Download Coding and cryptology: proceedings of the international by Huaxiong Wang, Yongqing Li, Shengyuan Zhang PDF

By Huaxiong Wang, Yongqing Li, Shengyuan Zhang

Li Y., Ling S., Niederreiter H., Wang H., Xing C. (eds.) Coding and Cryptology.. court cases of the overseas Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007 (WS, 2008)(ISBN 9812832238)(O)(288s)

Show description

Read Online or Download Coding and cryptology: proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 PDF

Best information theory books

Networks and Grids: Technology and Theory

This textbook is meant for an undergraduate/graduate path on desktop networks and for introductory classes facing functionality review of desktops, networks, grids and telecommunication platforms. in contrast to different books at the topic, this article provides a balanced strategy among know-how and mathematical modeling.

Future Information Technology - II

The recent multimedia criteria (for instance, MPEG-21) facilitate the seamless integration of a number of modalities into interoperable multimedia frameworks, reworking the way in which humans paintings and have interaction with multimedia facts. those key applied sciences and multimedia ideas engage and collaborate with one another in more and more potent methods, contributing to the multimedia revolution and having an important impression throughout a large spectrum of buyer, company, healthcare, schooling, and governmental domain names.

Data and Information Quality: Dimensions, Principles and Techniques

This publication presents a scientific and comparative description of the titanic variety of learn concerns with regards to the standard of knowledge and knowledge. It does so by way of supplying a valid, built-in and entire assessment of the state-of-the-art and destiny improvement of knowledge and knowledge caliber in databases and data structures.

Extra resources for Coding and cryptology: proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007

Example text

May 23, 2008 13:28 WSPC - Proceedings Trim Size: 9in x 6in series 26 This improvement of an idea due to C. Shannon [33] uses the existence of low degree multiples of the nonlinear function. It is called algebraic attack [4,16,19,30] and has deeply modified the situation with Boolean functions in stream ciphers. Given a Boolean function f on n variables, different kinds of scenarios related to low degree multiples of f have been studied in ref. 19,30. The core of the analysis is to find out minimum (or low) degree nonzero annihilators of f or of 1 + f , that is, functions g such that f ∗ g = 0 or (1 + f ) ∗ g = 0, where ”∗” is the multiplication of functions inheritated from the multiplication in F2 .

52, 2111–2126, (2006). fr. Because of the recent algebraic attacks, a high algebraic immunity is now an absolutely necessary (but not sufficient) property for Boolean functions used in stream ciphers. Very few examples of (balanced) functions with high algebraic immunity have been found so far. These examples seem to be isolated and no method for obtaining such functions is known. In this paper, we introduce a general method for proving that a given function, in any number of variables, has a prescribed algebraic immunity.

Gupta and S. Maitra. Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. IEEE Transactions on Information Theory, vol. 52, no. 7, pp. 3105-3121, July 2006. 14. C. Carlet, X. Zeng, C. Li and L. HU. Further properties of several classes of Boolean functions with optimum algebraic immunity. IACR e-print archive 2007/370. 15. J. Y. Cho and J. Pieprzyk. Algebraic Attacks on SOBER-t32 and SOBER128. In FSE 2004, number 3017 in Lecture Notes in Computer Science, pp.

Download PDF sample

Rated 4.23 of 5 – based on 39 votes