Alternative forms of representation of Boolean functions in Cryptographic Information Security Facilities.
Sergii KushchPublished in: CoRR (2015)
Keyphrases
- information security
- boolean functions
- smart card
- countermeasures
- uniform distribution
- information systems
- functional decomposition
- security issues
- intrusion detection
- binary decision diagrams
- multi valued
- information security management
- threshold functions
- security level
- relevant variables
- information assurance
- membership queries
- security requirements
- network security
- dnf formulae
- prime implicants
- smart grid
- security risks
- cyber defense
- disjunctive normal form
- functional properties
- read once formulas
- iso iec
- real world
- hash functions
- machine learning