Plus d’un million de livres à portée de main !
Bookbot

Guang Gong

    Sequences and their applications
    Progress in cryptology
    Signal Design for Good Correlation
    • Signal Design for Good Correlation

      • 458pages
      • 17 heures de lecture
      4,0(3)Évaluer

      The book offers an in-depth exploration of modern methodologies and applications in telecommunications and signal processing. Key topics include CDMA telephony, coded radar systems, and the generation of stream ciphers. It serves as a valuable resource for understanding the latest advancements and practical implementations in these fields, making it suitable for both professionals and students interested in cutting-edge technology.

      Signal Design for Good Correlation
    • Progress in cryptology

      • 363pages
      • 13 heures de lecture

      This book covers a range of topics in cryptography, highlighting both theoretical advancements and practical applications. It begins with discussions on the security of RSA and multivariate schemes, including improvements to partial key exposure attacks and the unbalanced oil and vinegar signature scheme. The analysis extends to a multivariate signature scheme featuring a partially cyclic public key. The text delves into the security of key agreement protocols, exploring indifferentiability beyond the birthday bound and characterizing Luby-Rackoff's work. It also addresses versatile voting systems and the theory and practice of cryptographic hash functions, including cryptanalysis of specific hash functions like Tav-128 and SHA-3 compression functions. The book discusses attacks on block and stream ciphers, presenting new boomerang attacks on ARIA and analyzing the KATAN family of block ciphers. It introduces concepts like greedy distinguishers and nonrandomness detectors, alongside efficient cryptographic computation methods. Further, it covers polynomial multiplication over binary fields, random Euclidean addition chain generation for point multiplication, and various cryptanalysis techniques for AES, including higher-order masking attacks and improved differential cryptanalysis. The text concludes with efficient implementation strategies, including a program generator for Intel AES-NI instructions and novel hardware des

      Progress in cryptology
    • Sequences and their applications

      • 433pages
      • 16 heures de lecture

      The content includes a variety of invited papers discussing topics related to sequences and their complexities. Key areas explored are shift register sequences, linear complexity of multisequences, and the applications of multi-continued fraction algorithms. The analysis of linear complexity over various fields, including bounds on linear complexity for Sidel’nikov sequences, is also covered. Additionally, the correlation properties of binary sequences and their ideal autocorrelation characteristics are examined. The text delves into stream ciphers, focusing on the security of jump-controlled sequence generators and enhancements to Rijndael-like S-boxes. It further addresses nonlinear complexities of binary sequences, connections to Lempel-Ziv compression, and the computation of k-error N-adic complexities. The classification of periodic binary sequences into nonlinear complexity classes is discussed alongside new algorithms for computing terms in characteristic sequences. The implementation of multi-continued fraction algorithms for multi-sequence synthesis is highlighted, as well as the study of pseudo-random binary sequences derived from elliptic curves. The document also touches on the periodicity and distribution properties of combined FCSR sequences, aperiodic correlation, and generalized bounds on partial aperiodic correlation. Lastly, it examines boolean functions, their immunity profiles, and methods for constru

      Sequences and their applications