[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
[图书][B] Orthogonal arrays: theory and applications
AS Hedayat, NJA Sloane, J Stufken - 2012 - books.google.com
Orthogonal arrays have played a vital role in improving the quality of products manufactured
throughout the world. This first book on the subject since its introduction more than fifty years …
throughout the world. This first book on the subject since its introduction more than fifty years …
[图书][B] Signal design for good correlation: for wireless communication, cryptography, and radar
SW Golomb, G Gong - 2005 - books.google.com
This book provides a comprehensive, up-to-date description of the methodologies and the
application areas, throughout the range of digital communication, in which individual signals …
application areas, throughout the range of digital communication, in which individual signals …
Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Algebraic attacks on stream ciphers with linear feedback
NT Courtois, W Meier - … 2003: International Conference on the Theory and …, 2003 - Springer
A classical construction of stream ciphers is to combine several LFSRs and a highly non-
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …
linear Boolean function f. Their security is usually analysed in terms of correlation attacks …
Vectorial Boolean Functions for Cryptography.
This chapter deals with multi-output Boolean functions viewed from a cryptographic
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …
viewpoint, that is, functions from the vector space Fn2, of all binary vectors of length n, to the …
[PDF][PDF] Analysis and design of cryptographic hash functions
B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …
hash functions for protecting the authenticity of information is demonstrated. Applications …
Fast algebraic attacks on stream ciphers with linear feedback
NT Courtois - Advances in Cryptology-CRYPTO 2003: 23rd Annual …, 2003 - Springer
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs.
Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation …
Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation …
Algebraic attacks and decomposition of Boolean functions
Algebraic attacks on LFSR-based stream ciphers recover the secret key by solving an
overdefined system of multivariate algebraic equations. They exploit multivariate relations …
overdefined system of multivariate algebraic equations. They exploit multivariate relations …