Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Four decades of research on bent functions
In this survey, we revisit the Rothaus paper and the chapter of Dillon's thesis dedicated to
bent functions, and we describe the main results obtained on these functions during these …
bent functions, and we describe the main results obtained on these functions during these …
[BOOK][B] Signal design for good correlation: for wireless communication, cryptography, and radar
SW Golomb, G Gong - 2005 - books.google.com
This book provides a comprehensive, up-to-date description of the methodologies and the
application areas, throughout the range of digital communication, in which individual signals …
application areas, throughout the range of digital communication, in which individual signals …
Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[BOOK][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Generalized bent functions and their properties
Jet J qm denote the set of m-tuples over the integers modulo q and set i=− 1, w= ei (2π q). As
an extension of Rothaus' notion of a bent function, a function f, f: J qm→ J q 1 is called bent if …
an extension of Rothaus' notion of a bent function, a function f, f: J qm→ J q 1 is called bent if …
[PDF][PDF] Analysis and design of cryptographic hash functions
B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …
hash functions for protecting the authenticity of information is demonstrated. Applications …
[BOOK][B] Stream ciphers and number theory
TW Cusick, C Ding, AR Renvall - 2004 - books.google.com
This is the unique book on cross-fertilisations between stream ciphers and number theory. It
systematically and comprehensively covers known connections between the two areas that …
systematically and comprehensively covers known connections between the two areas that …
[BOOK][B] Spread spectrum and CDMA: principles and applications
VP Ipatov - 2005 - books.google.com
Spread spectrum and CDMA are cutting-edge technologies widely used in operational
radar, navigation and telecommunication systems and play a pivotal role in the development …
radar, navigation and telecommunication systems and play a pivotal role in the development …
Theory and applications of q-ary interleaved sequences
G Gong - IEEE Transactions on Information Theory, 1995 - ieeexplore.ieee.org
A new class of q-ary sequences, called interleaved sequence, is introduced. Their periods,
shift equivalence, linear spans, and autocorrelation functions are derived. The interleaved …
shift equivalence, linear spans, and autocorrelation functions are derived. The interleaved …