top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Arithmetic of Finite Fields [[electronic resource] ] : First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings / / edited by Claude Carlet, Berk Sunar
Arithmetic of Finite Fields [[electronic resource] ] : First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings / / edited by Claude Carlet, Berk Sunar
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 360 p.)
Disciplina 512.3
Collana Theoretical Computer Science and General Issues
Soggetto topico Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Computer science—Mathematics
Discrete mathematics
Algorithms
Coding and Information Theory
Cryptology
Discrete Mathematics in Computer Science
Symbolic and Algebraic Manipulation
ISBN 3-540-73074-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Structures in Finite Fields -- Explicit Factorizations of Cyclotomic and Dickson Polynomials over Finite Fields -- Some Notes on d-Form Functions with Difference-Balanced Property -- A Note on Modular Forms on Finite Upper Half Planes -- Efficient Implementation and Architectures -- A Coprocessor for the Final Exponentiation of the ? T Pairing in Characteristic Three -- VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors -- Efficient Multiplication Using Type 2 Optimal Normal Bases -- Efficient Finite Field Arithmetic -- Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic -- Software Implementation of Arithmetic in -- Complexity Reduction of Constant Matrix Computations over the Binary Field -- Towards Optimal Toom-Cook Multiplication for Univariate and Multivariate Polynomials in Characteristic 2 and 0 -- Classification and Construction of Mappings over Finite Fields -- A Construction of Differentially 4-Uniform Functions from Commutative Semifields of Characteristic 2 -- Complete Mapping Polynomials over Finite Field F 16 -- On the Classification of 4 Bit S-Boxes -- The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions -- Curve Algebra -- New Point Addition Formulae for ECC Applications -- Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation -- The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic -- Cryptography -- On Kabatianskii-Krouk-Smeets Signatures -- Self-certified Signatures Based on Discrete Logarithms -- Attacking the Filter Generator over GF(2 m ) -- Codes -- Cyclic Additive and Quantum Stabilizer Codes -- Determining the Number of One-Weight Cyclic Codes When Length and Dimension Are Given -- Error Correcting Codes from Quasi-Hadamard Matrices -- Fast Computations of Gröbner Bases and Blind Recognitions of Convolutional Codes -- Discrete Structures -- A Twin for Euler’s ? Function in -- Discrete Phase-Space Structures and Mutually Unbiased Bases -- Some Novel Results of p-Adic Component of Primitive Sequences over Z/(p d ).
Record Nr. UNISA-996466075903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Arithmetic of Finite Fields : First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings / / edited by Claude Carlet, Berk Sunar
Arithmetic of Finite Fields : First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings / / edited by Claude Carlet, Berk Sunar
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 360 p.)
Disciplina 512.3
Collana Theoretical Computer Science and General Issues
Soggetto topico Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Computer science—Mathematics
Discrete mathematics
Algorithms
Coding and Information Theory
Cryptology
Discrete Mathematics in Computer Science
Symbolic and Algebraic Manipulation
ISBN 3-540-73074-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Structures in Finite Fields -- Explicit Factorizations of Cyclotomic and Dickson Polynomials over Finite Fields -- Some Notes on d-Form Functions with Difference-Balanced Property -- A Note on Modular Forms on Finite Upper Half Planes -- Efficient Implementation and Architectures -- A Coprocessor for the Final Exponentiation of the ? T Pairing in Characteristic Three -- VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors -- Efficient Multiplication Using Type 2 Optimal Normal Bases -- Efficient Finite Field Arithmetic -- Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic -- Software Implementation of Arithmetic in -- Complexity Reduction of Constant Matrix Computations over the Binary Field -- Towards Optimal Toom-Cook Multiplication for Univariate and Multivariate Polynomials in Characteristic 2 and 0 -- Classification and Construction of Mappings over Finite Fields -- A Construction of Differentially 4-Uniform Functions from Commutative Semifields of Characteristic 2 -- Complete Mapping Polynomials over Finite Field F 16 -- On the Classification of 4 Bit S-Boxes -- The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions -- Curve Algebra -- New Point Addition Formulae for ECC Applications -- Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation -- The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic -- Cryptography -- On Kabatianskii-Krouk-Smeets Signatures -- Self-certified Signatures Based on Discrete Logarithms -- Attacking the Filter Generator over GF(2 m ) -- Codes -- Cyclic Additive and Quantum Stabilizer Codes -- Determining the Number of One-Weight Cyclic Codes When Length and Dimension Are Given -- Error Correcting Codes from Quasi-Hadamard Matrices -- Fast Computations of Gröbner Bases and Blind Recognitions of Convolutional Codes -- Discrete Structures -- A Twin for Euler’s ? Function in -- Discrete Phase-Space Structures and Mutually Unbiased Bases -- Some Novel Results of p-Adic Component of Primitive Sequences over Z/(p d ).
