Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
Computer Science --- Engineering & Applied Sciences --- Coding theory. --- Cryptography. --- Algebra, Boolean. --- Boolean algebra --- Boole's algebra --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Algebraic logic --- Set theory --- Data structures (Computer science) --- Computer security. --- Computer science. --- Data Structures and Information Theory. --- Systems and Data Security. --- Mathematics of Computing. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data structures (Computer scienc. --- Data structures (Computer science). --- Computer science—Mathematics.
Choose an application
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptologie --- computers --- informatica --- externe fixatie (geneeskunde --- wiskunde --- programmatielogica --- computerbeveiliging --- computerkunde
Choose an application
This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- informatica --- netwerken (informatica) --- algoritmen --- computerbeveiliging --- mobiele communicatie
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Data encryption (Computer science) --- Computer security --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Application software. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Computer Appl. in Administrative Data Processing. --- e-Commerce/e-business. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Computer software. --- Information systems. --- Cryptology. --- Software, Computer --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Data protection. --- Cryptography. --- Information technology—Management. --- Electronic commerce. --- Data and Information Security. --- Computer Application in Administrative Data Processing. --- e-Commerce and e-Business. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
Listing 1 - 5 of 5 |
Sort by
|