Finite Automata and Application to Cryptography
Autor Renji Taoen Limba Engleză Hardback – 12 dec 2008
Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed.
The book may be used as a reference for computer science and mathematics majors, including seniors and graduate students.
Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing.
Preț: 936.65 lei
Preț vechi: 1142.25 lei
-18% Nou
Puncte Express: 1405
Preț estimativ în valută:
179.26€ • 186.20$ • 148.90£
179.26€ • 186.20$ • 148.90£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540782568
ISBN-10: 3540782567
Pagini: 350
Ilustrații: 350 p. 2 illus.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.75 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540782567
Pagini: 350
Ilustrații: 350 p. 2 illus.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.75 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Mutual Invertibility and Search.- Ra Rb Transformation Method.- Relations Between Transformations.- Structure of Feedforward Inverses.- Some Topics on Structure Problem.- Linear Autonomous Finite Automata.- One Key Cryptosystems and Latin Arrays.- Finite Automaton Public Key Cryptosystems.
Recenzii
From the reviews:
"The present book treats an up-to-date subject from a mathematical point of view. … The entire work is presented at a high level and has a very good and well proved mathematical background … making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems." (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009)
"This is a most welcome and anticipated volume in the fields of automata and cryptography. … this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature … . researchers will be most comfortable with the structure and format of individual chapters … . There is a collective exhaustive bibliography at the end of the book … ." (Michael Goldberg, ACM Computing Reviews, July, 2009)
"The present book treats an up-to-date subject from a mathematical point of view. … The entire work is presented at a high level and has a very good and well proved mathematical background … making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems." (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009)
"This is a most welcome and anticipated volume in the fields of automata and cryptography. … this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature … . researchers will be most comfortable with the structure and format of individual chapters … . There is a collective exhaustive bibliography at the end of the book … ." (Michael Goldberg, ACM Computing Reviews, July, 2009)
Caracteristici
Elaborates automata-theoretic aspect of cryptography Proposes a canonical form for one key cryptosystems and a new design approach different from Shannon's Presents deeper crypto-analyses for Finite Automata Public Key Cryptography (FAPKC)