Finite Automata and Application to Cryptography

Author:   Renji Tao
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1st ed. Softcover of orig. ed. 2009
ISBN:  

9783642096907


Pages:   350
Publication Date:   07 March 2011
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $657.36 Quantity:  
Add to Cart

Share |

Finite Automata and Application to Cryptography


Add your own review!

Overview

""Finite Automata and Application to Cryptography"" mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed. Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed. This book may be used as a reference for computer science and mathematics majors, including seniors and graduate students. Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing.

Full Product Details

Author:   Renji Tao
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1st ed. Softcover of orig. ed. 2009
Weight:   0.637kg
ISBN:  

9783642096907


ISBN 10:   3642096905
Pages:   350
Publication Date:   07 March 2011
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Chapter 1 Introduction.- Chapter 2 Mutual Invertibility and Search.- Chapter 3 R_a R_b Transformation Method.- Chapter 4 Relations Between Transformations.- Chapter 5 Structure of Feedforward Inverses.- Chapter 6 Some Topics on Structure Problem.- Chapter 7 Linear Autonomous Finite Automata.- Chapter 8 One Key Cryptosystems and Latin Arrays.- Chapter 9 Finite Automaton Public Key Cryptosystems.

Reviews

From the reviews: The present book treats an up-to-date subject from a mathematical point of view. ! The entire work is presented at a high level and has a very good and well proved mathematical background ! making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems. (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009) This is a most welcome and anticipated volume in the fields of automata and cryptography. ! this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature ! . researchers will be most comfortable with the structure and format of individual chapters ! . There is a collective exhaustive bibliography at the end of the book ! . (Michael Goldberg, ACM Computing Reviews, July, 2009)


"From the reviews: ""The present book treats an up-to-date subject from a mathematical point of view. ... The entire work is presented at a high level and has a very good and well proved mathematical background ... making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems."" (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009) ""This is a most welcome and anticipated volume in the fields of automata and cryptography. ... this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature ... . researchers will be most comfortable with the structure and format of individual chapters ... . There is a collective exhaustive bibliography at the end of the book ... ."" (Michael Goldberg, ACM Computing Reviews, July, 2009)"


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List