feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Subjects(RVK)
Access
  • 1
    Book
    Book
    Amsterdam : Elsevier Academic Press
    UID:
    gbv_591564645
    Format: XII, 232 S. , graph. Darst. , 24 cm
    Edition: 1st ed.
    ISBN: 0123748909 , 9780123748904
    Note: Includes bibliographical references and index. - Formerly CIP
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Boolesche Funktion ; Kryptologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1651543402
    Format: Online Ressource (xii, 232 p.) , ill. , 25 cm.
    Edition: 1st ed
    Edition: Online-Ausg. Amsterdam Elsevier Science & Technology
    ISBN: 9780123748904 , 0123748909 , 9780080952222 , 9781282541184 , 1282541188
    Content: A bit of history -- Fourier analysis of Boolean functions -- Avalanche and propogation criteria -- Correlation immune and resilient Boolean functions -- Bent Boolean functions -- Stream cipher design -- Block cyphers -- Boolean Cayley graphs
    Content: Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic
    Note: Includes bibliographical references (p. 209-227) and index. - Description based on print version record , Front cover; Half page; Title page; Copyright page; Dedication; Contents; Preface; Chapter 1. A bit of history; 1.1 George Boole (1815---1864); 1.2 Claude Elwood Shannon (1916---2001); Chapter 2. Fourier analysis of Boolean functions; 2.1 Basic Definitions on Boolean Functions; 2.2 Walsh Transform; 2.3 Autocorrelation Function; 2.4 Walsh Transform on Subspaces; 2.5 Linear Transformations and the Sign Function; 2.6 Parseval Equation; 2.7 Asymptotic Results on Walsh Coefficients; 2.8 Probability Distributions; 2.9 Hadamard Matrices and Nonlinearity Bounds; 2.10 Fast Walsh Transform , 2.11 LFSR s and Linear Complexity2.12 The Berlekamp---Massey Algorithm; 2.13 De Bruijn Sequence; Chapter 3. Avalanche and propagation criteria; 3.1 Introduction; 3.2 Counting S A C Functions; 3.3 Counting Balanced S A C Functions; 3.4 Higher Order S A C; 3.5 Propagation Criteria; 3.6 Higher Order P C ( k); 3.7 Construction of S A C ( k) and P C ( k) Functions; Chapter 4. Correlation immune and resilient Boolean functions; 4.1 Introduction; 4.2 Basic Properties of Correlation Immunity; 4.3 LFSR s and Correlation Immunity; 4.4 Counting Correlation Immune Functions , 4.5 Resilient Functions4.6 Tradeoff Between Correlation Immunity and Degree; 4.7 Connections with Orthogonal Arrays; 4.8 Constructing Correlation Immune Functions; 4.9 Tradeoff Between Correlation Immunity and Nonlinearity; Chapter 5. Bent Boolean functions; 5.1 Introduction; 5.2 Definitions and Background; 5.3 Characterizations of the Bent Property; 5.4 Meier and Staffelbach's Approach; 5.5 Degree of a Bent Function; 5.6 New From Old Bent Functions; 5.7 Rothaus's Construction; 5.8 Maiorana and McFarland's Construction; 5.9 Dillon's Construction; 5.10 Dobbertin's Construction , 5.11 Carlet's Construction5.12 Extended Maiorana---McFarland Class; 5.13 Normal and Nonnormal Bent Functions; 5.14 Counting Bent Functions; 5.15 Highly Nonlinear Balanced Functions; 5.16 Partially Bent Functions; 5.17 Semi-bent Functions; 5.18 Symmetric Bent Functions; 5.19 Rotation Symmetric Functions; 5.20 Enumeration of Rotation Symmetric Functions; Chapter 6. Stream cipher design; 6.1 Introduction; 6.2 Boolean Functions in Pseudorandom Bit Generators; 6.3 Nonlinear Combination Generators; 6.4 Nonlinear Filter Generators; 6.5 Multiplexer Generator , 6.6 Irregularly Clocked LFSR s in Generators6.7 Algebraic and Linearization Attacks; 6.8 The e STREAM Project; Chapter 7. Block ciphers; 7.1 Some History; 7.2 Introduction; 7.3 Block Ciphers' Modes of Operation; 7.4 Design Approaches; 7.5 Notable Symmetric Ciphers; 7.6 Periods of Rijndael Transformations; 7.7 Algebraic Representations of Rijndael/AES; 7.8 Embedding AES in BES; 7.9 Further Embeddings of AES; Chapter 8. Boolean Cayley graphs; 8.1 Introduction; 8.2 Spectra of Boolean Cayley Graphs; 8.3 Few Spectral Coefficients of Boolean Functions; 8.4 Bent Boolean Cayley Graphs , 8.5 Coloring the Boolean Cayley Graph , English
    Additional Edition: ISBN 0123748909
    Additional Edition: Erscheint auch als Druck-Ausgabe Cusick, Thomas W., 1943- Cryptographic Boolean functions and applications Amsterdam ; Boston : Academic Press/Elsevier, 2009
    Language: English
    Keywords: Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages