Bent Functions Book

Bent Functions


  • Author : Natalia Tokareva
  • Publisher : Academic Press
  • Release Date : 2015-08-24
  • Genre: Mathematics
  • Pages : 220
  • ISBN 10 : 9780128025550

DOWNLOAD BOOK
Bent Functions Excerpt :

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more. Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers

Bent Functions Book

Bent Functions


  • Author : Sihem Mesnager
  • Publisher : Springer
  • Release Date : 2016-08-09
  • Genre: Computers
  • Pages : 544
  • ISBN 10 : 9783319325958

DOWNLOAD BOOK
Bent Functions Excerpt :

This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several results. This book uniquely provides a necessary comprehensive coverage of bent functions.It serves as a useful reference for researchers in discrete mathematics, coding and cryptography. Students and professors in mathematics and computer science will also find the content valuable, especially those interested in mathematical foundations of cryptography. It can be used as a supplementary text for university courses on discrete mathematics, Boolean functions, or cryptography, and is appropriate for both basic classes for under-graduate students and advanced courses for specialists in cryptography and mathematics.

Boolean Functions in Cryptology and Information Security Book

Boolean Functions in Cryptology and Information Security


  • Author : B. Preneel
  • Publisher : IOS Press
  • Release Date : 2008-07-16
  • Genre: Computers
  • Pages : 364
  • ISBN 10 : 9781607503446

DOWNLOAD BOOK
Boolean Functions in Cryptology and Information Security Excerpt :

This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held at September 8-18, 2007 in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of Boolean function theory that are of primary importance for cryptology. These lectures were delivered by leading researchers from many countries and contain both classic and recent results. The second part contains research papers written by graduate and postgraduate students of Lomonosov University, Moscow. The third part contains a list of open problems in Boolean function theory. The book includes lectures and papers concern the following areas: Cryptographic properties of Boolean functions and mappings; Algebraic and combinatorial constructions of Boolean functions and mappings with prescribed cryptographic properties; Boolean functions and mappings in cryptosynthesis; Classification of Boolean functions; Cryptanalysis of ciphers; Efficient computations in finite fields.

Discrete Geometry and Algebraic Combinatorics Book

Discrete Geometry and Algebraic Combinatorics


  • Author : Alexander Barg
  • Publisher : American Mathematical Society
  • Release Date : 2014-08-28
  • Genre: Mathematics
  • Pages : 190
  • ISBN 10 : 9781470409050

DOWNLOAD BOOK
Discrete Geometry and Algebraic Combinatorics Excerpt :

This volume contains the proceedings of the AMS Special Session on Discrete Geometry and Algebraic Combinatorics held on January 11, 2013, in San Diego, California. The collection of articles in this volume is devoted to packings of metric spaces and related questions, and contains new results as well as surveys of some areas of discrete geometry. This volume consists of papers on combinatorics of transportation polytopes, including results on the diameter of graphs of such polytopes; the generalized Steiner problem and related topics of the minimal fillings theory; a survey of distance graphs and graphs of diameters, and a group of papers on applications of algebraic combinatorics to packings of metric spaces including sphere packings and topics in coding theory. In particular, this volume presents a new approach to duality in sphere packing based on the Poisson summation formula, applications of semidefinite programming to spherical codes and equiangular lines, new results in list decoding of a family of algebraic codes, and constructions of bent and semi-bent functions.

Applied Algebra  Algebraic Algorithms and Error Correcting Codes Book

Applied Algebra Algebraic Algorithms and Error Correcting Codes


  • Author : Serdar Boztas
  • Publisher : Springer
  • Release Date : 2007-11-29
  • Genre: Computers
  • Pages : 368
  • ISBN 10 : 9783540772248

DOWNLOAD BOOK
Applied Algebra Algebraic Algorithms and Error Correcting Codes Excerpt :

This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra.

Lecture Notes in Real Time Intelligent Systems Book

Lecture Notes in Real Time Intelligent Systems


  • Author : Jolanta Mizera-Pietraszko
  • Publisher : Springer
  • Release Date : 2017-08-07
  • Genre: Technology & Engineering
  • Pages : 508
  • ISBN 10 : 9783319607443

DOWNLOAD BOOK
Lecture Notes in Real Time Intelligent Systems Excerpt :

Intelligent computing refers greatly to artificial intelligence with the aim at making computer to act as a human. This newly developed area of real-time intelligent computing integrates the aspect of dynamic environments with the human intelligence. This book presents a comprehensive practical and easy to read account which describes current state-of-the art in designing and implementing real-time intelligent computing to robotics, alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowd sourcing, broadband systems, cloud computing, streaming data and many other applications areas. The solutions discussed in this book will encourage the researchers and IT professional to put the methods into their practice.

