0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016): Chuankun... Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R3,721 Discovery Miles 37 210 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016): Chuankun Wu, Dengguo Feng Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R4,755 Discovery Miles 47 550 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings... Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Dengguo Feng, Dongdai Lin, Moti Yung
R1,747 Discovery Miles 17 470 Ships in 10 - 15 working days

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions."

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R4,112 Discovery Miles 41 120 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings... Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings (Paperback, 2013)
Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Jeronimo Walkie Talkie Game
 (2)
R360 R328 Discovery Miles 3 280
Sony PlayStation 5 DualSense Wireless…
 (2)
R1,599 R1,479 Discovery Miles 14 790
Alcolin Mounting Tape 40 Square Pads…
R35 Discovery Miles 350
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Bostik Clear on Blister Card (25ml)
R33 Discovery Miles 330
Pure Pleasure Electric Over Blanket
R1,337 Discovery Miles 13 370
Farm Killings In South Africa
Nechama Brodie Paperback R335 R288 Discovery Miles 2 880
Cricut Joy Machine
 (6)
R4,854 Discovery Miles 48 540
Peptine Pro Equine Hydrolysed Collagen…
R699 R589 Discovery Miles 5 890
Marltons Goldfish Flakes (40g)
R50 R35 Discovery Miles 350

 

Partners