LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered over hundreds of journal articles, conference proceedings, books, reports and notes, some of them only available online.
This book follows the previous edition in sifting through this compendium and gathering the most significant information in one concise reference book. The work therefore encompasses over 600 citations, covering every aspect of the applications of cryptographic Boolean functions.
Since 2008, the subject has seen a very large number of new results, and in response, the authors have prepared a new chapter on special functions. The new edition brings 100 completely new references and an expansion of 50 new pages, along with heavy revision throughout the text.
Researchers in cryptography, engineers and scientists who are involved in designing or implementing cryptographic algorithms or protocols, engineers and scientists who want to have a reference for the use of Boolean functions in cryptography. Graduate students (mainly math and computer science) who are doing research in the area of cryptographic Boolean functions. An advanced undergraduate course in an applied math department. Those interested in cryptography with a view to applying it in areas such as business, financial services and computer security
Chapter 1: A Bit of History
Chapter 2: Fourier Analysis of Boolean Functions
Chapter 3: Avalanche and Propagation Criteria
Chapter 4: Correlation Immune and Resilient Boolean Functions
Chapter 5: Bent Boolean Functions
Chapter 6: Special Types of Boolean Functions
Chapter 7: Stream Cipher Design
Chapter 8: Block Ciphers
Chapter 9: Boolean Cayley Graphs
TC
PS