24小时热门版块排行榜    

Znn3bq.jpeg
查看: 419  |  回复: 0

[资源] 【分享】Cryptographic Boolean Functions and Applications.Apress.2009[New]

Cryptographic Boolean Functions and Applications
本资源来自于互联网,仅供学习研究之用,不可涉及任何商业用途,请在下载后24小时内删除。
著作权归原作者或出版社所有。未经发贴人conanwj许可,严禁任何人以任何形式转贴本文,违者必究!

Authors(Editors):
        Thomas W. Cusick
        Pantelimon Stanica
Publisher: Apress
Pub Date: 2009
Pages: 245
ISBN: 978-0-1237-4890-4

Preface
Boolean functions have been an object of study in cryptography for over 50 years,
beginning with their use in linear feedback shift registers. It was in the late 1940s that
Shannon published the concepts of confusion and diffusion as fundamental concepts for
achieving security in cryptosystems. Confusion is reflected in the nonlinearity of parts
of the cryptosystem; linear systems are generally easy to break. Diffusion is achieved by
ensuring that a small change in the input is spread out to make a large change in the
output. Boolean functions can easily provide both confusion and diffusion. One goal of
this book is to show how to choose good Boolean functions for this purpose.
The book is designed to serve as a reference for various applications of Boolean
functions in modern cryptography, which we can say is about 35 years old. The relevant
material in the literature is scattered over hundreds of journal articles, conference
proceedings, books, reports and notes (some of them only available online). Until this
book, there has been no attempt to gather the gist of this material in one place. Our goal
is to present the major concepts and associated theorems, with proofs, except in those
cases where the proofs would be too long or too technical. The book is expository and
we have attempted to be accurate in assigning credit for the many results quoted here.
There is some original research in the book, and we have made quite a few corrections
and improvements to earlier work.
The bibliography is extensive, but is not intended to be all-inclusive. In particular, it is
common in cryptography for research which has been first published in the proceedings
of a conference (‘conference version’) to be published later (perhaps with refinements or
improvements) in a journal (‘journal version’). Many authors seem to fear that publishing
only a conference version will lead to their results not being as widely read or referred
to. In some cases where a more complete journal version of an article is available, we
have not listed the earlier, less polished, conference version. Of course this justifies the
fear that some of the authors had! We have not hesitated to give online references where
these are the only possible ones. We believe that the problem of long-term archiving of
online materials will be solved.
We have tried to avoid any errors, but in a book of this size it is likely that some
remain. The authors at first thought to resolve this issue by having each one blame the
other for any mistakes, but then decided instead to request that readers notify at least
one of us of any errors. We will then correct them in later editions, or via a posting of
online errata.
We would like to thank our institutions, the State University of New York at Buffalo
(T.W.C.), and Naval Postgraduate School and Institute of Mathematics of the Romanian
Academy (P.S.), for their excellent working conditions, and for allowing us to take some
time off, while this book was written.
The authors express their gratitude to the following people who undertook the task
of going through the various parts of this book in its incipient form: Anna Bernasconi,
David Canright, Claude Carlet, Bruno Codenotti, Ed Dawson, Hal Fredricksen,
Subhamoy Maitra, and Yuliang Zheng. The second author also thanks the group of students
in the ‘Cryptographic Boolean Functions’ course at Naval Postgraduate School
who diligently went through the manuscript in the Fall of 2008.
Thomas W. Cusick
Buffalo, NY
Pantelimon St?anic?a
Monterey, CA
September 2008


本资源免费奉送,2.39 MB。


--------------------------------------------------------------------------------------------------------

Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf

--------------------------------------------------------------------------------------------------------
回复此楼

» 猜你喜欢

已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

智能机器人

Robot (super robot)

我们都爱小木虫

相关版块跳转 我要订阅楼主 conanwj 的主题更新
☆ 无星级 ★ 一星级 ★★★ 三星级 ★★★★★ 五星级
普通表情 高级回复 (可上传附件)
最具人气热帖推荐 [查看全部] 作者 回/看 最后发表
[考研] 一志愿安大生物学07初试322、本科二本、调剂求助 +9 李多米lee. 2026-04-12 10/500 2026-04-12 22:10 by 独醉梦孤城
[考研] 一志愿085802 323分求调剂 +11 drizzle_9 2026-04-12 12/600 2026-04-12 22:07 by fqwang
[硕博家园] 新一代电子信息294求调剂 不挑学校 +7 Ytyt11 2026-04-09 8/400 2026-04-12 16:57 by ajpv风雷
[考研] 电气专硕320求调剂 +6 小麻子111 2026-04-10 6/300 2026-04-12 10:54 by lemon6009
[考研] 一志愿厦大0856,306求调剂 +15 Bblinging 2026-04-11 15/750 2026-04-11 22:53 by 314126402
[考研] 274求调剂求调剂 +11 Jachenbingoo 2026-04-06 14/700 2026-04-11 11:37 by 紫曦紫棋
[考研] 化工求调剂! +35 RichLi_ 2026-04-06 35/1750 2026-04-11 11:02 by zhq0425
[考研] 085404 293求调剂 +9 勇远库爱314 2026-04-06 10/500 2026-04-11 10:36 by 紫曦紫棋
[考研] 农业管理302分求调剂 +3 xuening1 2026-04-10 3/150 2026-04-11 10:18 by zhq0425
[考研] 293求调剂 +6 勇远库爱314 2026-04-08 6/300 2026-04-11 10:08 by zhq0425
[考研] 284求调剂 +12 archer.. 2026-04-10 13/650 2026-04-11 08:44 by zhq0425
[考研] 22408 366分,本科211,一志愿西工大 +4 Rubt 2026-04-09 4/200 2026-04-10 19:51 by chemisry
[考研] 362求调剂 +10 我要考大 2026-04-06 14/700 2026-04-10 17:00 by luoyongfeng
[考研] 292求调剂 +9 笑笑袁 2026-04-09 9/450 2026-04-10 10:05 by LHGeng
[考博] 博士自荐 +7 可可小胖 2026-04-08 7/350 2026-04-10 08:28 by kimhero
[考研] 338求调剂 +8 wxygxsaaaaa 2026-04-06 8/400 2026-04-08 06:58 by 无际的草原
[考研] 求考研材料调剂 +3 材化李可 2026-04-07 3/150 2026-04-08 00:21 by JourneyLucky
[考研] 316求调剂 +4 15318418673 2026-04-07 4/200 2026-04-07 22:12 by hemengdong
[考研] 327考研调剂推荐 +6 呜呜呜呜呢 2026-04-06 6/300 2026-04-06 21:39 by 啵啵啵0119
[考研] 求调剂到材料 +5 程9915 2026-04-06 5/250 2026-04-06 15:21 by yulian1987
信息提示
请填处理意见