000853455 000__ 01628cam\a2200409\i\4500 000853455 001__ 853455 000853455 005__ 20210515155236.0 000853455 006__ m\\\\\o\\d\\\\\\\\ 000853455 007__ cr\un\nnnunnun 000853455 008__ 150901t20152015enka\\\\ob\\\\001\0\eng\d 000853455 020__ $$z9780128023181 000853455 020__ $$a9780128025550 $$q(electronic book) 000853455 035__ $$a(MiAaPQ)EBC2192079 000853455 035__ $$a(Au-PeEL)EBL2192079 000853455 035__ $$a(CaPaEBR)ebr11093402 000853455 035__ $$a(CaONFJC)MIL825603 000853455 035__ $$a(OCoLC)919201561 000853455 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000853455 050_4 $$aQA76.9.A25$$bT65 2015 000853455 0820_ $$a511.324$$223 000853455 1001_ $$aTokareva, Natalia,$$eauthor. 000853455 24510 $$aBent functions :$$bresults and applications to cryptography /$$cby Natalia Tokareva, Sobolev Institute of Mathematics, Novosibirsk State University, Novosibirsk, Russia. 000853455 264_1 $$aLondon, UK :$$bElsevier Science,$$c[2015] 000853455 264_4 $$c©2015 000853455 300__ $$a1 online resource (221 pages) :$$billustrations 000853455 336__ $$atext$$2rdacontent 000853455 337__ $$acomputer$$2rdamedia 000853455 338__ $$aonline resource$$2rdacarrier 000853455 504__ $$aIncludes bibliographical references and index. 000853455 506__ $$aAccess limited to authorized users. 000853455 588__ $$aDescription based on online resource; title from PDF title page (viewed September 3, 2015). 000853455 650_0 $$aComputer security. 000853455 650_0 $$aData encryption (Computer science) 000853455 650_0 $$aAlgebra, Boolean. 000853455 852__ $$bebk 000853455 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=2192079$$zOnline Access 000853455 909CO $$ooai:library.usi.edu:853455$$pGLOBAL_SET 000853455 980__ $$aEBOOK 000853455 980__ $$aBIB 000853455 982__ $$aEbook 000853455 983__ $$aOnline