Record Nr. UNINA-9910484408703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Codes, Cryptology and Information Security [[electronic resource] ] : Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji / / edited by Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi
Codes, Cryptology and Information Security [[electronic resource] ] : Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji / / edited by Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIX, 482 p. 244 illus., 23 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Systems and Data Security
Cryptology
Software Engineering
Coding and Information Theory
ISBN 3-030-16458-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-channel analysis -- Virtual Security Evaluation -- Cache-Timing Attacks still threaten IoT devices -- Speed-up of SCA attacks on 32-bit multiplications. Cryptography -- Arabic Cryptography and Steganography in Morocco -- An AEAD variant of the Grain stream cipher -- Construction for a Nominative Signature Scheme from Lattice with Enhanced Security -- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG -- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem -- Non-Interactive Zero Knowledge Proofs in the Random Oracle Model -- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions -- Secret sharing -- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments -- Secret Sharing using Near-MDS Codes -- Mathematics for cryptography -- On Plateaued Functions, Linear Structures and Permutation Polynomials -- Faster Scalar Multiplication on the x-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains -- Codes and their applications -- On good polynomials over finite fields for optimal locally recoverable codes -- A New Gabidulin-like Code and its Application in Cryptography -- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3 -- Quasi-Dyadic Girault Identification Scheme -- Homomorphic encryption -- Securely aggregating testimonies with Threshold Multi-key FHE -- Improved Efficiency of a Linearly Homomorphic Cryptosystem -- Applied cryptography -- On the Tracing Traitors Math Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing -- Reusable Garbled Turing Machines without FHE -- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness -- A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation -- Security -- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems -- Managing Your Kleptographic Subscription Plan -- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification -- .
Record Nr. UNISA-996466315603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Codes, Cryptology and Information Security : Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji / / edited by Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi
Codes, Cryptology and Information Security : Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji / / edited by Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIX, 482 p. 244 illus., 23 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Systems and Data Security
Cryptology
Software Engineering
Coding and Information Theory
ISBN 3-030-16458-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-channel analysis -- Virtual Security Evaluation -- Cache-Timing Attacks still threaten IoT devices -- Speed-up of SCA attacks on 32-bit multiplications. Cryptography -- Arabic Cryptography and Steganography in Morocco -- An AEAD variant of the Grain stream cipher -- Construction for a Nominative Signature Scheme from Lattice with Enhanced Security -- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG -- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem -- Non-Interactive Zero Knowledge Proofs in the Random Oracle Model -- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions -- Secret sharing -- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments -- Secret Sharing using Near-MDS Codes -- Mathematics for cryptography -- On Plateaued Functions, Linear Structures and Permutation Polynomials -- Faster Scalar Multiplication on the x-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains -- Codes and their applications -- On good polynomials over finite fields for optimal locally recoverable codes -- A New Gabidulin-like Code and its Application in Cryptography -- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3 -- Quasi-Dyadic Girault Identification Scheme -- Homomorphic encryption -- Securely aggregating testimonies with Threshold Multi-key FHE -- Improved Efficiency of a Linearly Homomorphic Cryptosystem -- Applied cryptography -- On the Tracing Traitors Math Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing -- Reusable Garbled Turing Machines without FHE -- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness -- A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation -- Security -- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems -- Managing Your Kleptographic Subscription Plan -- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification -- .
