You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.
A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.
A collection of papers written by prominent experts that examine a variety of advanced topics related to Boolean functions and expressions.
With the impending demise of modernist planning, the footprints and corpses of failed modernist visions are littered everywhere. A vacuum of implementable urban theories has occurred at the time when unprecedented expansion and restructuring of cities in rapidly developing economies are taking place. In this collection of essays, William S W Lim zeroes in on the peculiarities and dynamics of present Asian urban and architectural conditions in order to challenge and transcend the socio-ecological forms and political influences generated by the current system of global capitalism.Part I of this book consists of the main essay, which attempts to establish baselines for an effective formulation ...
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
Feel like a goondu when you ask for a cuppa in a kopitiam? Wish you could charm everyone from the chattering aunties in the crowded streets of Chinatown to the beaming makcik in the Gelang Serai soto mee store? Or perhaps buaya that seksy girl with witty rapport? SOS of Singlish reveals our language sins against English and is stuffed with trivia, gems and devilishly funny nonsense. It will aggravate academics, titillate with unexpected jokes, and educate you on the snags and wrong sounds of Singlish.
Without a doubt one of the world's greatest cities, London is inexhaustible in the riches it has to offer. And all its finest sights - from its Roman ruins, royal palaces, churches and abbeys, to the temples of commerce, street markets, parks and gardens - are, as many have learned, best discovered on foot. Let author Gregory Byrne Bracken guide you through this complexity with a series of insider's tours specially designed to take in the very best of the city. Each of the walks, varying from an hour's duration to two, is packed with sights, and where one walk ends, the next one picks up - so you make the most of your time in this great city. The stories of ambition, empire, love, death and ...
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.
As Enlightenment notions of predictability, progress and the sense that humans could control and shape their environments informed European thought, catastrophes shook many towns to the core, challenging the new world view with dramatic impact. This book concentrates on a period marked by passage from a society of scarcity to one of expenditure and accumulation, from ranks and orders to greater social mobility, from traditional village life to new bourgeois and even individualistic urbanism. The volume employs a broad definition of catastrophe, as it examines how urban communities conceived, adapted to, and were transformed by catastrophes, both natural and human-made. Competing views of gen...
None