By Lilya Budaghyan
This booklet covers novel learn on building and research of optimum cryptographic features resembling virtually excellent nonlinear (APN), nearly bent (AB), planar and bent features. those capabilities have optimum resistance to linear and/or differential assaults, that are the 2 strongest assaults on symmetric cryptosystems. in addition to cryptographic functions, those services are major in lots of branches of arithmetic and knowledge idea together with coding concept, combinatorics, commutative algebra, finite geometry, series layout and quantum info concept. the writer analyzes equivalence family members for those capabilities and develops a number of new tools for development in their countless households. moreover, the booklet deals suggestions to 2 longstanding open difficulties, together with the matter on characterization of APN and AB capabilities through Boolean, and the matter at the relation among periods of bent functions.
Read Online or Download Construction and Analysis of Cryptographic Functions PDF
Best information theory books
Database and XML Technologies: 5th International XML Database Symposium, XSym 2007, Vienna, Austria, September 23-24, 2007, Proceedings
This e-book constitutes the refereed court cases of the fifth overseas XML Database Symposium, XSym 2007, held in Vienna, Austria, in September 2007 together with the overseas convention on Very huge facts Bases, VLDB 2007. The eight revised complete papers including 2 invited talks and the prolonged summary of one panel consultation have been conscientiously reviewed and chosen from 25 submissions.
Describes the transformation/movement of chemical compounds in an international context and is designed for classes facing a few facets of biogeochemical cycles. equipped in 3 sections, it covers earth sciences, aspect cycles and a synthesis of up to date environmental concerns.
- Explicit Nonlinear Model Predictive Control: Theory and Applications
- Codes et turbocodes
- Codes et turbocodes
- Linear Algebra, Rational Approximation Orthogonal Polynomials
Extra info for Construction and Analysis of Cryptographic Functions
P. Charpin and G. M. Kyureghyan. Cubic monomial bent functions: A subclass of M. SIAM Journal on Discrete Mathematics, vol. 22, no. 2, pp. 650–665, 2008. 42. Y. M. Chee, Y. Tan, and X. D. Zhang, “Strongly regular graphs constructed from p-ary bent functions,” J. , vol. 34, no. 2, pp. 251–266, Sep. 2011. 43. S. D. Cohen and M. J. Ganley. Commutative semifields, two-dimensional over there middle nuclei. J. Algebra 75, pp. 373–385, 1982. 44. R. S. Coulter and M. Henderson. Commutative presemifields and semifields.
Math. Soc 7, pp. 370–390, 1906. 51. L. E. Dickson. On commutative linear algebras in which division is always uniquely possible. Trans. Amer. Math. Soc 7, pp. 514–522, 1906. 52. L. E. Dickson. Linear algebras with associativity not assumed. Duke Math. J. 1, pp. 113–125, 1935. 53. J. F. Dillon. A survey of bent functions. NSA Technical Journal Special Issue, pp. 191–215, 1972. 54. J. F. Dillon. Elementary Hadamard Difference sets. Ph. D. Thesis, Univ. of Maryland, 1974. 55. J. F. Dillon and H. , vol.
L. Budaghyan, C. Carlet, G. Leander. On inequivalence between known power APN functions. Proceedings of the International Workshop on Boolean Functions: Cryptography and Applications, BFCA 2008, Copenhagen, Denmark, May 2008. 27. L. Budaghyan, C. Carlet, G. Leander. On a construction of quadratic APN functions. Proceedings of IEEE Information Theory Workshop, ITW’09, pp. 374–378, Taormina, Sicily, Oct. 2009. 28. L. Budaghyan, C. Carlet, G. Leander. Constructing new APN functions from known ones.