Record Nr. UNINA-9910337855803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Codes, Cryptology, and Information Security [[electronic resource] ] : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
Codes, Cryptology, and Information Security [[electronic resource] ] : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXVI, 375 p. 58 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-18681-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Papers -- Multidimensional Bell Inequalities and Quantum Cryptography -- 1 Local Realism and CHSH Inequalities -- 1.1 Local Realism -- 1.2 CHSH Inequalities -- 1.3 Quantum World -- 1.4 Complete Set of Inequalities -- 1.5 Generalization to -- 2 Multidimensional Inequalities -- 2.1 Discrete Fourier Transform -- 2.2 Homogeneous Inequalities -- 3 Violation by Quantum Systems -- 3.1 Measurements with Tritters -- 4 Quantum Keys Exchange -- 4.1 Ekert'91 Protocol -- 4.2 The Inequality CHSH-3 -- 4.3 The 3DEB Protocol -- 4.4 The Homogeneous Qutrits Protocol -- 5 Conclusion -- References -- Securing the Web of Things with Role-Based Access Control -- 1 Introduction -- 2 Overview of WoT -- 2.1 Representation of Things on WoT -- 2.2 Ambient Space Stakeholders -- 2.3 WoT Framework -- 2.4 WoT Security Challenges -- 3 Overview of Role Based Access Control (RBAC) Model -- 4 Security Architecture for WoT -- 4.1 Integrating RBAC in WoT -- 4.2 Policy Enforcement Facitilies -- 4.3 Areas of Control Architecture -- 5 WOT Resources Protection -- 5.1 Documents and Views -- 5.2 Key Generation and Encryption -- 6 Conclusion and Future Work -- References -- On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax -- 1 Introduction -- 2 ERS Archiving System -- 2.1 Setup -- 2.2 ERS Specification -- 3 Security Framework -- 3.1 Task-PIOAs -- 3.2 Longterm Implementation Relation -- 3.3 CIS System Model -- 4 ERS System Model -- 4.1 Construction Overview -- 4.2 Signature Service -- 4.3 Timestamp Service -- 4.4 Hash Service -- 4.5 Service Times -- 4.6 Dispatcher -- 4.7 ERS Service -- 5 ERSSecurityProof -- 6 Conclusions -- References -- Differential Attacks Against SPN: A Thorough Analysis -- 1 Introduction -- 2 Differential Attacks Against Substitution-Permutation Networks.
2.1 Substitution-Permutation Networks -- 2.2 Differential Cryptanalysis -- 2.3 Expected Probability of a Differential Characteristic -- 3 From Characteristics to Differentials -- 3.1 Expected Probability of a 2-round Differential -- 3.2 Influence of the Weight of the Differential -- 3.3 Number of Characteristics Within a Given 2-round Differential -- 4 SPNwithanAPNSbox -- 4.1 APN Sboxes over F8 -- 4.2 APN Sboxes over F32 -- 5 MEDP2 can be Tight for a Differential of Non-minimal Weight -- 5.1 Examples where MEDP2 is Tight for a Differential of Weight ( -- 5.2 Example where MEDP2 is Tight for a Differential of Weight ( -- 6 Conclusions -- References -- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions -- 1 Introduction -- 2 Preliminaries -- 3 Characterizations of Plateaued Boolean and Vectorial Functions -- 3.1 Characterization by Means of the Derivatives -- 3.2 Characterization by Means of Power Moments of the Walsh Transform -- 4 Characterizations of the APN-ness of Componentwise Plateaued Vectorial Functions -- 4.1 Characterization by the Derivatives -- 4.2 Characterization by the Walsh Transform -- 4.3 The Case of Unbalanced Component Functions -- References -- Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards -- 1 Introduction -- 2 Smart Card Security -- 3 Some Software Attacks Again Java Card -- 3.1 Ambiguity in the Specification: The Type Confusion -- 3.2 Weakness in the Linker Process -- 3.3 Dumping the EEPROM -- 3.4 Dumping the ROM -- 3.5 A Complete Methodology to Attack Smart Card -- 4 Conclusion and Future Works -- References -- Extended Abstract: Codes as Modules over Skew Polynomial Rings -- References -- Regular Papers -- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask -- Introduction -- 1 Specifications -- 1.1 Key Schedule.
1.2 Instantiations -- 2 Design Rationale -- 3 Security Analysis -- 4 Implementation Aspects -- 4.1 Theoretical Implementation Results -- 4.2 Implementation Results and Comparisons -- 5 Conclusion -- References -- A Dynamic Attribute-Based Authentication Scheme -- 1 Introduction -- 2 ABA Scheme Introduction -- 2.1 Scheme Structure and Workflow -- 2.2 Security Requirements -- 3 Construction of the Dynamic ABA Scheme -- 3.1 Down-to-Top Attribute Tree Construction -- 3.2 Construction Algorithms -- 4 Analysis of the Dynamic ABA Scheme -- 4.1 Correctness Analysis -- 4.2 Security Requirements Analysis -- 4.3 Efficiency Analysis -- 5 Conclusions -- References -- Repeated-Root Isodual Cyclic Codes over Finite Fields -- 1 Introduction -- 2 Preliminaries -- 3 Cyclic Codes of Length 2amps over -- 4 Construction of Cyclic Isodual Codes of Length 2amps over -- 5 Cyclic Isodual Codes of Length 2amps over -- References -- Formal Enforcement of Security Policies on Parallel Systems with Risk Integration -- 1 Introduction -- 2 State of the Art -- 3 The Specification Logic of Security Policy -- 3.1 Syntax of a Logic -- 3.2 Semantics of -- 4 The Specification Language of Program -- 4.1 Syntax -- 4.2 Semantic -- 5 Formal Enforcement of Security Policies with Risk Integration -- 6 Example -- 7 Conclusion and Future Work -- References -- Countermeasures Mitigation for Designing Rich Shell Code in Java Card -- 1 Introduction -- 2 JavaCardSecurity -- 3 Embedded Countermeasures -- 3.1 State of the Art of Attacks Against Java Cards -- 3.2 Mitigating the Attacks with Affordable Countermeasures -- 3.3 Checking the Jump Boundaries -- 4 Mitigating the Control Flow Countermeasures -- 4.1 Principle of the Control Flow Extraction -- 4.2 Parameters Exchange between the Controller and the Shell Code -- 5 Experiments: The Java Self Modifying Code Revisited.
