密钥重构保密系统研究
Research of reconfigurable key encryption system
摘要
在介绍传统保密系统的基础上,提出了基于密钥重构保密系统的设计思想。分析了这种系统的特点。
The traditional encryption system is introduced. A new reconfigurable key encryption system is proposed. The features of this new system are analyzed.
出处
《成都信息工程学院学报》
2005年第6期667-669,共3页
Journal of Chengdu University of Information Technology
关键词
重构
密钥
保密系统
reconfiguration
key
encryption system
二级参考文献6
-
1[1]Hartej Singh, Ming-Hau Lee, Guangming Lu,Fadi j. Kurdahi, Nader Bagherzadeh, and Eliseu M. Chaves Filho, MorphoSys: An Integrated Reconfigurable System for DataParallel and Computation-Intensive Applications, IEEE TRANSACTIONS ON COMPUTERS,VOL. 49, NO. 5, MAY 2000, pp. 465-481.
-
2[2]Peter M. Athanas, Harvey F. Silverman,Processor Reconfiguration Through Instruction-set Metamorphosis, COMPUTER,VOL. 26, NO. 3, March 1993, pp. 11-18.
-
3[3]John R. Hauser, John Wawrzynek, Garp: A MIPS Processor with a Reconfigurable Coprocessor,Proc. IEEE Symp. Field- Programmable Custom Computing Machines, Apr. 1997.
-
4[4]Karthikeya M. Gajjala Purna, and Dinesh Bhatia, Temporal Partitioning and Scheduling Data Flow Graphs for Reconfigurable Computers, IEEE TRANSACTIONS ON COMPUTERS,VOL. 48, NO. 6, JUNE 1999, pp. 579-590.
-
5[5]Jean E. Vuillemin, Patrice Bertin, Didier Roncin, Mark Shand, Herve H. Touati, and Philippe Boucard, Programmable Active Memories: Rconfigurable Systems Come of Age,IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION(VLSI) SYSTEMS, VOL. 4, NO. 1,MARCH 1996, pp. 56-69.
-
6[6]Programmable Cryptography Emerges from Advanced Chip, SIGNAL, AUGUST1998, PP.23-25.
共引文献135
-
1池亚平,岳梓岩,赵伦.密码算法识别技术研究进展与展望[J].北京电子科技学院学报,2022,30(4):1-14.
-
2覃肖云.信息安全技术的研究现状与发展趋势[J].广西医科大学学报,2008,25(S1):93-94. 被引量:6
-
3陈玉萍.离散型Hopfield网络及其在密码学中的应用[J].科技经济市场,2006(4):13-14.
-
4苏晓萍.基于椭圆密码体制的移动通信网门限托管方案[J].青海师范大学学报(自然科学版),2004,20(2):24-27.
-
5刘霖,王文丰,赵跃龙,王国华.云存储平台下的复合加密日志容灾方法[J].华中科技大学学报(自然科学版),2012,40(S1):99-103. 被引量:1
-
6陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
-
7艾显峰,叶宇煌.高速通用DES加解密芯片设计与实现[J].宁德师专学报(自然科学版),2004,16(3):230-233. 被引量:1
-
8田仲富,王述洋,谷志新.三大密码体制的理论研究及应用中的问题[J].林业劳动安全,2004,17(4):16-18.
-
9程宝杰.大型熔盐电解成套装备国产化项目竣工[J].稀土信息,2005,11(4):23-23.
-
10盛利元,张卿,孙克辉,王文广.一种基于混沌映射的DES密钥空间拓展方法[J].通信学报,2005,26(4):122-124. 被引量:6