
By Lilya Budaghyan
This ebook covers novel study on building and research of optimum cryptographic services corresponding to virtually ideal nonlinear (APN), nearly bent (AB), planar and bent services. those features have optimum resistance to linear and/or differential assaults, that are the 2 strongest assaults on symmetric cryptosystems. in addition to cryptographic purposes, those capabilities are major in lots of branches of arithmetic and knowledge idea together with coding conception, combinatorics, commutative algebra, finite geometry, series layout and quantum info idea. the writer analyzes equivalence family members for those capabilities and develops a number of new equipment for building in their limitless households. furthermore, the e-book bargains strategies to 2 longstanding open difficulties, together with the matter on characterization of APN and AB services through Boolean, and the matter at the relation among sessions of bent functions.
Read or Download Construction and Analysis of Cryptographic Functions PDF
Best information theory books
This exact quantity provides a brand new process - the overall concept of knowledge - to medical figuring out of data phenomena. in line with a radical research of knowledge tactics in nature, expertise, and society, in addition to at the major instructions in details thought, this concept synthesizes current instructions right into a unified approach.
Managing Economies, Trade and International Business
The present part of globalization and the elevated interconnectedness of economies via exchange have prompted the administration and development charges of economies and likewise the aggressive and managerial concerns for corporations. This e-book specializes in 3 major matters – financial progress and sustainable improvement; exchange, legislation and law; and aggressive and managerial matters in foreign company – from a multidisciplinary, transversal and eclectic viewpoint.
Efficient Secure Two-Party Protocols: Techniques and Constructions
The authors current a finished examine of effective protocols and methods for safe two-party computation – either common structures that may be used to soundly compute any performance, and protocols for particular difficulties of curiosity. The publication specializes in options for developing effective protocols and proving them safe.
Information Theory and Best Practices in the IT Industry
The significance of benchmarking within the carrier region is easily well-known because it is helping in non-stop development in items and paintings methods. via benchmarking, businesses have strived to enforce most sensible practices in an effort to stay aggressive within the product- marketplace within which they function. although experiences on benchmarking, fairly within the software program improvement region, have overlooked utilizing a number of variables and accordingly haven't been as finished.
Extra info for Construction and Analysis of Cryptographic Functions
Example text
Budaghyan, C. Carlet, A. Pott. New Classes of Almost Bent and Almost Perfect Nonlinear Functions. IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 1141–1152, March 2006. 25. L. Budaghyan, C. Carlet, G. Leander. Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inform. Theory, 54(9), pp. 4218–4229, 2008. 26. L. Budaghyan, C. Carlet, G. Leander. On inequivalence between known power APN functions. Proceedings of the International Workshop on Boolean Functions: Cryptography and Applications, BFCA 2008, Copenhagen, Denmark, May 2008.
118, no. 8, pp. 2392–2410, Nov. 2011. 38. C. Carlet, P. Charpin and V. Zinoviev. Codes, bent functions and permutations suitable for DES-like cryptosystems. Designs, Codes and Cryptography, 15(2), pp. 125–156, 1998. 39. F. Chabaud and S. Vaudenay. Links between differential and linear cryptanalysis, Advances in Cryptology -EUROCRYPT’94, LNCS, Springer-Verlag, New York, 950, pp. 356–365, 1995. 40. P. Charpin, G. Kyureghyan. On a class of permutation polynomials over F2n . Proceedings of SETA 2008, Lecture Notes in Computer Science 5203, pp.
Inform. Theory, vol. 52, no. 2, pp. 744–747, Feb. 2006. 66. M. J. Ganley. Central weak nucleus semifields. European J. Combin. 2, pp. 339–347, 1981. 67. R. Gold. Maximal recursive sequences with 3-valued recursive crosscorrelation functions. IEEE Trans. Inform. Theory, 14, pp. 154–156, 1968. 68. G. Gong, T. Helleseth, H. Hu, and A. Kholosha. On the dual of certain ternary weakly regular bent functions. IEEE Trans. Inf. Theory , 58(4), pp. 2237–2243, 2012. 69. T. Helleseth and A. Kholosha. Monomial and quadratic bent functions over the finite fields of odd characteristic.