Finite Automata and Application to Cryptography
Renji Tao, "Finite Automata and Application to Cryptography"
Spr in ger | 2009 | ISBN-10: 3540782567 | 411 pages | File type: PDF | 2 mb
Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.
Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed.
The book may be used as a reference for computer science and mathematics majors, including seniors and graduate students.
Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing.
Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond
Data Points: Visualization That Means Something
VMware vSphere Design, 2nd edition
Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb 2
Wireless Algorithms, Systems, and Applications: 7th International Conference
Social Media und Location-based Marketing: Mit Google, Facebook, Foursquare,
Linux For Dummies
Picture Yourself Learning Corel Paint Shop Pro X2
Getting Started with IBM FileNet P8 Content Manager
Governance of Communication Networks: Connecting Societies and Markets with
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Microsoft Excel 2013 Step by Step(1382)
Photoshop CS6: Visual QuickStart Guide(1362)
Blender Master Class: A Hands-On Guide t(1182)
Top 100 Tips for Windows 8: Discover the(962)
Microsoft Windows Operating System Essen(896)
Data Points: Visualization That Means So(833)
Google and the Culture of Search(772)
iPad 4th Generation and iPad mini Portab(613)
Instant LinkedIn Customization How-to(593)
Misunderstanding the Internet(529)
VMware vSphere Design, 2nd edition(490)
Cut the Cord: All You Need to Know to Dr(469)
Citrix XenDesktop 5.6 Cookbook (462)
Varinder Taprial, Google Beyond google(414)
Pro ASP.NET 4 in C# 2010, Fourth Edition(14687)
Mastering Microsoft Visual Basic 2010(12471)
Distributed systems principles and parad(10018)
CompTIA Network+ N10-005 Authorized Cert(8778)
CorelDRAW X5 The Official Guide(7845)
Excel 2010 For Dummies(7618)
Exam Ref 70-410: Installing and Configur(7549)
iText in Action(7009)
A Guide to the Business Analysis Body of(6910)
Jeffrey Richter - CLR via C# 3rd Edition(6557)
ECDL / ICDL Syllabus 5.0(6440)
O'Reilly Head First Series Ebooks Comple(6313)
CCNA Security Official Exam Certificatio(6166)
Cisco Networking Essentials(5345)
Network+ Study Guide (2nd Edition)(4990)