[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

[图书][B] Orthogonal arrays: theory and applications

AS Hedayat, NJA Sloane, J Stufken - 2012 - books.google.com
Orthogonal arrays have played a vital role in improving the quality of products manufactured
throughout the world. This first book on the subject since its introduction more than fifty years …

[图书][B] Signal design for good correlation: for wireless communication, cryptography, and radar

SW Golomb, G Gong - 2005 - books.google.com
This book provides a comprehensive, up-to-date description of the methodologies and the
application areas, throughout the range of digital communication, in which individual signals …

Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

Algebraic attacks on stream ciphers with linear feedback

NT Courtois, W Meier - … 2003: International Conference on the Theory and …, 2003 - Springer
A classical construction of stream ciphers is to combine several LFSRs and a highly non-
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …

Vectorial Boolean Functions for Cryptography.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
This chapter deals with multi-output Boolean functions viewed from a cryptographic
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …

[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …

Fast algebraic attacks on stream ciphers with linear feedback

NT Courtois - Advances in Cryptology-CRYPTO 2003: 23rd Annual …, 2003 - Springer
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs.
Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation …

Algebraic attacks and decomposition of Boolean functions

W Meier, E Pasalic, C Carlet - … International Conference on the Theory and …, 2004 - Springer
Algebraic attacks on LFSR-based stream ciphers recover the secret key by solving an
overdefined system of multivariate algebraic equations. They exploit multivariate relations …