This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …
Contents 1 Geometry and arithmetic 2 Points of finite order 3 The group of rational points 4 Cubic curves over finite fields 5 Integer points on cubic curves 6 Complex multiplication
INTRODUCTION THE BASIC THEORY Weierstrass Equations The Group Law Projective Space and the Point at Infinity Proof of Associativity Other Equations for Elliptic Curves Other Coordinate Systems The j-Invariant Elliptic Curves in Characteristic 2 Endomorphisms Singular Curves Elliptic Curves mod n TORSION POINTS T…
Termasuk bibliografi dan indeks. CONTENTS: Terminology of Cryptography Notation Types of Attacks Public Key Ciphers Block and Stream Ciphers Protocols Probability Theory Definitions The Birthday Problem Random Variables Divisibility and Arithmetic Divisibility Arithmetic with Large Integers Grea…
CONTENTS: 1. History of Finite Fields 2. Introduction to Finite Fields 3. Irreducible Polynomials 4. Primitive Polynomials 5. Bases 6. Exponential and Character Sums 7. Equations over Finite Fields 8. Permutation Polynomials 9. Special Functions over Finite Fields 10. Sequences over Finite Fields 11. Algorithms 12. Curves over Finite Fields 13. Miscellaneous Theoretical Topics …
CONTENTS: 1. Introduction. 2. Stream Ciphers. 3. Primes, Primitive Roots and Sequences. 4. Cyclotomy and Cryptographic Functions. 5. Special Primes and Sequences. 6. Highly Nonlinear Functions. 7. Difference Sets and Sequences. 8. Binary Cyclotomic Generators. 9. Analysis of Cyclotomic Generators of Order 2. 10. Nonbinary Cyclotomic Generators. 11. Generators Based on Permutations. …
null
Termasuk bibliografi dan indeks. CONTENTS: Terminology of Cryptography < >Notation < >Types of Attacks < >Public Key Ciphers < >Block and Stream Ciphers < >Protocols Probability Theory < >Definitions < >The Birthday Problem < >Random Variables Divisibility and Arithmetic < >Divisibility<…