|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-48865-2 |
003 |
DE-He213 |
005 |
20220113071510.0 |
007 |
cr nn 008mamaa |
008 |
160223s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662488652
|9 978-3-662-48865-2
|
024 |
7 |
|
|a 10.1007/978-3-662-48865-2
|2 doi
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Wu, Chuan-Kun.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Boolean Functions and Their Applications in Cryptography
|h [electronic resource] /
|c by Chuan-Kun Wu, Dengguo Feng.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XV, 256 p. 9 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2694
|
505 |
0 |
|
|a 1. Boolean Functions and Their Walsh Transforms -- 2. Independence of Boolean Functions of Their Variables -- 3. Nonlinearity and Linear Structures of Boolean Functions -- 4. Correlation Immunity of Boolean Functions -- 5. Algebraic Immunity of Boolean Functions -- 6. The Symmetric Property of Boolean Functions -- 7.Boolean Function Representation of S-boxes and Boolean Permutations -- 8. Cryptographic Applications of Boolean Functions.
|
520 |
|
|
|a This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
700 |
1 |
|
|a Feng, Dengguo.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662488638
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662488645
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662569603
|
830 |
|
0 |
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2694
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-48865-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|