5.1 Type Confusion Exploitation -- 5.2 Completeness of the Countermeasure -- 6 Conclusion and Future Works -- References -- Weaknesses in Two RFID Authentication Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Code-Based Cryptography -- 2.2 Randomized McEliece Cryptosystem -- 2.3 McEliece Cryptography Based on QC-MDPC Codes -- 2.4 Notations -- 3 Malek and Miri's Protocol -- 3.1 Review of the Malek and Miri's Protocol -- 3.2 Desynchronization Attack -- 4 Li et al.'s Protocol -- 4.1 Review of the Li et al.'s Protocol -- 4.2 Traceability Attack -- 5 Improved Protocol -- 5.1 Algorithm of Compute -- 5.2 Description of Improved Protocol -- 6 Conclusion -- References -- Square Code Attack on a Modified Sidelnikov Cryptosystem -- 1 Introduction -- 2 Preliminary Facts -- 3 Code-Based Public-Key Encryption Schemes -- 3.1 McEliece Encryption Scheme -- 3.2 Niederreiter Encryption Scheme -- 4 Wieschebrink's Masking Technique -- 4.1 Modified McEliece Scheme -- 4.2 Modified Niederreiter Scheme -- 5 Recovering the Random Columns in Polynomial Time -- 5.1 Reed-Muller Based Encryption Scheme -- 5.2 Description of the Attack -- 5.3 Complexity of the Attack -- 6 Conclusion -- References -- A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution -- 1 Introduction -- 2 Definitions, Notation and Main Assumption -- 3 Some Preliminary Results -- 4 AFormalProofofTheorem1 -- 5 Conclusion -- References -- Codes over L(GF(2)m,GF(2)m), MDS Diffusion Matrices and Cryptographic Applications -- 1 Additive Block Codes over -- 1 Additive Block Codes over GF(2)m and MDS Diffusion Matrices -- 1.1 Codes over a Finite Alphabet -- 1.2 Block Codes over -- 1.3 Systematic Block Codes -- 1.4 generator Matrix of a Systematic Block Code -- 1.5 Equivalence of Systematic Block Codes -- 1.6 MDS Systematic Block Codes and MDS Matrices.
1.7 MDS Diffusion Matrices for Cryptographic Applications -- 1.8 Ring Structures over -- 2 L-codes -- 2.1 Definition of -- 2.2 Duality of -- 3 Linear Codes over Subrings of -- 3.1 Notations and Remarks -- 3.2 Diagonal Endomorphisms -- 3.3 Subrings with a Single Generator -- 3.4 Block-Diagonal Subrings -- 4 Examples of Constructions -- 4.1 MDS Diffusion Matrices Derived from MDS Linear Codes over -- 4.2 An Example of Symmetric Automorphisms -- 4.3 Iterative Constructions on -- 5 Conclusion -- References -- A Higher Order Key Partitioning Attack with Application to LBlock -- 1 Introduction -- 2 Biclique Cryptanalysis -- 3 Description of LBlock -- 3.1 Notation -- 4 Higher Order Key Partitioning MitM Attack -- 4.1 A Low Data Complexity Attack on LBlock -- 5 Conclusion -- References -- A Note on the Existence of Self-Dual Skew Codes over Finite Fields -- 1 Introduction -- 2 Generalities on Self-dual Skew Codes -- 3 Self-dual Skew Codes Generated by Skew Binomials -- 4 Self-dual Skew Codes Generated by Least Common Left Multiples of Skew Polynomials -- 5 Existence of Self-dual Skew Codes over Finite Fields with Odd Characteristic -- References -- The Weight Distribution of a Family of Lagrangian-Grassmannian Codes -- 1 Introduction -- 2 Projective Isotropic Lines in a Symplectic Space of Dimension 4 over any Finite Field -- 3 is a Class of Three-Weight Linear Codes -- 4 Conclusion -- References -- Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application -- 1 Introduction -- 2 The Basic Tenets of the Wavelet Transform -- 3 The Construction of Linear Code Based on Wavelet Transform -- 4 The Construction of Robust Code Based on Wavelet Linear Code -- 5 Implementation of Wavelet Robust Codes in ADV612 Chip -- 6 Conclusion -- References.
