Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Four decades of research on bent functions

C Carlet, S Mesnager - Designs, codes and cryptography, 2016 - Springer
In this survey, we revisit the Rothaus paper and the chapter of Dillon's thesis dedicated to
bent functions, and we describe the main results obtained on these functions during these …

[PDF][PDF] Twofish: A 128-bit block cipher

B Schneier, J Kelsey, D Whiting, D Wagner… - NIST AES …, 1998 - karlin.mff.cuni.cz
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …

Information sharing across private databases

R Agrawal, A Evfimievski, R Srikant - Proceedings of the 2003 ACM …, 2003 - dl.acm.org
Literature on information integration across databases tacitly assumes that the data in each
database can be revealed to the other databases. However, there is an increasing need for …

[图书][B] Bent functions: results and applications to cryptography

N Tokareva - 2015 - books.google.com
Bent Functions: Results and Applications to Cryptography offers a unique survey of the
objects of discrete mathematics known as Boolean bent functions. As these maximal …

[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
This thesis contains a new approach to design block ciphers, synchronous and self-
synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …