Cargando…

Cryptographic Boolean functions and applications /

Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to b...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Cusick, Thomas W., 1943- (Autor), St�anic�a, Pantelimon (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Academic Press, [2017]
Edición:Second edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 SCIDIR_ocn981463383
003 OCoLC
005 20231120112223.0
006 m o d
007 cr cnu|||unuuu
008 170405s2017 enka ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OPELS  |d YDX  |d OCLCF  |d MERER  |d UPM  |d OCLCQ  |d OCLCA  |d OTZ  |d CSAIL  |d D6H  |d UAB  |d U3W  |d OCLCQ  |d LQU  |d UKMGB  |d S2H  |d OCLCO  |d OCL  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
015 |a GBB730076  |2 bnb 
016 7 |a 018240754  |2 Uk 
019 |a 988092511  |a 1105174945  |a 1105562654 
020 |a 9780128111307  |q (electronic bk.) 
020 |a 0128111305  |q (electronic bk.) 
020 |a 9780128111291  |q (electronic bk.) 
020 |a 0128111291  |q (electronic bk.) 
035 |a (OCoLC)981463383  |z (OCoLC)988092511  |z (OCoLC)1105174945  |z (OCoLC)1105562654 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 |a Cusick, Thomas W.,  |d 1943-  |e author. 
245 1 0 |a Cryptographic Boolean functions and applications /  |c Thomas W. Cusick, Pantelimon Stanica. 
250 |a Second edition. 
264 1 |a London :  |b Academic Press,  |c [2017] 
264 4 |c �2017 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Vendor-supplied metadata. 
504 |a Includes bibliographical references and index. 
520 |a Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered over hundreds of journal articles, conference proceedings, books, reports and notes, some of them only available online. This book follows the previous edition in sifting through this compendium and gathering the most significant information in one concise reference book. The work therefore encompasses over 600 citations, covering every aspect of the applications of cryptographic Boolean functions. Since 2008, the subject has seen a very large number of new results, and in response, the authors have prepared a new chapter on special functions. The new edition brings 100 completely new references and an expansion of 50 new pages, along with heavy revision throughout the text. 
505 0 |a Front Cover; Cryptographic Boolean Functions and Applications; Copyright; Contents; Preface; 1 A Bit of History; 1.1 George Boole (1815-1864); 1.2 Claude Elwood Shannon (1916-2001); 2 Fourier Analysis of Boolean Functions; 2.1 Basic De nitions for Boolean Functions; 2.2 Walsh Transform; 2.3 Autocorrelation Function; 2.4 Walsh Transform on Subspaces; 2.5 Linear Transformations and the Sign Function; 2.6 Parseval Equation; 2.7 Asymptotic Results on Walsh Coef cients; 2.8 Probability Distributions; 2.9 Hadamard Matrices and Nonlinearity Bounds; 2.10 Fast Walsh Transform. 
505 8 |a 2.11 LFSRs and Linear Complexity2.12 The Berlekamp-Massey Algorithm; 2.13 De Bruijn Sequences; 3 Avalanche and Propagation Criteria; 3.1 Introduction; 3.2 Counting SAC Functions; 3.3 Counting Balanced SAC Functions; 3.4 Higher Order SAC; 3.5 Propagation Criteria; 3.6 Higher Order PC(k); 3.7 Construction of SAC(k) and PC(k) Functions; 4 Correlation Immune and Resilient Boolean Functions; 4.1 Introduction; 4.2 Basic Properties of Correlation Immunity; 4.3 LFSRs and Correlation Immunity; 4.4 Counting Correlation Immune Functions; 4.5 Resilient Functions. 
505 8 |a 4.6 Tradeoff Between Correlation Immunity and Degree4.7 Connections with Orthogonal Arrays; 4.8 Constructing Correlation Immune Functions; 4.9 Tradeoff Between Correlation Immunity and Nonlinearity; 4.10 Some Computational Data; 5 Bent Boolean Functions; 5.1 Introduction; 5.2 De nitions and Background; 5.3 Characterizations of the Bent Property; 5.4 Meier and Staffelbach's Approach; 5.5 Degree of a Bent Function; 5.6 New From Old Bent Functions; 5.7 Rothaus's Construction; 5.8 Maiorana and McFarland's Construction; 5.9 Dillon's Construction; 5.10 Dobbertin's Construction. 
505 8 |a 5.11 Carlet's Construction5.12 Normal and Nonnormal Bent Functions; 5.13 Counting Bent Functions; 5.14 Partially Bent Functions; 5.15 Semi-bent Functions; 6 Special Types of Boolean Functions; 6.1 Symmetric Functions; 6.1.1 Introduction; 6.1.2 Balanced symmetric functions; 6.1.3 A conjecture for balanced elementary symmetric functions; 6.1.4 Resilient symmetric functions; 6.2 Rotation Symmetric Functions; 6.2.1 Early results; 6.2.2 Weight and nonlinearity; 6.2.3 Enumeration of rotation symmetric functions; 6.2.4 Af ne equivalence of rotation symmetric functions. 
505 8 |a 6.3 k-Rotation Symmetric Functions6.4 Balanced Functions; 6.5 Cryptographic Boolean Functions with Biased Inputs; 7 Stream Cipher Design; 7.1 Introduction; 7.2 Boolean Functions in Pseudorandom Bit Generators; 7.3 Nonlinear Combination Generators; 7.4 Nonlinear Filter Generators; 7.5 Multiplexer Generator; 7.6 Irregularly Clocked LFSRs in Generators; 7.7 Algebraic and Linearization Attacks; 7.8 The eStream Project; 7.9 AIDA and Cube Attacks on Tweakable Symmetric Ciphers; 8 Block Ciphers; 8.1 Some History; 8.2 Introduction; 8.3 Block Ciphers' Modes of Operation; 8.3.1 Con dentiality Modes. 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer algorithms. 
650 0 |a Algebra, Boolean. 
650 0 |a Algorithms. 
650 6 |a Chiffrement (Informatique)  |0 (CaQQLa)201-0259253 
650 6 |a Cryptographie.  |0 (CaQQLa)201-0039807 
650 6 |a Algorithmes.  |0 (CaQQLa)201-0001230 
650 6 |a Alg�ebre de Boole.  |0 (CaQQLa)201-0042716 
650 7 |a algorithms.  |2 aat  |0 (CStmoGRI)aat300065585 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Algorithms  |2 fast  |0 (OCoLC)fst00805020 
650 7 |a Algebra, Boolean  |2 fast  |0 (OCoLC)fst00804924 
650 7 |a Computer algorithms  |2 fast  |0 (OCoLC)fst00872010 
650 7 |a Cryptography  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
700 1 |a St�anic�a, Pantelimon,  |e author. 
776 0 8 |i Print version :  |z 9780128111291 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128111291  |z Texto completo 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128111291  |z Texto completo