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.
Record Nr. UNISA-996200026503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Codes, Cryptology, and Information Security : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
Codes, Cryptology, and Information Security : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXVI, 375 p. 58 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-18681-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Papers -- Multidimensional Bell Inequalities and Quantum Cryptography -- 1 Local Realism and CHSH Inequalities -- 1.1 Local Realism -- 1.2 CHSH Inequalities -- 1.3 Quantum World -- 1.4 Complete Set of Inequalities -- 1.5 Generalization to -- 2 Multidimensional Inequalities -- 2.1 Discrete Fourier Transform -- 2.2 Homogeneous Inequalities -- 3 Violation by Quantum Systems -- 3.1 Measurements with Tritters -- 4 Quantum Keys Exchange -- 4.1 Ekert'91 Protocol -- 4.2 The Inequality CHSH-3 -- 4.3 The 3DEB Protocol -- 4.4 The Homogeneous Qutrits Protocol -- 5 Conclusion -- References -- Securing the Web of Things with Role-Based Access Control -- 1 Introduction -- 2 Overview of WoT -- 2.1 Representation of Things on WoT -- 2.2 Ambient Space Stakeholders -- 2.3 WoT Framework -- 2.4 WoT Security Challenges -- 3 Overview of Role Based Access Control (RBAC) Model -- 4 Security Architecture for WoT -- 4.1 Integrating RBAC in WoT -- 4.2 Policy Enforcement Facitilies -- 4.3 Areas of Control Architecture -- 5 WOT Resources Protection -- 5.1 Documents and Views -- 5.2 Key Generation and Encryption -- 6 Conclusion and Future Work -- References -- On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax -- 1 Introduction -- 2 ERS Archiving System -- 2.1 Setup -- 2.2 ERS Specification -- 3 Security Framework -- 3.1 Task-PIOAs -- 3.2 Longterm Implementation Relation -- 3.3 CIS System Model -- 4 ERS System Model -- 4.1 Construction Overview -- 4.2 Signature Service -- 4.3 Timestamp Service -- 4.4 Hash Service -- 4.5 Service Times -- 4.6 Dispatcher -- 4.7 ERS Service -- 5 ERSSecurityProof -- 6 Conclusions -- References -- Differential Attacks Against SPN: A Thorough Analysis -- 1 Introduction -- 2 Differential Attacks Against Substitution-Permutation Networks.
2.1 Substitution-Permutation Networks -- 2.2 Differential Cryptanalysis -- 2.3 Expected Probability of a Differential Characteristic -- 3 From Characteristics to Differentials -- 3.1 Expected Probability of a 2-round Differential -- 3.2 Influence of the Weight of the Differential -- 3.3 Number of Characteristics Within a Given 2-round Differential -- 4 SPNwithanAPNSbox -- 4.1 APN Sboxes over F8 -- 4.2 APN Sboxes over F32 -- 5 MEDP2 can be Tight for a Differential of Non-minimal Weight -- 5.1 Examples where MEDP2 is Tight for a Differential of Weight ( -- 5.2 Example where MEDP2 is Tight for a Differential of Weight ( -- 6 Conclusions -- References -- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions -- 1 Introduction -- 2 Preliminaries -- 3 Characterizations of Plateaued Boolean and Vectorial Functions -- 3.1 Characterization by Means of the Derivatives -- 3.2 Characterization by Means of Power Moments of the Walsh Transform -- 4 Characterizations of the APN-ness of Componentwise Plateaued Vectorial Functions -- 4.1 Characterization by the Derivatives -- 4.2 Characterization by the Walsh Transform -- 4.3 The Case of Unbalanced Component Functions -- References -- Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards -- 1 Introduction -- 2 Smart Card Security -- 3 Some Software Attacks Again Java Card -- 3.1 Ambiguity in the Specification: The Type Confusion -- 3.2 Weakness in the Linker Process -- 3.3 Dumping the EEPROM -- 3.4 Dumping the ROM -- 3.5 A Complete Methodology to Attack Smart Card -- 4 Conclusion and Future Works -- References -- Extended Abstract: Codes as Modules over Skew Polynomial Rings -- References -- Regular Papers -- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask -- Introduction -- 1 Specifications -- 1.1 Key Schedule.
