Skip to main content

Construction and Analysis of Cryptographic Functions

  • Book
  • © 2014

Overview

  • Examines two cryptographic functions which combat two of the most powerful attacks on symmetric cryptosystems
  • Demonstrates new methods for construction of these functions
  • Presents novel research used in many areas of mathematics and information theory, in particular, Boolean functions, symmetric cryptography, discrete mathematics, combinatorics, finite geometry, and coding theory
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (6 chapters)

Keywords

About this book

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.

Reviews

“The book deals with functions on finite fields that are used in cryptography. … Anybody who is not only interested in the construction of cryptographic relevant function, but who wants to learn also about the problem how to classify functions up to equivalence, should refer to this excellent text.” (Alexander Pott, zbMATH 1367.94001, 2017) 

Authors and Affiliations

  • Department of Informatics, University of Bergen, Bergen, Norway

    Lilya Budaghyan

Bibliographic Information

Publish with us