Boolean Functions and Their Applications in Cryptography by Chuan-Kun Wu,Dengguo Feng

By Chuan-Kun Wu,Dengguo Feng

This booklet makes a speciality of different representations and cryptographic houses of Booleans features, offers structures of Boolean services with a few reliable cryptographic homes. extra particularly, Walsh spectrum description of the conventional cryptographic homes of Boolean capabilities, together with linear constitution, propagation criterion, nonlinearity, and correlation immunity are provided. buildings of symmetric Boolean services and of Boolean diversifications with sturdy cryptographic houses are in particular studied. This ebook isn't intended to be complete, yet with its personal concentrate on a few unique examine of the authors long ago. To be self content material, a few uncomplicated suggestions and homes are brought. This booklet can function a reference for cryptographic set of rules designers, relatively the designers of move ciphers and of block ciphers, and for teachers with curiosity within the cryptographic homes of Boolean functions.

Show description

Read Online or Download Boolean Functions and Their Applications in Cryptography (Advances in Computer Science and Technology) PDF

Best machine theory books

Abdominal Imaging. Computational and Clinical Applications: 6th International Workshop, ABDI 2014, Held in Conjunction with MICCAI 2014, Cambridge, MA, ... 2014. (Lecture Notes in Computer Science)

This publication constitutes the refereed court cases of the sixth overseas Workshop ABDI 2014, held at the side of MICCAI 2014, in Cambridge, MA, united states, in September 2014. The booklet contains 29 papers which have been rigorously reviewed and chosen from 33 submissions. the subjects lined are liver and pancreas - ablation, perfusion, and segmentation; gastrointestinal tract - Crohn's sickness; gastrointestinal tract - colonoscopy, colonography; and stomach operation making plans - registration, segmentation.

Orwell's Revenge: The 1984 Palimpsest

Mark Zuckerberg's ‘A 12 months of Books’ SelectionGeorge Orwell’s bleak visions of the long run, one within which electorate are monitored via telescreens via an insidious substantial Brother, has haunted our mind's eye lengthy after the book of 1984. Orwell’s dystopian photo of the telescreen as a repressive tool of kingdom strength has profoundly affected our view of expertise, posing a stark confrontational query: Who could be grasp, human or desktop?

Transactions on Computational Collective Intelligence XX (Lecture Notes in Computer Science)

Those transactions publishresearch in computer-based equipment of computational collective intelligence(CCI) and their purposes in quite a lot of fields corresponding to the semanticWeb, social networks, and multi-agent structures. TCCI strives to hide newmethodological, theoretical and useful features of CCI understood because the formof intelligence that emerges from the collaboration and pageant of manyindividuals (artificial and/or natural).

Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings (Communications in Computer and Information Science)

This ebook constitutes the refereed court cases of the seventeenth foreign convention on Engineering purposes of Neural Networks, EANN 2016, held in Aberdeen, united kingdom, in September 2016. The 22 revised complete papers and 3 brief papers offered including tutorials have been conscientiously reviewed and chosen from forty-one submissions.

Additional resources for Boolean Functions and Their Applications in Cryptography (Advances in Computer Science and Technology)

Example text

Download PDF sample

Rated 4.71 of 5 – based on 25 votes