0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016): Chuankun Wu, Dengguo Feng Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R4,017 Discovery Miles 40 170 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings... Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Dengguo Feng, Dongdai Lin, Moti Yung
R1,570 Discovery Miles 15 700 Ships in 18 - 22 working days

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions."

Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016): Chuankun... Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings... Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings (Paperback, 2013)
Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
R2,703 Discovery Miles 27 030 Ships in 18 - 22 working days

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crescent City: 3-Book Collection - House…
Sarah J. Maas Paperback R1,035 R700 Discovery Miles 7 000
An Exposition With Practical…
Jeremiah Burroughs Hardcover R1,048 Discovery Miles 10 480
Too Wild To Tame
Tessa Bailey Paperback R288 R261 Discovery Miles 2 610
Seeking Sanctuary - Stories of…
John Marnell Paperback R420 R388 Discovery Miles 3 880
Mathematical Foundations for…
DG Dudley Hardcover R4,283 Discovery Miles 42 830
CORE Hypnosis - A Compassion Informed…
Harry Stefanakis Hardcover R948 Discovery Miles 9 480
Love Beyond Belief - Finding the Access…
Thandeka Hardcover R881 Discovery Miles 8 810
Outlines of Cosmic Philosophy - Based on…
John Fiske Paperback R676 Discovery Miles 6 760
Ruthless Vows - Letters Of Enchantment…
Rebecca Ross Paperback R402 Discovery Miles 4 020
Illustrations of Universal Progress - a…
Herbert Spencer Paperback R641 Discovery Miles 6 410

 

Partners