Information Theory

Get Construction and Analysis of Cryptographic Functions PDF

By Lilya Budaghyan

ISBN-10: 3319129902

ISBN-13: 9783319129907

ISBN-10: 3319129910

ISBN-13: 9783319129914

This publication covers novel learn on development and research of optimum cryptographic features reminiscent of virtually excellent nonlinear (APN), virtually bent (AB), planar and bent capabilities. those services have optimum resistance to linear and/or differential assaults, that are the 2 strongest assaults on symmetric cryptosystems. along with cryptographic purposes, those features are major in lots of branches of arithmetic and data concept together with coding conception, combinatorics, commutative algebra, finite geometry, series layout and quantum details concept. the writer analyzes equivalence family members for those capabilities and develops numerous new equipment for development in their countless households. additionally, the ebook bargains options to 2 longstanding open difficulties, together with the matter on characterization of APN and AB features through Boolean, and the matter at the relation among periods of bent functions.

Show description

Read Online or Download Construction and Analysis of Cryptographic Functions PDF

Similar information theory books

Handbook of Biometrics by Anil K. Jain, Patrick Flynn, Arun A. Ross PDF

Biometric reputation, or just Biometrics, is a quickly evolving box with purposes starting from having access to one's laptop to gaining access right into a state. Biometric platforms depend on using actual or behavioral features, reminiscent of fingerprints, face, voice and hand geometry, to set up the id of somebody.

Download e-book for kindle: Advances in Quantum Chemistry by Cleanthes A. Nicolaides, Erkki Brändas and John R. Sabin

Advances in Quantum Chemistry offers surveys of present subject matters during this swiftly constructing box that has emerged on the move portion of the traditionally confirmed parts of arithmetic, physics, chemistry, and biology. It positive aspects targeted studies written through prime overseas researchers. This sequence presents a one-stop source for following growth during this interdisciplinary sector.

Download PDF by Nicholas J. Daras, Michael Th. Rassias (eds.): Computation, Cryptography, and Network Security

Research, review, and knowledge administration are center knowledge for operation examine analysts. This quantity addresses a few matters and built equipment for bettering these abilities. it's an outgrowth of a convention held in April 2013 on the Hellenic army Academy, and brings jointly a large number of mathematical tools and theories with numerous purposes.

Read e-book online Principles of quantum artificial intelligence PDF

The ebook consists of 2 sections: the first is on classical computation and the second one part is on quantum computation. within the first part, we introduce the elemental ideas of computation, illustration and challenge fixing. within the moment part, we introduce the foundations of quantum computation and their relation to the center principles of artificial intelligence, comparable to seek and challenge fixing.

Extra info for Construction and Analysis of Cryptographic Functions

Example text

1–19, 2000. 101. A. Pott, Y. Zhou. CCZ and EA equivalence between mappings over finite Abelian groups. Des. Codes Cryptography 66(1–3), pp. 99–109, 2013. 102. A. Pott, Y. Tan, T. Feng, and S. Ling. Association schemes arising from bent functions. Des. , vol. 59, no. 1–3, pp. 319–331, Apr. 2011. 103. O. S. Rothaus. On “bent” functions. J. Combin. Theory Ser. A, vol. 20, no. 3, pp. 300–305, 1976. 104. V. Sidelnikov. On mutual correlation of sequences. Soviet Math. , 12, pp. 197–201, 1971. 105. Y.

T. Beth and C. Ding. On almost perfect nonlinear permutations. Advances in CryptologyEUROCRYPT’93, Lecture Notes in Computer Science, 765, Springer-Verlag, New York, pp. 65–76, 1993. 5. J. Bierbrauer. New semifields, PN and APN functions. Designs, Codes and Cryptography, v. 54, pp. 189–200, 2010. 6. J. Bierbrauer. Commutative semifields from projection mappings. Designs, Codes and Cryptography, 61(2), pp. 187–196, 2011. 7. E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems.

97. K. Nyberg. Perfect nonlinear S-boxes. Advances in Cryptography, EUROCRYPT’91, Lecture Notes in Computer Science 547, pp. 378–386, 1992. 98. K. Nyberg. Differentially uniform mappings for cryptography. Advances in Cryptography, EUROCRYPT’93, Lecture Notes in Computer Science 765, pp. 55–64, 1994. 99. K. Nyberg. S-boxes and Round Functions with Controllable Linearity and Differential Uniformity. Proceedings of Fast Software Encryption 1994, LNCS 1008, pp. 111–130, 1995. 100. T. Penttila and B.

Download PDF sample

Construction and Analysis of Cryptographic Functions by Lilya Budaghyan


by James
4.2

Rated 4.82 of 5 – based on 37 votes