Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2008 (1)

Listing 1 - 1 of 1
Sort by

Book
Finite automata and application to cryptography
Author:
ISBN: 3540782567 9786612038198 1282038192 3540782575 Year: 2008 Publisher: Berlin : Beijing : Springer ; Tsinghua University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed. Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed. The book may be used as a reference for computer science and mathematics majors, including seniors and graduate students. Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing. .

Keywords

Sequential machine theory. --- Cryptography. --- Finite automata --- Finite state machines (Machine theory) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Mathematics. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Mathematics, general. --- Computer Communication Networks. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Machine theory --- Electronic digital computers --- Cryptology. --- Math --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing

Listing 1 - 1 of 1
Sort by