Servicios Personalizados
Revista
Articulo
Indicadores
- Citado por SciELO
- Accesos
Links relacionados
- Similares en SciELO
Compartir
Computación y Sistemas
versión On-line ISSN 2007-9737versión impresa ISSN 1405-5546
Comp. y Sist. vol.12 no.3 Ciudad de México ene./mar. 2009
Editorial
Special Issue on Applied Cryptography & Data Security
Cryptography can be succinctly defined as the study of how to establish secure communication in an adversarial environment. Due to the numerous technological improvements, research in cryptography has addressed a whole new spectrum of more advanced practical problems, which has propelled this research area to become one of the most applied and active disciplines in computer science.
This special issue gives a glimpse of modern cryptography covering important areas such as computational number theory, construction of boolean functions, modes of operation for block ciphers and design and analysis of special purpose cryptographic hardware. We received a total of twentyone manuscripts. Out of them, only six contributions were finally selected. The reviewing process took six months. Each manuscript was blindly reviewed by at least three reviewers consisting of guest editors and external reviewers.
The first paper in this special issue "Nontrivial Solutions to Cubic Sieve Congruence Problem: x3 µ2z & (d p", was written by Subhamoy Maitra et al. This work addresses the cubic sieve congruence problem, which consists on finding small nontrivial solutions to the congruence x3 µ2z & (d p.
The second paper in this issue is "Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity", by Sumanta Sarkar and Subhamoy Maitra. They present theoretical constructions of a special type of Boolean functions known as Rotation Symmetric Boolean Functions (RSBFs) of α variables, with α an odd number.
In the third paper, "A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation", by Mridul Nandi, the author proposes a generic method to extend the message space of a strong pseudorandom permutation (SPRP) by using a primitive called weak pseudorandom permutation.
The fourth paper in this special issue is "Algebraic Immunity of Boolean Functions Analysis and Construction", by Deepak Kumar Dalai and Subhamoy Maitra. They study the problem of constructing a particular family of boolean functions that presents maximum possible algebraic immunity.
The fifth paper in this special issue is "Searching Prime Numbers with Short Binary Signed Representations", by Jose Angel Angel and Guillermo MoralesLuna. Authors provide an estimation of the density of primes with short binary signed representation.
The last paper in this special issue is "Hardware Architecture and Cost/time/data Tradeoff for Generic Inversion of Oneway Function", by Sourav Mukhopadhyay and Palash Sarkar. They propose a customized pipelined hardware architecture for implementing timememory tradeoff attacks against generic cryptographic algorithms.
Finally, we would like to thank all authors who have submitted their manuscripts to this Special Issue. We would like also to express our gratitude to the following external reviewers: Omran Ahmadi, Rana Barua, Sanjit Chatterjee, Tanmoy Kanti Das, Arturo DíazPérez, Levent Ertaul, Gerardo de la Fraga, Darrel Hankerson, Tetsu Iwata, Valery Korzhik, Julio Lopez, Peris López, Subhamoy Maitra, Alfred Menezes, Sihem Mesnager, Peter Montgomery, Guillermo MoralesLuna, Daniel OrtizArroyo, Dipti Prashad Mukherjee, Mridul Nandi, Carles Padro, Tomás Pevny, Bimal Roy, Erkay Savas, Somitra Sanadhya, Nazar A. Saqib, Francesc Sebe, Hebertt SiraRamírez, Berk Sunar, Jaime VelascoMedina, KingHang Wang, Amr M. Yousef and Xiangyong Zeng.
Guest Editors
Francisco RodríguezHenríquez and Debrup Chakraborty.
Computer Science Department, CINVESTAVIPN.