Recent Findings in Boolean Techniques


Book Description

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 14th annual International Workshop on Boolean Problems.




Bent Functions


Book Description

This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several results. This book uniquely provides a necessary comprehensive coverage of bent functions.It serves as a useful reference for researchers in discrete mathematics, coding and cryptography. Students and professors in mathematics and computer science will also find the content valuable, especially those interested in mathematical foundations of cryptography. It can be used as a supplementary text for university courses on discrete mathematics, Boolean functions, or cryptography, and is appropriate for both basic classes for under-graduate students and advanced courses for specialists in cryptography and mathematics.




Reversible Computation


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Reversible Computation, RC 2014, held in Kyoto, Japan, in July 2014. The 14 contributions presented together with three invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on automata for reversible computation; notation and languages for reversible computation; synthesis and optimization for reversible circuits; validation and representation of quantum logic.




Bent Functions


Book Description

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more. - Provides a detailed survey of bent functions and their main results, presenting a systematic overview of their generalizations and applications - Presents a systematic and detailed survey of hundreds of results in the area of highly nonlinear Boolean functions in cryptography - Appropriate coverage for students from advanced specialists in cryptography, mathematics, and creators of ciphers




Advances in the Boolean Domain


Book Description

This book gathers together the results of research on the Boolean domain related to important real-life applications that will support the reader in solving their scientific and practical tasks. It highlights that ongoing digitalization leads to increasing amounts of complex applications, the digits of which are usually encoded by Boolean variables due to their simplicity as only two values are used. However, as shown here, an exponentially growing number of vectors of Boolean variables can negate this simplicity, which leads to challenges in advancing progress in the Boolean domain and supporting a wide range of applications.




Cryptography and Coding


Book Description

This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.




Open Problems in Mathematics and Computational Science


Book Description

This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers in the areas of theoretical computer science, discrete mathematics, engineering, and cryptology.




Advanced Computer Systems


Book Description

Advanced Computer Systems is a collection of forty selected papers presented to the Eighth International Conference on Computer Systems, October 2001 in Mielno, Poland. These papers provide a comprehensive summary of practice and research progress in information technologies: Recognition, Security and Safety concentrates on the widely-known problems of information systems security. Methods of Artificial Intelligence presents methods and algorithms which are the basics for the applications of artificial intelligence environments. Intelligent Agents and Distributed Activities includes laboratory research on multiagent intelligent systems as well as upon their applications in searching information, negotiating and supporting decision. Distributed Productions Networks and Modeling Complex Systems present production processes in distributed shared virtual environment, virtual solution of integer optimization problems, and a queuing approach to performance optimization in the distributed production network.




Codes, Cryptology and Information Security


Book Description

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.