1.2 Instantiations -- 2 Design Rationale -- 3 Security Analysis -- 4 Implementation Aspects -- 4.1 Theoretical Implementation Results -- 4.2 Implementation Results and Comparisons -- 5 Conclusion -- References -- A Dynamic Attribute-Based Authentication Scheme -- 1 Introduction -- 2 ABA Scheme Introduction -- 2.1 Scheme Structure and Workflow -- 2.2 Security Requirements -- 3 Construction of the Dynamic ABA Scheme -- 3.1 Down-to-Top Attribute Tree Construction -- 3.2 Construction Algorithms -- 4 Analysis of the Dynamic ABA Scheme -- 4.1 Correctness Analysis -- 4.2 Security Requirements Analysis -- 4.3 Efficiency Analysis -- 5 Conclusions -- References -- Repeated-Root Isodual Cyclic Codes over Finite Fields -- 1 Introduction -- 2 Preliminaries -- 3 Cyclic Codes of Length 2amps over -- 4 Construction of Cyclic Isodual Codes of Length 2amps over -- 5 Cyclic Isodual Codes of Length 2amps over -- References -- Formal Enforcement of Security Policies on Parallel Systems with Risk Integration -- 1 Introduction -- 2 State of the Art -- 3 The Specification Logic of Security Policy -- 3.1 Syntax of a Logic -- 3.2 Semantics of -- 4 The Specification Language of Program -- 4.1 Syntax -- 4.2 Semantic -- 5 Formal Enforcement of Security Policies with Risk Integration -- 6 Example -- 7 Conclusion and Future Work -- References -- Countermeasures Mitigation for Designing Rich Shell Code in Java Card -- 1 Introduction -- 2 JavaCardSecurity -- 3 Embedded Countermeasures -- 3.1 State of the Art of Attacks Against Java Cards -- 3.2 Mitigating the Attacks with Affordable Countermeasures -- 3.3 Checking the Jump Boundaries -- 4 Mitigating the Control Flow Countermeasures -- 4.1 Principle of the Control Flow Extraction -- 4.2 Parameters Exchange between the Controller and the Shell Code -- 5 Experiments: The Java Self Modifying Code Revisited.
5.1 Type Confusion Exploitation -- 5.2 Completeness of the Countermeasure -- 6 Conclusion and Future Works -- References -- Weaknesses in Two RFID Authentication Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Code-Based Cryptography -- 2.2 Randomized McEliece Cryptosystem -- 2.3 McEliece Cryptography Based on QC-MDPC Codes -- 2.4 Notations -- 3 Malek and Miri's Protocol -- 3.1 Review of the Malek and Miri's Protocol -- 3.2 Desynchronization Attack -- 4 Li et al.'s Protocol -- 4.1 Review of the Li et al.'s Protocol -- 4.2 Traceability Attack -- 5 Improved Protocol -- 5.1 Algorithm of Compute -- 5.2 Description of Improved Protocol -- 6 Conclusion -- References -- Square Code Attack on a Modified Sidelnikov Cryptosystem -- 1 Introduction -- 2 Preliminary Facts -- 3 Code-Based Public-Key Encryption Schemes -- 3.1 McEliece Encryption Scheme -- 3.2 Niederreiter Encryption Scheme -- 4 Wieschebrink's Masking Technique -- 4.1 Modified McEliece Scheme -- 4.2 Modified Niederreiter Scheme -- 5 Recovering the Random Columns in Polynomial Time -- 5.1 Reed-Muller Based Encryption Scheme -- 5.2 Description of the Attack -- 5.3 Complexity of the Attack -- 6 Conclusion -- References -- A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution -- 1 Introduction -- 2 Definitions, Notation and Main Assumption -- 3 Some Preliminary Results -- 4 AFormalProofofTheorem1 -- 5 Conclusion -- References -- Codes over L(GF(2)m,GF(2)m), MDS Diffusion Matrices and Cryptographic Applications -- 1 Additive Block Codes over -- 1 Additive Block Codes over GF(2)m and MDS Diffusion Matrices -- 1.1 Codes over a Finite Alphabet -- 1.2 Block Codes over -- 1.3 Systematic Block Codes -- 1.4 generator Matrix of a Systematic Block Code -- 1.5 Equivalence of Systematic Block Codes -- 1.6 MDS Systematic Block Codes and MDS Matrices.
