[资源] [PDF]Cryptographic Boolean Functions and Applications.Apress.2009[New]

[复制链接]
查看: 1525|回复: 0
发表于 2009-9-23 09:40:22 | 显示全部楼层 |阅读模式
Cryptographic Boolean Functions and Applications


本资源来自于互联网,仅供学习研究之用,不可涉及任何商业用途,请在下载后24小时内删除。



著作权归原作者或出版社所有。未经发贴人conanwj许可,严禁任何人以任何形式转贴本文,违者必究!




Authors(Editors):

        Thomas W. Cusick

        Pantelimon Stanica

Publisher: Apress

Pub Date: 2009

Pages: 245

ISBN: 978-0-1237-4890-4



Preface

Boolean functions have been an object of study in cryptography for over 50 years,

beginning with their use in linear feedback shift registers. It was in the late 1940s that

Shannon published the concepts of confusion and diffusion as fundamental concepts for

achieving security in cryptosystems. Confusion is reflected in the nonlinearity of parts

of the cryptosystem; linear systems are generally easy to break. Diffusion is achieved by

ensuring that a small change in the input is spread out to make a large change in the

output. Boolean functions can easily provide both confusion and diffusion. One goal of

this book is to show how to choose good Boolean functions for this purpose.

The book is designed to serve as a reference for various applications of Boolean

functions in modern cryptography, which we can say is about 35 years old. The relevant

material in the literature is scattered over hundreds of journal articles, conference

proceedings, books, reports and notes (some of them only available online). Until this

book, there has been no attempt to gather the gist of this material in one place. Our goal

is to present the major concepts and associated theorems, with proofs, except in those

cases where the proofs would be too long or too technical. The book is expository and

we have attempted to be accurate in assigning credit for the many results quoted here.

There is some original research in the book, and we have made quite a few corrections

and improvements to earlier work.

The bibliography is extensive, but is not intended to be all-inclusive. In particular, it is

common in cryptography for research which has been first published in the proceedings

of a conference (‘conference version’) to be published later (perhaps with refinements or

improvements) in a journal (‘journal version’). Many authors seem to fear that publishing

only a conference version will lead to their results not being as widely read or referred

to. In some cases where a more complete journal version of an article is available, we

have not listed the earlier, less polished, conference version. Of course this justifies the

fear that some of the authors had! We have not hesitated to give online references where

these are the only possible ones. We believe that the problem of long-term archiving of

online materials will be solved.

We have tried to avoid any errors, but in a book of this size it is likely that some

remain. The authors at first thought to resolve this issue by having each one blame the

other for any mistakes, but then decided instead to request that readers notify at least

one of us of any errors. We will then correct them in later editions, or via a posting of

online errata.

We would like to thank our institutions, the State University of New York at Buffalo

(T.W.C.), and Naval Postgraduate School and Institute of Mathematics of the Romanian

Academy (P.S.), for their excellent working conditions, and for allowing us to take some

time off, while this book was written.

The authors express their gratitude to the following people who undertook the task

of going through the various parts of this book in its incipient form: Anna Bernasconi,

David Canright, Claude Carlet, Bruno Codenotti, Ed Dawson, Hal Fredricksen,

Subhamoy Maitra, and Yuliang Zheng. The second author also thanks the group of students

in the ‘Cryptographic Boolean Functions’ course at Naval Postgraduate School

who diligently went through the manuscript in the Fall of 2008.

Thomas W. Cusick

Buffalo, NY

Pantelimon St?anic?a

Monterey, CA

September 2008





本资源免费奉送,共7个可选网络硬盘链接,2.39 MB,保质期2009-11-15。

--------------------------------------------------------------------------------------------------------


Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf



Cryptographic Boolean Functions and Applications.Thomas W. Cusick.Apress.2009.pdf


--------------------------------------------------------------------------------------------------------
回复

使用道具 举报

精彩图文
Copyright;  © 新科学想法 2016-2017   浙公网安备 33010202000686号   ( 浙ICP备09035230号-1 )