Cryptographic Boolean functions and applications:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Academic Press/Elsevier
2009
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic Includes bibliographical references (p. 209-227) and index |
Beschreibung: | 1 Online-Ressource (xii, 232 p.) |
ISBN: | 9780123748904 0123748909 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300884 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780123748904 |9 978-0-12-374890-4 | ||
020 | |a 0123748909 |9 0-12-374890-9 | ||
035 | |a (OCoLC)528581497 | ||
035 | |a (DE-599)BVBBV042300884 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.82 |2 22 | |
100 | 1 | |a Cusick, Thomas W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptographic Boolean functions and applications |c Thomas W. Cusick and Pantelimon Stănică |
250 | |a 1st ed | ||
264 | 1 | |a Amsterdam |b Academic Press/Elsevier |c 2009 | |
300 | |a 1 Online-Ressource (xii, 232 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic | ||
500 | |a Includes bibliographical references (p. 209-227) and index | ||
650 | 7 | |a Algebra, Boolean |2 fast | |
650 | 7 | |a Computer algorithms |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Algebra, Boolean | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer algorithms | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Boolesche Funktion |0 (DE-588)4146281-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Boolesche Funktion |0 (DE-588)4146281-6 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Stănică, Pantelimon |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123748904 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737876 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152878767538176 |
---|---|
any_adam_object | |
author | Cusick, Thomas W. |
author_facet | Cusick, Thomas W. |
author_role | aut |
author_sort | Cusick, Thomas W. |
author_variant | t w c tw twc |
building | Verbundindex |
bvnumber | BV042300884 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)528581497 (DE-599)BVBBV042300884 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nmm a2200541zc 4500</leader><controlfield tag="001">BV042300884</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123748904</subfield><subfield code="9">978-0-12-374890-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123748909</subfield><subfield code="9">0-12-374890-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)528581497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300884</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cusick, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic Boolean functions and applications</subfield><subfield code="c">Thomas W. Cusick and Pantelimon Stănică</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Academic Press/Elsevier</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 232 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 209-227) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Algebra, Boolean</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer algorithms</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algebra, Boolean</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer algorithms</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Boolesche Funktion</subfield><subfield code="0">(DE-588)4146281-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Boolesche Funktion</subfield><subfield code="0">(DE-588)4146281-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stănică, Pantelimon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123748904</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737876</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042300884 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:43Z |
institution | BVB |
isbn | 9780123748904 0123748909 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737876 |
oclc_num | 528581497 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xii, 232 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Academic Press/Elsevier |
record_format | marc |
spelling | Cusick, Thomas W. Verfasser aut Cryptographic Boolean functions and applications Thomas W. Cusick and Pantelimon Stănică 1st ed Amsterdam Academic Press/Elsevier 2009 1 Online-Ressource (xii, 232 p.) txt rdacontent c rdamedia cr rdacarrier Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce). Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scientists with a needed reference for the use of Boolean functions in cryptography -Addresses the issues of cryptographic Boolean functions theory and applications in one concentrated resource.-Organized logically to help the reader easily understand the topic Includes bibliographical references (p. 209-227) and index Algebra, Boolean fast Computer algorithms fast Cryptography fast Data encryption (Computer science) fast Algebra, Boolean Cryptography Data encryption (Computer science) Computer algorithms Kryptologie (DE-588)4033329-2 gnd rswk-swf Boolesche Funktion (DE-588)4146281-6 gnd rswk-swf Boolesche Funktion (DE-588)4146281-6 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Stănică, Pantelimon Sonstige oth http://www.sciencedirect.com/science/book/9780123748904 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cusick, Thomas W. Cryptographic Boolean functions and applications Algebra, Boolean fast Computer algorithms fast Cryptography fast Data encryption (Computer science) fast Algebra, Boolean Cryptography Data encryption (Computer science) Computer algorithms Kryptologie (DE-588)4033329-2 gnd Boolesche Funktion (DE-588)4146281-6 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4146281-6 |
title | Cryptographic Boolean functions and applications |
title_auth | Cryptographic Boolean functions and applications |
title_exact_search | Cryptographic Boolean functions and applications |
title_full | Cryptographic Boolean functions and applications Thomas W. Cusick and Pantelimon Stănică |
title_fullStr | Cryptographic Boolean functions and applications Thomas W. Cusick and Pantelimon Stănică |
title_full_unstemmed | Cryptographic Boolean functions and applications Thomas W. Cusick and Pantelimon Stănică |
title_short | Cryptographic Boolean functions and applications |
title_sort | cryptographic boolean functions and applications |
topic | Algebra, Boolean fast Computer algorithms fast Cryptography fast Data encryption (Computer science) fast Algebra, Boolean Cryptography Data encryption (Computer science) Computer algorithms Kryptologie (DE-588)4033329-2 gnd Boolesche Funktion (DE-588)4146281-6 gnd |
topic_facet | Algebra, Boolean Computer algorithms Cryptography Data encryption (Computer science) Kryptologie Boolesche Funktion |
url | http://www.sciencedirect.com/science/book/9780123748904 |
work_keys_str_mv | AT cusickthomasw cryptographicbooleanfunctionsandapplications AT stanicapantelimon cryptographicbooleanfunctionsandapplications |