|
|
|
|
LEADER |
03300nam a22005055i 4500 |
001 |
978-3-662-48865-2 |
003 |
DE-He213 |
005 |
20171011141834.0 |
007 |
cr nn 008mamaa |
008 |
160223s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662488652
|9 978-3-662-48865-2
|
024 |
7 |
|
|a 10.1007/978-3-662-48865-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a Wu, Chuan-Kun.
|e author.
|
245 |
1 |
0 |
|a Boolean Functions and Their Applications in Cryptography
|h [electronic resource] /
|c by Chuan-Kun Wu, Dengguo Feng.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XV, 256 p. 9 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2686
|
505 |
0 |
|
|a 1. Boolean Functions and Their Walsh Transforms -- 2. Independence of Boolean Functions of Their Variables -- 3. Nonlinearity and Linear Structures of Boolean Functions -- 4. Correlation Immunity of Boolean Functions -- 5. Algebraic Immunity of Boolean Functions -- 6. The Symmetric Property of Boolean Functions -- 7.Boolean Function Representation of S-boxes and Boolean Permutations -- 8. Cryptographic Applications of Boolean Functions.
|
520 |
|
|
|a This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
700 |
1 |
|
|a Feng, Dengguo.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662488638
|
830 |
|
0 |
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2686
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-662-48865-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|