Download e-book for iPad: Construction and Analysis of Cryptographic Functions by Lilya Budaghyan

By Lilya Budaghyan

ISBN-10: 3319129902

ISBN-13: 9783319129907

ISBN-10: 3319129910

ISBN-13: 9783319129914

This e-book covers novel examine on building and research of optimum cryptographic services equivalent to virtually excellent nonlinear (APN), virtually bent (AB), planar and bent services. those services have optimum resistance to linear and/or differential assaults, that are the 2 strongest assaults on symmetric cryptosystems. in addition to cryptographic functions, those features are major in lots of branches of arithmetic and knowledge thought together with coding conception, combinatorics, commutative algebra, finite geometry, series layout and quantum info conception. the writer analyzes equivalence family members for those features and develops a number of new tools for development in their limitless households. furthermore, the booklet deals recommendations to 2 longstanding open difficulties, together with the matter on characterization of APN and AB features through Boolean, and the matter at the relation among periods of bent functions.

Show description

Read or Download Construction and Analysis of Cryptographic Functions PDF

Similar information theory books

Coordinated Multiuser Communications - download pdf or read online

Coordinated Multiuser Communications presents for the 1st time a unified therapy of multiuser detection and multiuser deciphering in one quantity. Many communications platforms, resembling mobile cellular radio and instant neighborhood zone networks, are topic to multiple-access interference, brought on by a large number of clients sharing a typical transmission medium.

Download e-book for iPad: Elliptische Kurven in der Kryptographie by Annette Werner

Dieses Lehrbuch bietet eine elementare Einführung in ein mathematisch anspruchsvolles Gebiet der modernen Kryptographie, das zunehmend an praktischer Bedeutung gewinnt. Die relevanten Tatsachen über elliptische Kurven und Public-Key-Kryptographie werden ausführlich erläutert. Dabei werden nur geringe Vorkenntnisse vorausgesetzt, um den textual content für Studierende der Mathematik und Informatik ab dem five.

Download PDF by Albert Borgmann: Holding On to Reality: The Nature of Information at the Turn

Conserving directly to fact is a superb background of data, from its inception within the flora and fauna to its function within the transformation of tradition to the present net mania and is attendant resources and liabilities. Drawing at the background of principles, the main points of data know-how, and the limits of the human , Borgmann illuminates the connection among issues and symptoms, among fact and knowledge.

Extra info for Construction and Analysis of Cryptographic Functions

Sample text

Geom. Dedicata 82, pp. 1–19, 2000. 101. A. Pott, Y. Zhou. CCZ and EA equivalence between mappings over finite Abelian groups. Des. Codes Cryptography 66(1–3), pp. 99–109, 2013. 102. A. Pott, Y. Tan, T. Feng, and S. Ling. Association schemes arising from bent functions. Des. , vol. 59, no. 1–3, pp. 319–331, Apr. 2011. 103. O. S. Rothaus. On “bent” functions. J. Combin. Theory Ser. A, vol. 20, no. 3, pp. 300–305, 1976. 104. V. Sidelnikov. On mutual correlation of sequences. Soviet Math. , 12, pp.

52, no. 2, pp. 738–743, 2006. 88. G. Leander and A. Kholosha, “Bent functions with 2r Niho exponents,” IEEE Trans. Inf. Theory, vol. 52, no. 12, pp. 5529–5532, Dec. 2006. 89. G. Leander and P. Langevin. On exponents with highly divisible Fourier coefficients and conjectures of Niho and Dobbertin. 2007. 90. Y. Li, M. Wang. Permutation polynomials EA-equivalent to the inverse function over GF (2n ). Cryptography and Communications 3(3), pp. 175–186, 2011. 91. Y. Li, M. Wang. The Nonexistence of Permutations EA-Equivalent to Certain AB Functions.

R. van Dam, D. Fon-Der-Flaass. Codes, graphs, and schemes from nonlinear functions. European J. Combin. 24, 85–98, 2003. 107. G. Weng. Private communications, 2007. 108. G. Weng, X. Zeng. Further results on planar DO functions and commutative semifields. Des. Codes Cryptogr. 63, pp. 413–423, 2012. 109. Yoshiara. Equivalence of quadratic APN functions. J. Algebr. Comb. 35, pp. 461–475, 2012. 110. Y. Yu, M. Wang, Y. Li. A matrix approach for constructing quadratic APN functions. Preproceedings of the International Conference WCC 2013, Bergen, Norway, 2013.

Download PDF sample

Construction and Analysis of Cryptographic Functions by Lilya Budaghyan


by David
4.1

Rated 4.46 of 5 – based on 16 votes