|
|
Showing 1 - 5 of
5 matches in All Departments
This book focuses on the different representations and
cryptographic properties of Booleans functions, presents
constructions of Boolean functions with some good cryptographic
properties. More specifically, Walsh spectrum description of the
traditional cryptographic properties of Boolean functions,
including linear structure, propagation criterion, nonlinearity,
and correlation immunity are presented. Constructions of symmetric
Boolean functions and of Boolean permutations with good
cryptographic properties are specifically studied. This book is not
meant to be comprehensive, but with its own focus on some original
research of the authors in the past. To be self content, some basic
concepts and properties are introduced. This book can serve as a
reference for cryptographic algorithm designers, particularly the
designers of stream ciphers and of block ciphers, and for academics
with interest in the cryptographic properties of Boolean functions.
The book summarizes key concepts and theories in trusted computing,
e.g., TPM, TCM, mobile modules, chain of trust, trusted software
stack etc, and discusses the configuration of trusted platforms and
network connections. It also emphasizes the application of such
technologies in practice, extending readers from computer science
and information science researchers to industrial engineers.
|
Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Dengguo Feng, Dongdai Lin, Moti Yung
|
R1,570
Discovery Miles 15 700
|
Ships in 18 - 22 working days
|
The ?rst SKLOIS Conference on Information Security and
Cryptography(CISC 2005) was organized by the State Key Laboratory
of Information Security of the Chinese Academy of Sciences. It was
held in Beijing, China, December
15-17,2005andwassponsoredbytheInstituteofSoftware,
theChineseAcademy of Sciences, the Graduate School of the Chinese
Academy of Sciences and the National Science Foundation of China.
The conference proceedings, represe- ing invited and contributed
papers, are published in this volume of Springer s Lecture Notes in
Computer Science (LNCS) series. The area of research covered by
CISC has been gaining importance in recent years, and a lot of
fundamental, experimental and applied work has been done, advancing
the state of the art. The program of CISC 2005 covered numerous
?elds of research within the general scope of the conference. The
International Program Committee of the conference received a total
of 196 submissions (from 21 countries). Thirty-three submissions
were selected for presentation as regular papers and are part of
this volume. In addition to this track, the conference also hosted
a short-paper track of 32 presentations that were carefully
selected as well. All submissions were reviewed by experts in the
relevant areas and based on their ranking and strict selection
criteria the papers were selected for the various tracks. We note
that stricter criteria were applied to papers co-authored by
program committee members. We further note that, obviously, no
member took part in in?uencing the ranking of his or her own
submissions."
This book focuses on the different representations and
cryptographic properties of Booleans functions, presents
constructions of Boolean functions with some good cryptographic
properties. More specifically, Walsh spectrum description of the
traditional cryptographic properties of Boolean functions,
including linear structure, propagation criterion, nonlinearity,
and correlation immunity are presented. Constructions of symmetric
Boolean functions and of Boolean permutations with good
cryptographic properties are specifically studied. This book is not
meant to be comprehensive, but with its own focus on some original
research of the authors in the past. To be self content, some basic
concepts and properties are introduced. This book can serve as a
reference for cryptographic algorithm designers, particularly the
designers of stream ciphers and of block ciphers, and for academics
with interest in the cryptographic properties of Boolean functions.
|
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings (Paperback, 2013)
Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
|
R2,703
Discovery Miles 27 030
|
Ships in 18 - 22 working days
|
This book constitutes the proceedings of the 5th International
Symposium on Cyberspace Safety and Security, CSS 2013, held in
Zhangjiajie, China, in November 2013. The 30 full papers presented
in this volume were carefully reviewed and selected from 105
submissions. In addition the book contains 6 workshop papers. The
papers are organized in topical sections named: data and
applications security; network and communications security;
software and systems security; and cloud security and cyberspace
safety.
|
|