Construction And Analysis Of Cryptographic Functions

Download Construction And Analysis Of Cryptographic Functions PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Construction And Analysis Of Cryptographic Functions book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Construction and Analysis of Cryptographic Functions

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.
Advances in Cryptology - CRYPTO 2006

Author: Cynthia Dwork
language: en
Publisher: Springer Science & Business Media
Release Date: 2006-08-08
Constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in California, USA in 2006. These papers address the foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.
Information Security and Cryptology

Author: Xuejia Lai
language: en
Publisher: Springer Science & Business Media
Release Date: 2011-07-08
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.