opac header image
Image from Google Jackets
Image from Coce

Stream ciphers and number theory [electronic resource] / Thomas W. Cusick, Cunsheng Ding, Ari Renvall.

By: Cusick, Thomas W, 1943-Contributor(s): Ding, C. (Cunsheng), 1962- | Renvall, Ari, 1963-Material type: TextTextSeries: North-Holland mathematical library ; v. 66.Publication details: Amsterdam ; Boston : Elsevier, 2004. Edition: Rev. edDescription: 1 online resource (xvii, 474 p.)ISBN: 9780444516312; 044451631XSubject(s): Number theory | Ciphers | Stream ciphers | Ciphers | Number theoryGenre/Form: Electronic books.Additional physical formats: Print version:: Stream ciphers and number theory.DDC classification: 512.7 LOC classification: QA241 | .C87 2004ebOnline resources: ScienceDirect | Volltext
Contents:
Contents -- Preface to the Revised Edition -- Preface to the First Edition. -- 1 Introduction. -- 2 Stream Ciphers. -- 3 Primes, Primitive Roots and Sequences. -- 4 Cyclotomy and Cryptographic Functions. -- 5 Special Primes and Sequences. -- 6 Highly Nonlinear Functions. -- 7 Difference Sets and Sequences. -- 8 Binary Cyclotomic Generators. -- 9 Analysis of Cyclotomic Generators of Order 2. -- 10 Nonbinary Cyclotomic Generators. -- 11 Generators Based on Permutations. -- 12 Quadratic Partitions and Cryptography. -- 13 Group Characters and Cryptography. -- 14 P-Adic Numbers, Class Numbers and Sequences. -- 15 Prime Ciphering Algorithms. -- 16 Cryptographic Problems and Philosophies. -- Appendix A: More About Cyclotomic Numbers. -- Appendix B: Cyclotomic Formulae of Orders 6, 8 and 10. -- Appendix C: Finding Practical Primes. -- Appendix D: List of Research Problems. -- Appendix E: Exercises. -- Appendix F: List of Mathematical Symbols. -- Bibliography. -- Index.
Summary: This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. Unique book on interactions of stream ciphers and number theory. Research monograph with many results not available elsewhere. A revised edition with the most recent advances in this subject. Over thirty research problems for stimulating interactions between the two areas. Written by leading researchers in stream ciphers and number theory.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. Unique book on interactions of stream ciphers and number theory. Research monograph with many results not available elsewhere. A revised edition with the most recent advances in this subject. Over thirty research problems for stimulating interactions between the two areas. Written by leading researchers in stream ciphers and number theory.

Contents -- Preface to the Revised Edition -- Preface to the First Edition. -- 1 Introduction. -- 2 Stream Ciphers. -- 3 Primes, Primitive Roots and Sequences. -- 4 Cyclotomy and Cryptographic Functions. -- 5 Special Primes and Sequences. -- 6 Highly Nonlinear Functions. -- 7 Difference Sets and Sequences. -- 8 Binary Cyclotomic Generators. -- 9 Analysis of Cyclotomic Generators of Order 2. -- 10 Nonbinary Cyclotomic Generators. -- 11 Generators Based on Permutations. -- 12 Quadratic Partitions and Cryptography. -- 13 Group Characters and Cryptography. -- 14 P-Adic Numbers, Class Numbers and Sequences. -- 15 Prime Ciphering Algorithms. -- 16 Cryptographic Problems and Philosophies. -- Appendix A: More About Cyclotomic Numbers. -- Appendix B: Cyclotomic Formulae of Orders 6, 8 and 10. -- Appendix C: Finding Practical Primes. -- Appendix D: List of Research Problems. -- Appendix E: Exercises. -- Appendix F: List of Mathematical Symbols. -- Bibliography. -- Index.

Includes bibliographical references (p. 435-471) and index.

Description based on print version record.

There are no comments on this title.

to post a comment.
© 2024 Copyright: Customised and Maintained by Central Library NISER

Central Library, NISER Library Building, PO-Jatni, Khurda, Odisha - 752050, India | Email: libniser@niser.ac.in Phone: +91-674-2494171

Powered by Koha