Bent Functions: Results and Applications to Cryptography
()
About this ebook
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions.
The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.
- Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications
- Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography
- Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers
Natalia Tokareva
Dr. Natalia Tokareva is a senior researcher at the Laboratory of Discrete Analysis in the Sobolev Institute of Mathematics and she teaches courses in cryptology in the Department of Mathematics and Mechanics at Novosibirsk State University. She has studied bent functions and their applications for several years, publishing one monograph (in Russian) and more than 12 articles. She has been a participant of many international conferences and seminars and presentations in the area of bent functions, particularly with applications in cryptography. Her research interests include Boolean functions in cryptography, bent functions, block and stream ciphers, cryptanalysis, coding theory, combinatorics, and algebra. She is chief of the seminar "Cryptography and Cryptanalysis" at the Sobolev Institute of Mathematics and she supervises BS, MS, and PhD students in discrete mathematics and cryptology.
Related to Bent Functions
Related ebooks
Bayesian Analysis of Stochastic Process Models Rating: 0 out of 5 stars0 ratingsStochastic Analysis of Mixed Fractional Gaussian Processes Rating: 0 out of 5 stars0 ratingsStream Ciphers and Number Theory Rating: 0 out of 5 stars0 ratingsMacroeconomic Modelling Rating: 0 out of 5 stars0 ratingsThe Works of Frederick Schiller Rating: 0 out of 5 stars0 ratingsHandbook of Volatility Models and Their Applications Rating: 5 out of 5 stars5/5Learning and Expectations in Macroeconomics Rating: 4 out of 5 stars4/5Quantitative Management of Bond Portfolios Rating: 0 out of 5 stars0 ratingsRuin Probabilities: Smoothness, Bounds, Supermartingale Approach Rating: 0 out of 5 stars0 ratingsNumerical Algebra Rating: 0 out of 5 stars0 ratingsA Primer on Statistical Distributions Rating: 0 out of 5 stars0 ratingsFoundations of Data Intensive Applications: Large Scale Data Analytics under the Hood Rating: 0 out of 5 stars0 ratingsPattern-Oriented Software Architecture, Patterns for Resource Management Rating: 3 out of 5 stars3/5Quadratic Form Theory and Differential Equations Rating: 0 out of 5 stars0 ratingsParallel Processing for Artificial Intelligence 1 Rating: 5 out of 5 stars5/5Michael Oakeshott Selected Writings Collection Rating: 0 out of 5 stars0 ratingsSoftware Modeling A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsProgramming Massively Parallel Processors: A Hands-on Approach Rating: 0 out of 5 stars0 ratingsImplementing Domain-Specific Languages with Xtext and Xtend Rating: 4 out of 5 stars4/5Learning ClojureScript Rating: 0 out of 5 stars0 ratingsMultiobjective Programming and Planning Rating: 0 out of 5 stars0 ratingsEstimation and Control of Large-Scale Networked Systems Rating: 0 out of 5 stars0 ratingsComputing Perspectives Rating: 5 out of 5 stars5/5Financial Instrument Pricing Using C++ Rating: 2 out of 5 stars2/5Moodle 1.9 Extension Development Rating: 0 out of 5 stars0 ratingsDataflow and Reactive Programming Systems Rating: 0 out of 5 stars0 ratingsFinancial Institution Advantage and the Optimization of Information Processing Rating: 0 out of 5 stars0 ratingsNonparametric Analysis of Univariate Heavy-Tailed Data: Research and Practice Rating: 0 out of 5 stars0 ratingsLearning Underscore.js Rating: 0 out of 5 stars0 ratingsA Tract on Monetary Reform Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5
Reviews for Bent Functions
0 ratings0 reviews