Construction and Analysis of Cryptographic Functions:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (VIII, 168 Seiten) |
ISBN: | 9783319129914 |
DOI: | 10.1007/978-3-319-12991-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042326011 | ||
003 | DE-604 | ||
005 | 20160527 | ||
007 | cr|uuu---uuuuu | ||
008 | 150204s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319129914 |c Online |9 978-3-319-12991-4 | ||
024 | 7 | |a 10.1007/978-3-319-12991-4 |2 doi | |
035 | |a (OCoLC)902885384 | ||
035 | |a (DE-599)BVBBV042326011 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 003.54 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Budaghyan, Lilya |d 1976- |e Verfasser |0 (DE-588)130826731 |4 aut | |
245 | 1 | 0 | |a Construction and Analysis of Cryptographic Functions |c Lilya Budaghyan |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (VIII, 168 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Functional equations | |
650 | 4 | |a Combinatorics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Difference and Functional Equations | |
650 | 4 | |a Informatik | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-12990-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-12991-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027762848 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12991-4 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152927661588480 |
---|---|
adam_text | CONSTRUCTION AND ANALYSIS OF CRYPTOGRAPHIC FUNCTIONS
/ BUDAGHYAN, LILYA
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
GENERALITIES
EQUIVALENCE RELATIONS OF FUNCTIONS
BENT FUNCTIONS
NEW CLASSES OF APN AND AB POLYNOMIALS
CONSTRUCTION OF PLANAR FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CONSTRUCTION AND ANALYSIS OF CRYPTOGRAPHIC FUNCTIONS
/ BUDAGHYAN, LILYA
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK COVERS NOVEL RESEARCH ON CONSTRUCTION AND ANALYSIS OF OPTIMAL
CRYPTOGRAPHIC FUNCTIONS SUCH AS ALMOST PERFECT NONLINEAR (APN), ALMOST
BENT (AB), PLANAR AND BENT FUNCTIONS. THESE FUNCTIONS HAVE OPTIMAL
RESISTANCE TO LINEAR AND/OR DIFFERENTIAL ATTACKS, WHICH ARE THE TWO MOST
POWERFUL ATTACKS ON SYMMETRIC CRYPTOSYSTEMS. BESIDES CRYPTOGRAPHIC
APPLICATIONS, THESE FUNCTIONS ARE SIGNIFICANT IN MANY BRANCHES OF
MATHEMATICS AND INFORMATION THEORY INCLUDING CODING THEORY,
COMBINATORICS, COMMUTATIVE ALGEBRA, FINITE GEOMETRY, SEQUENCE DESIGN AND
QUANTUM INFORMATION THEORY. THE AUTHOR ANALYZES EQUIVALENCE RELATIONS
FOR THESE FUNCTIONS AND DEVELOPS SEVERAL NEW METHODS FOR CONSTRUCTION OF
THEIR INFINITE FAMILIES. IN ADDITION, THE BOOK OFFERS SOLUTIONS TO TWO
LONGSTANDING OPEN PROBLEMS, INCLUDING THE PROBLEM ON CHARACTERIZATION OF
APN AND AB FUNCTIONS VIA BOOLEAN, AND THE PROBLEM ON THE RELATION
BETWEEN TWO CLASSES OF BENT FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Budaghyan, Lilya 1976- |
author_GND | (DE-588)130826731 |
author_facet | Budaghyan, Lilya 1976- |
author_role | aut |
author_sort | Budaghyan, Lilya 1976- |
author_variant | l b lb |
building | Verbundindex |
bvnumber | BV042326011 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)902885384 (DE-599)BVBBV042326011 |
dewey-full | 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.54 |
dewey-search | 003.54 |
dewey-sort | 13.54 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-12991-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03392nmm a2200649zc 4500</leader><controlfield tag="001">BV042326011</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160527 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150204s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319129914</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-12991-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-12991-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902885384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042326011</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Budaghyan, Lilya</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130826731</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Construction and Analysis of Cryptographic Functions</subfield><subfield code="c">Lilya Budaghyan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 168 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Functional equations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Combinatorics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Difference and Functional Equations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-12990-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027762848</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12991-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042326011 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:29Z |
institution | BVB |
isbn | 9783319129914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027762848 |
oclc_num | 902885384 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VIII, 168 Seiten) |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spelling | Budaghyan, Lilya 1976- Verfasser (DE-588)130826731 aut Construction and Analysis of Cryptographic Functions Lilya Budaghyan Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] © 2014 1 Online-Ressource (VIII, 168 Seiten) txt rdacontent c rdamedia cr rdacarrier Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik Erscheint auch als Druckausgabe 978-3-319-12990-7 https://doi.org/10.1007/978-3-319-12991-4 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Budaghyan, Lilya 1976- Construction and Analysis of Cryptographic Functions Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
title | Construction and Analysis of Cryptographic Functions |
title_auth | Construction and Analysis of Cryptographic Functions |
title_exact_search | Construction and Analysis of Cryptographic Functions |
title_full | Construction and Analysis of Cryptographic Functions Lilya Budaghyan |
title_fullStr | Construction and Analysis of Cryptographic Functions Lilya Budaghyan |
title_full_unstemmed | Construction and Analysis of Cryptographic Functions Lilya Budaghyan |
title_short | Construction and Analysis of Cryptographic Functions |
title_sort | construction and analysis of cryptographic functions |
topic | Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
topic_facet | Computer science Data encryption (Computer science) Coding theory Functional equations Combinatorics Computer Science Coding and Information Theory Data Encryption Difference and Functional Equations Informatik |
url | https://doi.org/10.1007/978-3-319-12991-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762848&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT budaghyanlilya constructionandanalysisofcryptographicfunctions |