|
![]() |
|||
|
||||
OverviewThis is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. Full Product DetailsAuthor: Thomas W. Cusick (State University of New York, Buffalo, USA) , Cunsheng Ding (Hong Kong University of Science and Technology, Hong Kong.) , Ari R. Renvall (University of Turku, Finland)Publisher: Elsevier Science & Technology Imprint: Elsevier Science Ltd Edition: Revised edition Volume: v. 66 Dimensions: Width: 14.90cm , Height: 2.50cm , Length: 22.50cm Weight: 1.000kg ISBN: 9780444516312ISBN 10: 044451631 Pages: 492 Publication Date: 17 February 2004 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsContents Preface to the Revised EditionPreface to the First Edition.1 Introduction.2 Stream Ciphers.3 Primes, Primitive Roots and Sequences.4 Cyclotomy and Cryptographic Functions.5 Special Primes and Sequences.6 Highly Nonlinear Functions.7 Difference Sets and Sequences.8 Binary Cyclotomic Generators.9 Analysis of Cyclotomic Generators of Order 2.10 Nonbinary Cyclotomic Generators.11 Generators Based on Permutations.12 Quadratic Partitions and Cryptography.13 Group Characters and Cryptography.14 P-Adic Numbers, Class Numbers and Sequences.15 Prime Ciphering Algorithms.16 Cryptographic Problems and Philosophies.Appendix A: More About Cyclotomic Numbers.Appendix B: Cyclotomic Formulae of Orders 6, 8 and 10.Appendix C: Finding Practical Primes.Appendix D: List of Research Problems.Appendix E: Exercises.Appendix F: List of Mathematical Symbols.Bibliography.Index.Reviews...deals with many connections between stream ciphers and number theory covering topics like construction of generators, cryptographic properties of key streams such as linear complexity, pattern distribution, correlation properties and 2-adic complexity. The monograph gives a useful overview on the present stage of research, moreover it contains more than 30 open research problems. -Willfried Meidl, in ZENTRALBLATT MATH ...deals with many connections between stream ciphers and number theory covering topics like construction of generators, cryptographic properties of key streams such as linear complexity, pattern distribution, correlation properties and 2-adic complexity. The monograph gives a useful overview on the present stage of research, moreover it contains more than 30 open research problems. -Willfried Meidl, in ZENTRALBLATT MATH Author InformationThomas Cusick has 25 years of experience in cryptography, 60 published papers in that subject and 8 Ph. D. students whose thesis work was in that area. He is currently located at the State University of New York in Buffalo, New York. Tab Content 6Author Website:Countries AvailableAll regions |