Combinatorics and Finite Fields Book

Combinatorics and Finite Fields


  • Author : Kai-Uwe Schmidt
  • Publisher : Walter de Gruyter GmbH & Co KG
  • Release Date : 2019-07-08
  • Genre: Mathematics
  • Pages : 354
  • ISBN 10 : 9783110641967

DOWNLOAD BOOK
Combinatorics and Finite Fields Excerpt :

Combinatorics and finite fields are of great importance in modern applications such as in the analysis of algorithms, in information and communication theory, and in signal processing and coding theory. This book contains survey articles on topics such as difference sets, polynomials, and pseudorandomness.

Surveys in Combinatorics 2013 Book

Surveys in Combinatorics 2013


  • Author : Simon R. Blackburn
  • Publisher : Cambridge University Press
  • Release Date : 2013-06-27
  • Genre: Computers
  • Pages : 387
  • ISBN 10 : 9781107651951

DOWNLOAD BOOK
Surveys in Combinatorics 2013 Excerpt :

Surveys of recent important developments in combinatorics covering a wide range of areas in the field.

Arithmetic of Finite Fields Book

Arithmetic of Finite Fields


  • Author : Sihem Mesnager
  • Publisher : Springer Nature
  • Release Date : 2023-01-10
  • Genre: Computers
  • Pages : 353
  • ISBN 10 : 9783031229442

DOWNLOAD BOOK
Arithmetic of Finite Fields Excerpt :

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August – September 2022. The 19 revised full papers and 3 invited talks presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections: structures in finite fields; efficient finite field arithmetic; coding theory; cryptography; sequences.

Selected Areas in Cryptography Book

Selected Areas in Cryptography


  • Author : Serge Vaudenay
  • Publisher : Springer
  • Release Date : 2003-06-30
  • Genre: Computers
  • Pages : 364
  • ISBN 10 : 9783540455370

DOWNLOAD BOOK
Selected Areas in Cryptography Excerpt :

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001. The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.

Hadamard Matrices and Their Applications Book

Hadamard Matrices and Their Applications


  • Author : K. J. Horadam
  • Publisher : Princeton University Press
  • Release Date : 2007
  • Genre: Mathematics
  • Pages : 277
  • ISBN 10 : 9780691119212

DOWNLOAD BOOK
Hadamard Matrices and Their Applications Excerpt :

In Hadamard Matrices and Their Applications, K. J. Horadam provides the first unified account of cocyclic Hadamard matrices and their applications in signal and data processing. This original work is based on the development of an algebraic link between Hadamard matrices and the cohomology of finite groups that was discovered fifteen years ago. The book translates physical applications into terms a pure mathematician will appreciate, and theoretical structures into ones an applied mathematician, computer scientist, or communications engineer can adapt and use. The first half of the book explains the state of our knowledge of Hadamard matrices and two important generalizations: matrices with group entries and multidimensional Hadamard arrays. It focuses on their applications in engineering and computer science, as signal transforms, spreading sequences, error-correcting codes, and cryptographic primitives. The book's second half presents the new results in cocyclic Hadamard matrices and their applications. Full expression of this theory has been realized only recently, in the Five-fold Constellation. This identifies cocyclic generalized Hadamard matrices with particular "stars" in four other areas of mathematics and engineering: group cohomology, incidence structures, combinatorics, and signal correlation. Pointing the way to possible new developments in a field ripe for further research, this book formulates and discusses ninety open questions.

Progress in Cryptology     INDOCRYPT 2022 Book

Progress in Cryptology INDOCRYPT 2022


  • Author : Takanori Isobe
  • Publisher : Springer Nature
  • Release Date : 2022-12-31
  • Genre: Computers
  • Pages : 725
  • ISBN 10 : 9783031229121

DOWNLOAD BOOK
Progress in Cryptology INDOCRYPT 2022 Excerpt :

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography

Progress in Cryptology   INDOCRYPT 2002 Book

Progress in Cryptology INDOCRYPT 2002


  • Author : Alfred Menezes
  • Publisher : Springer Science & Business Media
  • Release Date : 2002-12-02
  • Genre: Business & Economics
  • Pages : 449
  • ISBN 10 : 9783540002635

DOWNLOAD BOOK
Progress in Cryptology INDOCRYPT 2002 Excerpt :

This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.

The Stability Theory of Stream Ciphers Book

The Stability Theory of Stream Ciphers


  • Author : Cunsheng Ding
  • Publisher : Springer Science & Business Media
  • Release Date : 1991-12-04
  • Genre: Computers
  • Pages : 204
  • ISBN 10 : 3540549730

DOWNLOAD BOOK
The Stability Theory of Stream Ciphers Excerpt :

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.