0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016): Chuankun... Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R3,721 Discovery Miles 37 210 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016): Chuankun Wu, Dengguo Feng Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R4,755 Discovery Miles 47 550 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings... Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Dengguo Feng, Dongdai Lin, Moti Yung
R1,747 Discovery Miles 17 470 Ships in 10 - 15 working days

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions."

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R4,112 Discovery Miles 41 120 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings... Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings (Paperback, 2013)
Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Dala Craft Pom Poms - Assorted Colours…
R36 Discovery Miles 360
Efekto 77300-P Nitrile Gloves (L)(Pink)
R63 Discovery Miles 630
Shield Sheen Xtreme (Strawberry) (750ml)
R97 Discovery Miles 970
Cricut Joy Machine
 (6)
R4,734 Discovery Miles 47 340
Bestway Spiderman Swim Ring (Diameter…
R48 Discovery Miles 480
Cable Guy Ikon "Light Up" Marvel…
R543 Discovery Miles 5 430
Jumbo Puzzle Mates Puzzle & Roll Storage…
 (4)
R699 R639 Discovery Miles 6 390
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990

 

Partners