1.7 MDS Diffusion Matrices for Cryptographic Applications -- 1.8 Ring Structures over -- 2 L-codes -- 2.1 Definition of -- 2.2 Duality of -- 3 Linear Codes over Subrings of -- 3.1 Notations and Remarks -- 3.2 Diagonal Endomorphisms -- 3.3 Subrings with a Single Generator -- 3.4 Block-Diagonal Subrings -- 4 Examples of Constructions -- 4.1 MDS Diffusion Matrices Derived from MDS Linear Codes over -- 4.2 An Example of Symmetric Automorphisms -- 4.3 Iterative Constructions on -- 5 Conclusion -- References -- A Higher Order Key Partitioning Attack with Application to LBlock -- 1 Introduction -- 2 Biclique Cryptanalysis -- 3 Description of LBlock -- 3.1 Notation -- 4 Higher Order Key Partitioning MitM Attack -- 4.1 A Low Data Complexity Attack on LBlock -- 5 Conclusion -- References -- A Note on the Existence of Self-Dual Skew Codes over Finite Fields -- 1 Introduction -- 2 Generalities on Self-dual Skew Codes -- 3 Self-dual Skew Codes Generated by Skew Binomials -- 4 Self-dual Skew Codes Generated by Least Common Left Multiples of Skew Polynomials -- 5 Existence of Self-dual Skew Codes over Finite Fields with Odd Characteristic -- References -- The Weight Distribution of a Family of Lagrangian-Grassmannian Codes -- 1 Introduction -- 2 Projective Isotropic Lines in a Symplectic Space of Dimension 4 over any Finite Field -- 3 is a Class of Three-Weight Linear Codes -- 4 Conclusion -- References -- Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application -- 1 Introduction -- 2 The Basic Tenets of the Wavelet Transform -- 3 The Construction of Linear Code Based on Wavelet Transform -- 4 The Construction of Robust Code Based on Wavelet Linear Code -- 5 Implementation of Wavelet Robust Codes in ADV612 Chip -- 6 Conclusion -- References.
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.
Record Nr. UNINA-9910484027803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIII, 420 p. 139 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Security
Privacy
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-319-49445-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
Record Nr. UNISA-996465511303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIII, 420 p. 139 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Security
Privacy
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-319-49445-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
Record Nr. UNINA-9910483609103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sequences and Their Applications - SETA 2010 [[electronic resource] ] : 6th International Conference, Paris, France, September 13-17, 2010. Proceedings / / edited by Claude Carlet, Alexander Pott
Sequences and Their Applications - SETA 2010 [[electronic resource] ] : 6th International Conference, Paris, France, September 13-17, 2010. Proceedings / / edited by Claude Carlet, Alexander Pott
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 465 p. 50 illus.)
Disciplina 515.24
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Discrete mathematics
Algorithms
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Coding theory
Information theory
Discrete Mathematics in Computer Science
Cryptology
Computer Communication Networks
IT Operations
Coding and Information Theory
ISBN 1-280-38916-8
9786613567086
3-642-15874-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- Low Correlation Zone Sequences -- Algorithmic Aspects -- Decimation Generator of Zadoff-Chu Sequences -- An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence -- Acquisition Times of Contiguous and Distributed Marker Sequences: A Cross-Bifix Analysis -- Frequency Hopping -- Lower Bounds on the Average Partial Hamming Correlations of Frequency Hopping Sequences with Low Hit Zone -- New Families of Frequency-Hopping Sequences of Length mN Derived from the k-Fold Cyclotomy -- Multiple Access Systems -- User-Irrepressible Sequences -- New Optimal Variable-Weight Optical Orthogonal Codes -- Invited Paper -- Recent Results on Recursive Nonlinear Pseudorandom Number Generators -- Linear Complexity -- A General Approach to Construction and Determination of the Linear Complexity of Sequences Based on Cosets -- On the Autocorrelation and the Linear Complexity of q-Ary Prime n-Square Sequences -- An Improved Approximation Algorithm for Computing the k-Error Linear Complexity of Sequences Using the Discrete Fourier Transform -- Finite Fields -- Transformations on Irreducible Binary Polynomials -- Power Permutations in Dimension 32 -- Character Sums -- Multiplicative Character Sums with Counter-Dependent Nonlinear Congruential Pseudorandom Number Generators -- Ternary Kloosterman Sums Modulo 18 Using Stickelberger’s Theorem -- Merit Factor -- Appended m-Sequences with Merit Factor Greater than 3.34 -- FCSR -- A With-Carry Walsh Transform -- Clock-Controlled FCSR Sequence with Large Linear Complexity -- Vectorial Conception of FCSR -- Hadamard Matrices and Transforms -- Fourier Duals of Björck Sequences -- New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences -- Cryptography -- ?4-Nonlinearity of a Constructed Quaternary Cryptographic Functions Class -- A Public Key Cryptosystem Based upon Euclidean Addition Chains -- Optimal Authentication Codes from Difference Balanced Functions -- Invited Paper -- New Extensions and Applications of Welch-Bound-Equality Sequence Sets -- Statistical Analysis -- Evaluation of Randomness Test Results for Short Sequences -- Statistical Analysis of Search for Set of Sequences in Random and Framed Data -- Boolean Functions and Related Problems -- On the Nonlinearity of Discrete Logarithm in -- On a Conjecture about Binary Strings Distribution -- Nega–Hadamard Transform, Bent and Negabent Functions -- Synchronization of Boolean Dynamical Systems: A Spectral Characterization -- Nonbinary Sequences -- Some Constructions of Almost-Perfect, Odd-Perfect and Perfect Polyphase and Almost-Polyphase Sequences -- Almost p-Ary Perfect Sequences -- Sequences, Bent Functions and Jacobsthal Sums -- Infinite Sequences -- Infinite Sequences with Finite Cross-Correlation -- Invited Paper -- Reed Muller Sensing Matrices and the LASSO.
