
,
0123748909
,
9780080952222
,
9781282541184
,
1282541188
Content:
A bit of history -- Fourier analysis of Boolean functions -- Avalanche and propogation criteria -- Correlation immune and resilient Boolean functions -- Bent Boolean functions -- Stream cipher design -- Block cyphers -- Boolean Cayley graphs
Content:
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic
Note:
Includes bibliographical references (p. 209-227) and index. - Description based on print version record
,
Front cover; Half page; Title page; Copyright page; Dedication; Contents; Preface; Chapter 1. A bit of history; 1.1 George Boole (1815---1864); 1.2 Claude Elwood Shannon (1916---2001); Chapter 2. Fourier analysis of Boolean functions; 2.1 Basic Definitions on Boolean Functions; 2.2 Walsh Transform; 2.3 Autocorrelation Function; 2.4 Walsh Transform on Subspaces; 2.5 Linear Transformations and the Sign Function; 2.6 Parseval Equation; 2.7 Asymptotic Results on Walsh Coefficients; 2.8 Probability Distributions; 2.9 Hadamard Matrices and Nonlinearity Bounds; 2.10 Fast Walsh Transform
,
2.11 LFSR s and Linear Complexity2.12 The Berlekamp---Massey Algorithm; 2.13 De Bruijn Sequence; Chapter 3. Avalanche and propagation criteria; 3.1 Introduction; 3.2 Counting S A C Functions; 3.3 Counting Balanced S A C Functions; 3.4 Higher Order S A C; 3.5 Propagation Criteria; 3.6 Higher Order P C ( k); 3.7 Construction of S A C ( k) and P C ( k) Functions; Chapter 4. Correlation immune and resilient Boolean functions; 4.1 Introduction; 4.2 Basic Properties of Correlation Immunity; 4.3 LFSR s and Correlation Immunity; 4.4 Counting Correlation Immune Functions
,
4.5 Resilient Functions4.6 Tradeoff Between Correlation Immunity and Degree; 4.7 Connections with Orthogonal Arrays; 4.8 Constructing Correlation Immune Functions; 4.9 Tradeoff Between Correlation Immunity and Nonlinearity; Chapter 5. Bent Boolean functions; 5.1 Introduction; 5.2 Definitions and Background; 5.3 Characterizations of the Bent Property; 5.4 Meier and Staffelbach's Approach; 5.5 Degree of a Bent Function; 5.6 New From Old Bent Functions; 5.7 Rothaus's Construction; 5.8 Maiorana and McFarland's Construction; 5.9 Dillon's Construction; 5.10 Dobbertin's Construction
,
5.11 Carlet's Construction5.12 Extended Maiorana---McFarland Class; 5.13 Normal and Nonnormal Bent Functions; 5.14 Counting Bent Functions; 5.15 Highly Nonlinear Balanced Functions; 5.16 Partially Bent Functions; 5.17 Semi-bent Functions; 5.18 Symmetric Bent Functions; 5.19 Rotation Symmetric Functions; 5.20 Enumeration of Rotation Symmetric Functions; Chapter 6. Stream cipher design; 6.1 Introduction; 6.2 Boolean Functions in Pseudorandom Bit Generators; 6.3 Nonlinear Combination Generators; 6.4 Nonlinear Filter Generators; 6.5 Multiplexer Generator
,
6.6 Irregularly Clocked LFSR s in Generators6.7 Algebraic and Linearization Attacks; 6.8 The e STREAM Project; Chapter 7. Block ciphers; 7.1 Some History; 7.2 Introduction; 7.3 Block Ciphers' Modes of Operation; 7.4 Design Approaches; 7.5 Notable Symmetric Ciphers; 7.6 Periods of Rijndael Transformations; 7.7 Algebraic Representations of Rijndael/AES; 7.8 Embedding AES in BES; 7.9 Further Embeddings of AES; Chapter 8. Boolean Cayley graphs; 8.1 Introduction; 8.2 Spectra of Boolean Cayley Graphs; 8.3 Few Spectral Coefficients of Boolean Functions; 8.4 Bent Boolean Cayley Graphs
,
8.5 Coloring the Boolean Cayley Graph
,
English
Additional Edition:
ISBN 0123748909
Additional Edition:
Erscheint auch als Druck-Ausgabe Cusick, Thomas W., 1943- Cryptographic Boolean functions and applications Amsterdam ; Boston : Academic Press/Elsevier, 2009
Language:
English
Keywords:
Electronic books
;
Electronic books
Bookmarklink