Mutual Invertibility and Search.- Ra Rb Transformation Method.- Relations Between Transformations.- Structure of Feedforward Inverses.- Some Topics on Structure Problem.- Linear Autonomous Finite Automata.- One Key Cryptosystems and Latin Arrays.- Finite Automaton Public Key Cryptosystems.
From the reviews:
"The present book treats an up-to-date subject from a mathematical point of view. ... The entire work is presented at a high level and has a very good and well proved mathematical background ... making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems." (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009)
"This is a most welcome and anticipated volume in the fields of automata and cryptography. ... this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature ... . researchers will be most comfortable with the structure and format of individual chapters ... . There is a collective exhaustive bibliography at the end of the book ... ." (Michael Goldberg, ACM Computing Reviews, July, 2009)