Record Nr. UNISA-996465894003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Sequences and their applications-- SETA 2010 : 6th International Conference, Paris, France, September 13-17, 2010 : proceedings / / Claude Carlet, Alexander Pott (eds.)
Sequences and their applications-- SETA 2010 : 6th International Conference, Paris, France, September 13-17, 2010 : proceedings / / Claude Carlet, Alexander Pott (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (X, 465 p. 50 illus.)
Disciplina 515.24
Altri autori (Persone) CarletClaude
PottAlexander
Collana Lecture notes in computer science
Soggetto topico Sequences (Mathematics)
Coding theory
ISBN 1-280-38916-8
9786613567086
3-642-15874-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- Low Correlation Zone Sequences -- Algorithmic Aspects -- Decimation Generator of Zadoff-Chu Sequences -- An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence -- Acquisition Times of Contiguous and Distributed Marker Sequences: A Cross-Bifix Analysis -- Frequency Hopping -- Lower Bounds on the Average Partial Hamming Correlations of Frequency Hopping Sequences with Low Hit Zone -- New Families of Frequency-Hopping Sequences of Length mN Derived from the k-Fold Cyclotomy -- Multiple Access Systems -- User-Irrepressible Sequences -- New Optimal Variable-Weight Optical Orthogonal Codes -- Invited Paper -- Recent Results on Recursive Nonlinear Pseudorandom Number Generators -- Linear Complexity -- A General Approach to Construction and Determination of the Linear Complexity of Sequences Based on Cosets -- On the Autocorrelation and the Linear Complexity of q-Ary Prime n-Square Sequences -- An Improved Approximation Algorithm for Computing the k-Error Linear Complexity of Sequences Using the Discrete Fourier Transform -- Finite Fields -- Transformations on Irreducible Binary Polynomials -- Power Permutations in Dimension 32 -- Character Sums -- Multiplicative Character Sums with Counter-Dependent Nonlinear Congruential Pseudorandom Number Generators -- Ternary Kloosterman Sums Modulo 18 Using Stickelberger’s Theorem -- Merit Factor -- Appended m-Sequences with Merit Factor Greater than 3.34 -- FCSR -- A With-Carry Walsh Transform -- Clock-Controlled FCSR Sequence with Large Linear Complexity -- Vectorial Conception of FCSR -- Hadamard Matrices and Transforms -- Fourier Duals of Björck Sequences -- New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences -- Cryptography -- ?4-Nonlinearity of a Constructed Quaternary Cryptographic Functions Class -- A Public Key Cryptosystem Based upon Euclidean Addition Chains -- Optimal Authentication Codes from Difference Balanced Functions -- Invited Paper -- New Extensions and Applications of Welch-Bound-Equality Sequence Sets -- Statistical Analysis -- Evaluation of Randomness Test Results for Short Sequences -- Statistical Analysis of Search for Set of Sequences in Random and Framed Data -- Boolean Functions and Related Problems -- On the Nonlinearity of Discrete Logarithm in -- On a Conjecture about Binary Strings Distribution -- Nega–Hadamard Transform, Bent and Negabent Functions -- Synchronization of Boolean Dynamical Systems: A Spectral Characterization -- Nonbinary Sequences -- Some Constructions of Almost-Perfect, Odd-Perfect and Perfect Polyphase and Almost-Polyphase Sequences -- Almost p-Ary Perfect Sequences -- Sequences, Bent Functions and Jacobsthal Sums -- Infinite Sequences -- Infinite Sequences with Finite Cross-Correlation -- Invited Paper -- Reed Muller Sensing Matrices and the LASSO.
Record Nr. UNINA-9910483503103321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui