Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Contents Preface to the Revised Edition
Preface to the First Edition.
2 Stream Ciphers.
3 Primes, Primitive Roots and Sequences.
4 Cyclotomy and Cryptographic Functions.
5 Special Primes and Sequences.
6 Highly Nonlinear Functions.
7 Difference Sets and Sequences.
8 Binary Cyclotomic Generators.
9 Analysis of Cyclotomic Generators of Order 2.
10 Nonbinary Cyclotomic Generators.
11 Generators Based on Permutations.
12 Quadratic Partitions and Cryptography.
13 Group Characters and Cryptography.
14 P-Adic Numbers, Class Numbers and Sequences.
15 Prime Ciphering Algorithms.
16 Cryptographic Problems and Philosophies.
Appendix A: More About Cyclotomic Numbers. Appendix B: Cyclotomic Formulae of Orders 6, 8 and 10. Appendix C: Finding Practical Primes. Appendix D: List of Research Problems. Appendix E: Exercises. Appendix F: List of Mathematical Symbols. Bibliography. Index.
This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields.
· Unique book on interactions of stream ciphers and number theory. · Research monograph with many results not available elsewhere. · A revised edition with the most recent advances in this subject. · Over thirty research problems for stimulating interactions between the two areas. · Written by leading researchers in stream ciphers and number theory.
Cryptographers and mathematicians.
- No. of pages:
- © Elsevier Science 2004
- 17th February 2004
- Elsevier Science
- Hardcover ISBN:
- eBook ISBN:
"...deals with many connections between stream ciphers and number theory covering topics like construction of generators, cryptographic properties of key streams such as linear complexity, pattern distribution, correlation properties and 2-adic complexity. The monograph gives a useful overview on the present stage of research, moreover it contains more than 30 open research problems." -Willfried Meidl, in ZENTRALBLATT MATH
Thomas Cusick has 25 years of experience in cryptography, 60 published papers in that subject and 8 Ph. D. students whose thesis work was in that area. He is currently located at the State University of New York in Buffalo, New York.
State University of New York, Buffalo, USA
Hong Kong University of Science and Technology, Hong Kong.
University of Turku, Finland
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.