Construction and Analysis of Cryptographic Functions

Nonfiction, Computers, Advanced Computing, Theory, Networking & Communications, Computer Security, Reference & Language, Reference
Cover of the book Construction and Analysis of Cryptographic Functions by Lilya Budaghyan, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Lilya Budaghyan ISBN: 9783319129914
Publisher: Springer International Publishing Publication: January 6, 2015
Imprint: Springer Language: English
Author: Lilya Budaghyan
ISBN: 9783319129914
Publisher: Springer International Publishing
Publication: January 6, 2015
Imprint: Springer
Language: English

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.

More books from Springer International Publishing

Cover of the book Green Roof Ecosystems by Lilya Budaghyan
Cover of the book HCI International 2015 - Posters’ Extended Abstracts by Lilya Budaghyan
Cover of the book Smart Cities, Green Technologies, and Intelligent Transport Systems by Lilya Budaghyan
Cover of the book Renewable Energy by Lilya Budaghyan
Cover of the book Chemical Reactions by Lilya Budaghyan
Cover of the book Solid-Phase Synthesis of Nitrogenous Heterocycles by Lilya Budaghyan
Cover of the book Perceptions of Self, Power, & Gender Among Muslim Women by Lilya Budaghyan
Cover of the book The Illegal Business of Human Trafficking by Lilya Budaghyan
Cover of the book Black Holes: Thermodynamics, Information, and Firewalls by Lilya Budaghyan
Cover of the book Asia-Pacific Security Challenges by Lilya Budaghyan
Cover of the book Mathematics Education in the Early Years by Lilya Budaghyan
Cover of the book Security and Trust Management by Lilya Budaghyan
Cover of the book Rare Diseases and Syndromes of the Spinal Cord by Lilya Budaghyan
Cover of the book Analysis and Control of Oilwell Drilling Vibrations by Lilya Budaghyan
Cover of the book Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks by Lilya Budaghyan
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy