Boolean Functions and Their Applications in Cryptography:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg
Springer
2016
|
Schriftenreihe: | Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF)
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XV, 256 p. 9 illus. in color) |
ISBN: | 9783662488652 |
ISSN: | 2198-2686 |
DOI: | 10.1007/978-3-662-48865-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043423003 | ||
003 | DE-604 | ||
005 | 20160718 | ||
007 | cr|uuu---uuuuu | ||
008 | 160302s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783662488652 |c Online |9 978-3-662-48865-2 | ||
024 | 7 | |a 10.1007/978-3-662-48865-2 |2 doi | |
035 | |a (OCoLC)943819583 | ||
035 | |a (DE-599)BVBBV043423003 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-Aug4 |a DE-898 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-739 |a DE-634 |a DE-92 |a DE-861 |a DE-523 |a DE-355 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Wu, Chuan-Kun |e Verfasser |0 (DE-588)1027456855 |4 aut | |
245 | 1 | 0 | |a Boolean Functions and Their Applications in Cryptography |c by Chuan-Kun Wu, Dengguo Feng |
264 | 1 | |a Berlin ; Heidelberg |b Springer |c 2016 | |
300 | |a 1 Online-Ressource (XV, 256 p. 9 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF) |x 2198-2686 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Mathematics of Computing | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Boolesche Funktion |0 (DE-588)4146281-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stromchiffre |0 (DE-588)4271270-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenstruktur |0 (DE-588)4011146-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computermathematik |0 (DE-588)4788218-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computermathematik |0 (DE-588)4788218-9 |D s |
689 | 0 | 1 | |a Datenstruktur |0 (DE-588)4011146-5 |D s |
689 | 0 | 2 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Boolesche Funktion |0 (DE-588)4146281-6 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 2 | |a Stromchiffre |0 (DE-588)4271270-1 |D s |
689 | 1 | 3 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Feng, Dengguo |d 1965- |e Verfasser |0 (DE-588)130627569 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-48863-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-48865-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028840895 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48865-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176018008702976 |
---|---|
adam_text | BOOLEAN FUNCTIONS AND THEIR APPLICATIONS IN CRYPTOGRAPHY
/ WU, CHUAN-KUN
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK FOCUSES ON THE DIFFERENT REPRESENTATIONS AND CRYPTOGRAPHIC
PROPERTIES OF BOOLEANS FUNCTIONS, PRESENTS CONSTRUCTIONS OF BOOLEAN
FUNCTIONS WITH SOME GOOD CRYPTOGRAPHIC PROPERTIES. MORE SPECIFICALLY,
WALSH SPECTRUM DESCRIPTION OF THE TRADITIONAL CRYPTOGRAPHIC PROPERTIES
OF BOOLEAN FUNCTIONS, INCLUDING LINEAR STRUCTURE, PROPAGATION CRITERION,
NONLINEARITY, AND CORRELATION IMMUNITY ARE PRESENTED. CONSTRUCTIONS OF
SYMMETRIC BOOLEAN FUNCTIONS AND OF BOOLEAN PERMUTATIONS WITH GOOD
CRYPTOGRAPHIC PROPERTIES ARE SPECIFICALLY STUDIED. THIS BOOK IS NOT
MEANT TO BE COMPREHENSIVE, BUT WITH ITS OWN FOCUS ON SOME ORIGINAL
RESEARCH OF THE AUTHORS IN THE PAST. TO BE SELF CONTENT, SOME BASIC
CONCEPTS AND PROPERTIES ARE INTRODUCED. THIS BOOK CAN SERVE AS A
REFERENCE FOR CRYPTOGRAPHIC ALGORITHM DESIGNERS, PARTICULARLY THE
DESIGNERS OF STREAM CIPHERS AND OF BLOCK CIPHERS, AND FOR ACADEMICS WITH
INTEREST IN THE CRYPTOGRAPHIC PROPERTIES OF BOOLEAN FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
BOOLEAN FUNCTIONS AND THEIR APPLICATIONS IN CRYPTOGRAPHY
/ WU, CHUAN-KUN
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
1. BOOLEAN FUNCTIONS AND THEIR WALSH TRANSFORMS
2. INDEPENDENCE OF BOOLEAN FUNCTIONS OF THEIR VARIABLES
3. NONLINEARITY AND LINEAR STRUCTURES OF BOOLEAN FUNCTIONS
4. CORRELATION IMMUNITY OF BOOLEAN FUNCTIONS
5. ALGEBRAIC IMMUNITY OF BOOLEAN FUNCTIONS
6. THE SYMMETRIC PROPERTY OF BOOLEAN FUNCTIONS
7.BOOLEAN FUNCTION REPRESENTATION OF S-BOXES AND BOOLEAN PERMUTATIONS
8. CRYPTOGRAPHIC APPLICATIONS OF BOOLEAN FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Wu, Chuan-Kun Feng, Dengguo 1965- |
author_GND | (DE-588)1027456855 (DE-588)130627569 |
author_facet | Wu, Chuan-Kun Feng, Dengguo 1965- |
author_role | aut aut |
author_sort | Wu, Chuan-Kun |
author_variant | c k w ckw d f df |
building | Verbundindex |
bvnumber | BV043423003 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)943819583 (DE-599)BVBBV043423003 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-48865-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05124nmm a2200961zc 4500</leader><controlfield tag="001">BV043423003</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160718 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160302s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662488652</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-48865-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-48865-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)943819583</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043423003</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Chuan-Kun</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1027456855</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Boolean Functions and Their Applications in Cryptography</subfield><subfield code="c">by Chuan-Kun Wu, Dengguo Feng</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 256 p. 9 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF)</subfield><subfield code="x">2198-2686</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Boolesche Funktion</subfield><subfield code="0">(DE-588)4146281-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computermathematik</subfield><subfield code="0">(DE-588)4788218-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computermathematik</subfield><subfield code="0">(DE-588)4788218-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Boolesche Funktion</subfield><subfield code="0">(DE-588)4146281-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Feng, Dengguo</subfield><subfield code="d">1965-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130627569</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-48863-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028840895</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48865-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043423003 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:25:30Z |
institution | BVB |
isbn | 9783662488652 |
issn | 2198-2686 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028840895 |
oclc_num | 943819583 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-739 DE-634 DE-92 DE-861 DE-523 DE-355 DE-BY-UBR |
owner_facet | DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-739 DE-634 DE-92 DE-861 DE-523 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XV, 256 p. 9 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series2 | Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF) |
spelling | Wu, Chuan-Kun Verfasser (DE-588)1027456855 aut Boolean Functions and Their Applications in Cryptography by Chuan-Kun Wu, Dengguo Feng Berlin ; Heidelberg Springer 2016 1 Online-Ressource (XV, 256 p. 9 illus. in color) txt rdacontent c rdamedia cr rdacarrier Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF) 2198-2686 Computer science Computer security Data structures (Computer science) Computer science / Mathematics Computer Science Data Structures, Cryptology and Information Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Boolesche Funktion (DE-588)4146281-6 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Stromchiffre (DE-588)4271270-1 gnd rswk-swf Datenstruktur (DE-588)4011146-5 gnd rswk-swf Computermathematik (DE-588)4788218-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Computermathematik (DE-588)4788218-9 s Datenstruktur (DE-588)4011146-5 s Informatik (DE-588)4026894-9 s Datensicherung (DE-588)4011144-1 s Chiffrierung (DE-588)4352893-4 s DE-604 Boolesche Funktion (DE-588)4146281-6 s Kryptologie (DE-588)4033329-2 s Stromchiffre (DE-588)4271270-1 s Blockchiffre (DE-588)4323693-5 s 1\p DE-604 Feng, Dengguo 1965- Verfasser (DE-588)130627569 aut Erscheint auch als Druckausgabe 978-3-662-48863-8 https://doi.org/10.1007/978-3-662-48865-2 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wu, Chuan-Kun Feng, Dengguo 1965- Boolean Functions and Their Applications in Cryptography Computer science Computer security Data structures (Computer science) Computer science / Mathematics Computer Science Data Structures, Cryptology and Information Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Boolesche Funktion (DE-588)4146281-6 gnd Blockchiffre (DE-588)4323693-5 gnd Stromchiffre (DE-588)4271270-1 gnd Datenstruktur (DE-588)4011146-5 gnd Computermathematik (DE-588)4788218-9 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4146281-6 (DE-588)4323693-5 (DE-588)4271270-1 (DE-588)4011146-5 (DE-588)4788218-9 (DE-588)4011144-1 (DE-588)4352893-4 (DE-588)4033329-2 (DE-588)4026894-9 |
title | Boolean Functions and Their Applications in Cryptography |
title_auth | Boolean Functions and Their Applications in Cryptography |
title_exact_search | Boolean Functions and Their Applications in Cryptography |
title_full | Boolean Functions and Their Applications in Cryptography by Chuan-Kun Wu, Dengguo Feng |
title_fullStr | Boolean Functions and Their Applications in Cryptography by Chuan-Kun Wu, Dengguo Feng |
title_full_unstemmed | Boolean Functions and Their Applications in Cryptography by Chuan-Kun Wu, Dengguo Feng |
title_short | Boolean Functions and Their Applications in Cryptography |
title_sort | boolean functions and their applications in cryptography |
topic | Computer science Computer security Data structures (Computer science) Computer science / Mathematics Computer Science Data Structures, Cryptology and Information Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Boolesche Funktion (DE-588)4146281-6 gnd Blockchiffre (DE-588)4323693-5 gnd Stromchiffre (DE-588)4271270-1 gnd Datenstruktur (DE-588)4011146-5 gnd Computermathematik (DE-588)4788218-9 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Computer science Computer security Data structures (Computer science) Computer science / Mathematics Computer Science Data Structures, Cryptology and Information Theory Systems and Data Security Mathematics of Computing Informatik Mathematik Boolesche Funktion Blockchiffre Stromchiffre Datenstruktur Computermathematik Datensicherung Chiffrierung Kryptologie |
url | https://doi.org/10.1007/978-3-662-48865-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028840895&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wuchuankun booleanfunctionsandtheirapplicationsincryptography AT fengdengguo booleanfunctionsandtheirapplicationsincryptography |