The Resource Bent functions : results and applications to cryptography, by Natalia Tokareva

Bent functions : results and applications to cryptography, by Natalia Tokareva

Label
Bent functions : results and applications to cryptography
Title
Bent functions
Title remainder
results and applications to cryptography
Statement of responsibility
by Natalia Tokareva
Creator
Author
Subject
Language
eng
Summary
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more
Cataloging source
N$T
Dewey number
511.3/3
Illustrations
illustrations
Index
index present
LC call number
QA341
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Label
Bent functions : results and applications to cryptography, by Natalia Tokareva
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • ""Front Cover""; ""Bent Functions: Results and Applications to Cryptography""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Notation""; ""Chapter 1: Boolean Functions""; ""Introduction""; ""1.1 Definitions""; ""1.2 Algebraic Normal Form""; ""1.3 Boolean Cube and Hamming Distance""; ""1.4 Extended Affinely Equivalent Functions""; ""1.5 Walsh-Hadamard Transform""; ""1.6 Finite Field and Boolean Functions""; ""1.7 Trace Function""; ""1.8 Polynomial Representation of a Boolean Function""; ""1.9 Trace Representation of a Boolean Function""; ""1.10 Monomial Boolean Functions""
  • ""4.3 Cryptography: Bent Functions in CAST""""4.4 Cryptography: Bent Functions in Grain""; ""4.5 Cryptography: Bent Functions in HAVAL""; ""4.6 Hadamard Matrices and Graphs""; ""4.7 Links to Coding Theory""; ""4.8 Bent Sequences""; ""4.9 Mobile Networks, CDMA""; ""4.10 Remarks""; ""Chapter 5: Properties of Bent Functions""; ""Introduction""; ""5.1 Degree of a Bent Function""; ""5.2 Affine Transformations of Bent Functions""; ""5.3 Rank of a Bent Function""; ""5.4 Dual Bent Functions""; ""5.5 Other Properties""; ""Chapter 6: Equivalent Representations of Bent Functions""; ""Introduction""
  • ""6.1 Hadamard Matrices""""6.2 Difference Sets""; ""6.3 Designs""; ""6.4 Linear Spreads""; ""6.5 Sets of Subspaces""; ""6.6 Strongly Regular Graphs""; ""6.7 Bent Rectangles""; ""Chapter 7: Bent Functions with a Small Number of Variables""; ""Introduction""; ""7.1 Two and Four Variables""; ""7.2 Six Variables""; ""7.3 Eight Variables""; ""7.4 Ten and More Variables""; ""7.5 Algorithms for Generation of Bent Functions""; ""7.6 Concluding Remarks""; ""Chapter 8: Combinatorial Constructions of Bent Functions""; ""Introduction""; ""8.1 Rothaus's Iterative Construction""
  • ""8.2 Maiorana-McFarland Class""""8.3 Partial Spreads: PS+, PS-""; ""8.4 Dillon's Bent Functions: PSap""; ""8.5 Dobbertin's Construction""; ""8.6 More Iterative Constructions""; ""8.7 Minterm Iterative Constructions""; ""8.8 Bent Iterative Functions: BI""; ""8.9 Other Constructions""; ""Chapter 9: Algebraic Constructions of Bent Functions""; ""Introduction""; ""9.1 An Algebraic Approach""; ""9.2 Bent Exponents: General Properties""; ""9.3 Gold Bent Functions""; ""9.4 Dillon Exponent""; ""9.5 Kasami Bent Functions""; ""9.6 Canteaut-Leander Bent Functions (MF-1)""
  • ""Chapter 2: Bent Functions: An Introduction""""Introduction""; ""2.1 Definition of a Nonlinearity""; ""2.2 Nonlinearity of a Random Boolean Function""; ""2.3 Definition of a Bent Function""; ""2.4 If n Is Odd?""; ""2.5 Open Problems""; ""2.6 Surveys""; ""Chapter 3: History of Bent Functions""; ""Introduction""; ""3.1 Oscar Rothaus""; ""3.2 V.A. Eliseev and O.P. Stepchenkov""; ""3.3 From the 1970s to the Present""; ""Chapter 4: Applications of Bent Functions""; ""Introduction""; ""4.1 Cryptography: Linear Cryptanalysis and Boolean Functions""; ""4.2 Cryptography: One Historical Example""
Control code
ocn919201561
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9780128025550
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations (some color)
http://library.link/vocab/ext/overdrive/overdriveId
825603
Quality assurance targets
unknown
http://library.link/vocab/recordID
.b34901474
Sound
unknown sound
Specific material designation
remote
System control number
  • (OCoLC)919201561
  • ebl0128025557

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...