Download E-books Construction and Analysis of Cryptographic Functions PDF

By Lilya Budaghyan

This booklet covers novel study on building and research of optimum cryptographic capabilities resembling virtually ideal nonlinear (APN), virtually bent (AB), planar and bent services. those capabilities have optimum resistance to linear and/or differential assaults, that are the 2 strongest assaults on symmetric cryptosystems. along with cryptographic purposes, those features are major in lots of branches of arithmetic and data idea together with coding conception, combinatorics, commutative algebra, finite geometry, series layout and quantum details concept. the writer analyzes equivalence relatives for those features and develops a number of new tools for development in their endless households. moreover, the publication deals recommendations to 2 longstanding open difficulties, together with the matter on characterization of APN and AB services through Boolean, and the matter at the relation among periods of bent services.

Show description

Read or Download Construction and Analysis of Cryptographic Functions PDF

Similar Information Theory books

Network Coding: Fundamentals and Applications

Community coding is a box of knowledge and coding idea and is a technique of accomplishing greatest details movement in a community. This e-book is a perfect advent for the communications and community engineer, operating in learn and improvement, who wishes an intuitive advent to community coding and to the elevated functionality and reliability it bargains in lots of functions.

Classical and Quantum Information

A brand new self-discipline, Quantum info technology, has emerged within the final 20 years of the 20 th century on the intersection of Physics, arithmetic, and desktop technology. Quantum details Processing is an program of Quantum details technology which covers the transformation, garage, and transmission of quantum info; it represents a progressive method of details processing.

Additional resources for Construction and Analysis of Cryptographic Functions

Show sample text content

Rated 4.56 of 5 – based on 6 votes