Finite Automata and Application to Cryptography - Renji Tao
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Go digital and save!

Finite Automata and Application to Cryptography

By: Renji Tao

Hardcover | 1 November 2008

At a Glance

Hardcover


$310.47

or 4 interest-free payments of $77.62 with

 or 

Aims to ship in 7 to 10 business days

When will this arrive by?
Enter delivery postcode to estimate

Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed.

The book may be used as a reference for computer science and mathematics majors, including seniors and graduate students.

Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing.

 

 

Industry Reviews

From the reviews:

"The present book treats an up-to-date subject from a mathematical point of view. ... The entire work is presented at a high level and has a very good and well proved mathematical background ... making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems." (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009)

"This is a most welcome and anticipated volume in the fields of automata and cryptography. ... this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature ... . researchers will be most comfortable with the structure and format of individual chapters ... . There is a collective exhaustive bibliography at the end of the book ... ." (Michael Goldberg, ACM Computing Reviews, July, 2009)

More in Data Encryption

Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Corporate Computer Security Global Edition : 4th Edition - Randall Boyle
How to Measure Anything in Cybersecurity Risk - Douglas W. Hubbard

RRP $99.95

$70.90

29%
OFF
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
Encyclopedia of Cyber Warfare - Paul J. Springer

RRP $260.00

$216.25

17%
OFF
Alice and Bob Learn Secure Coding - Tanya Janca

RRP $82.95

$60.75

27%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.50

$30.75

54%
OFF
Principles of Information Security : 6th Edition - Michael E. Whitman

RRP $149.95

$129.95

13%
OFF