| 查看: 382 | 回复: 0 | ||
[资源]
【分享】Cryptographic Boolean Functions and Applications.Apress.2009[New]
|
|
Cryptographic Boolean Functions and Applications 本资源来自于互联网,仅供学习研究之用,不可涉及任何商业用途,请在下载后24小时内删除。 著作权归原作者或出版社所有。未经发贴人conanwj许可,严禁任何人以任何形式转贴本文,违者必究! Authors(Editors): Thomas W. Cusick Pantelimon Stanica Publisher: Apress Pub Date: 2009 Pages: 245 ISBN: 978-0-1237-4890-4 Preface Boolean functions have been an object of study in cryptography for over 50 years, beginning with their use in linear feedback shift registers. It was in the late 1940s that Shannon published the concepts of confusion and diffusion as fundamental concepts for achieving security in cryptosystems. Confusion is reflected in the nonlinearity of parts of the cryptosystem; linear systems are generally easy to break. Diffusion is achieved by ensuring that a small change in the input is spread out to make a large change in the output. Boolean functions can easily provide both confusion and diffusion. One goal of this book is to show how to choose good Boolean functions for this purpose. The book is designed to serve as a reference for various applications of Boolean functions in modern cryptography, which we can say is about 35 years old. The relevant material in the literature is scattered over hundreds of journal articles, conference proceedings, books, reports and notes (some of them only available online). Until this book, there has been no attempt to gather the gist of this material in one place. Our goal is to present the major concepts and associated theorems, with proofs, except in those cases where the proofs would be too long or too technical. The book is expository and we have attempted to be accurate in assigning credit for the many results quoted here. There is some original research in the book, and we have made quite a few corrections and improvements to earlier work. The bibliography is extensive, but is not intended to be all-inclusive. In particular, it is common in cryptography for research which has been first published in the proceedings of a conference (‘conference version’) to be published later (perhaps with refinements or improvements) in a journal (‘journal version’). Many authors seem to fear that publishing only a conference version will lead to their results not being as widely read or referred to. In some cases where a more complete journal version of an article is available, we have not listed the earlier, less polished, conference version. Of course this justifies the fear that some of the authors had! We have not hesitated to give online references where these are the only possible ones. We believe that the problem of long-term archiving of online materials will be solved. We have tried to avoid any errors, but in a book of this size it is likely that some remain. The authors at first thought to resolve this issue by having each one blame the other for any mistakes, but then decided instead to request that readers notify at least one of us of any errors. We will then correct them in later editions, or via a posting of online errata. We would like to thank our institutions, the State University of New York at Buffalo (T.W.C.), and Naval Postgraduate School and Institute of Mathematics of the Romanian Academy (P.S.), for their excellent working conditions, and for allowing us to take some time off, while this book was written. The authors express their gratitude to the following people who undertook the task of going through the various parts of this book in its incipient form: Anna Bernasconi, David Canright, Claude Carlet, Bruno Codenotti, Ed Dawson, Hal Fredricksen, Subhamoy Maitra, and Yuliang Zheng. The second author also thanks the group of students in the ‘Cryptographic Boolean Functions’ course at Naval Postgraduate School who diligently went through the manuscript in the Fall of 2008. Thomas W. Cusick Buffalo, NY Pantelimon St?anic?a Monterey, CA September 2008 本资源免费奉送,2.39 MB。 -------------------------------------------------------------------------------------------------------- Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf -------------------------------------------------------------------------------------------------------- |
» 猜你喜欢
Bioresource Technology期刊,第一次返修的时候被退回好几次了
已经有7人回复
2025冷门绝学什么时候出结果
已经有4人回复
真诚求助:手里的省社科项目结项要求主持人一篇中文核心,有什么渠道能发核心吗
已经有8人回复
寻求一种能扛住强氧化性腐蚀性的容器密封件
已经有5人回复
请问哪里可以有青B申请的本子可以借鉴一下。
已经有4人回复
孩子确诊有中度注意力缺陷
已经有14人回复
请问下大家为什么这个铃木偶联几乎不反应呢
已经有5人回复
请问有评职称,把科研教学业绩算分排序的高校吗
已经有5人回复
天津工业大学郑柳春团队欢迎化学化工、高分子化学或有机合成方向的博士生和硕士生加入
已经有4人回复
康复大学泰山学者周祺惠团队招收博士研究生
已经有6人回复
找到一些相关的精华帖子,希望有用哦~
少有人走的路3 英文原版(The Road Less Traveled and Beyond)【转载】
已经有65人回复
RSC的杂志,拒稿重投(reject and resubmssion)还需要回复审稿人意见吗?
已经有6人回复
Bioactive Food Proteins and Peptides: Applications in Human Health
已经有123人回复
Thin Film Metal-Oxides---Fundamentals and Applications in Electronics and Energy
已经有143人回复
投稿给Materials Science and Engineering A, 编辑退回来让改,麻烦各位给看一下
已经有5人回复
Food and Nutrition 这个杂志大家熟悉吗?
已经有13人回复
如何处理玻碳电极,我处理的永远在200mV左右
已经有8人回复
有投过JNN(Journal of Nanosciece and Nanotechnology)的同学吗
已经有12人回复
请问Fixed and random effects, 固定和随机描述统计量有什么意义?
已经有10人回复
Composites Science and Technology 图片和关键词问题??????
已经有14人回复
【资源】每天学一个词(3月25日)a cat and dog life
已经有12人回复
科研从小木虫开始,人人为我,我为人人













回复此楼
点击这里搜索更多相关资源