期刊文献+

一类平衡前馈序列的分析

Analysis of a Kind of Balance Feedforward Sequences
下载PDF
导出
摘要 该文指出《一类平衡前馈序列的构造与性质》一文构造的密码系统模型事实上是一个前馈函数为广半Bent函数的滤波-组合模型,并对该模型进行了简单分析。 This paper points out that the stream cipher model in construction and properties of balance feedforword sequences is a filter-combination model with generalized semi-Bent function as feedforward function and analyses the stream cipher model simply.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第1期193-196,共4页 Journal of Electronics & Information Technology
基金 河南省杰出青年科学基金(0312001800)资助课题
关键词 流密码 前馈模型 WALSH谱 广半Bent函数 Stream cipher Feedforward model Walsh spectra Generalized semi-Bent function
  • 相关文献

参考文献11

  • 1Rothaus O S. On bent functions, J Combinatorial Theory(Ser. A), 1976, 20: 300-305,
  • 2Siegenthaler T. Correlation immunity of nonlinear combining function for cryptographic applications. IEEE Trans on IT, 1984, IT-30(5): 776-780.
  • 3Rueppel R A. Analysis and Design of Stream Ciphers.Berlin: Springer-Verlag, 1986: 54-141.
  • 4Meier W and Staffelbach O. Fast correlation attacks on stream ciphers. Advances in Cryptology-Eurocrypt' 88,Berlin: Springer-verlag, 1989: 301-314.
  • 5Forre R. A fast correlation attack on nonlinearity feedforward filtered shift-register sequences. Advances in Cryptology-Eurocrypt'89, Berlin: Springer-verlag, 1990:586-595.
  • 6Carlet C. Partially-bent functions. Advances in Cryptology-Eurocrypt'92, Berlin: Springer-verlag,1993: 280-291.
  • 7Chee S, Lee S and Kim K. Semi-bent functions. Advances in Cryptology-Asiacrypt'94, Springer-verlag, 1995: 107-118.
  • 8胡一平.谱绝对值均匀的前馈流密码的线性复杂度的稳定性研究[J].应用数学学报,1998,21(2):288-294. 被引量:2
  • 9孙林红,叶顶锋,吕述望,冯登国.序列密码的复合攻击法[J].电子与信息学报,2004,26(1):72-76. 被引量:3
  • 10金君娥,李超,吴翊.前馈网络的信息泄漏与收集[J].通信学报,2004,25(6):69-75. 被引量:3

二级参考文献23

  • 1李世鹏,朱近康.一类新的性能优越的伪随机序列[J].电子学报,1993,21(1):41-51. 被引量:8
  • 2金君娥,李超,吴翊.前馈网络的信息泄漏与收集[J].通信学报,2004,25(6):69-75. 被引量:3
  • 3[1]Zeng K, Yang C H, Rao T R N. An improved linear syndrome algorithm in cryptanalysis with applications. In: Advances in Cryptology- EUROCRYPT'90, Berlin, Springer-Verlag, 1991: 34-47.
  • 4[2]Zeng K, Huang H. On the linear syndrome method in cryptanalysis. In: Advances in CryptologyEUROCRYPT'88, London, Springer-Verlag, 1989: 164-171.
  • 5[3]Meier W, Staffelbach O. Fast correlation attacks on stream ciphers. In: Advances iii CryptologyEUROCRYPT'88, Brelin, Springer-Verlag, 1989:301-314
  • 6[4]Zeng K, Yang C H, Rao T R N. On the linear consistency test(LCT) in cryptanalysis with applications. In: Advances in Cryptology-EUROCRYPT'89, Barcelona, Springer-Verlag, 1990:186-193.
  • 7[5]Anderson R J. Searching for the optimum correlation attack. Fast Software EncryptionLeuven'94, Lecture Notes in Computer Science, vol.1008, B. Preneel, Springer-Verlag, 1995:137-143
  • 8[6]Golic J Dj. On the security of nonlinear filter generators. Fast Software Encryption-Cambridge'96,Lecture Notes in Computer Science, vo1.1039, D. Gollmanned, Springer-Verlag, 1996: 173-188.
  • 9[7]Chepyzhov V, Johansson T, Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. Fast Software Encryption, FSE'2000, Lecture Notes in Computer Science, SpringerVerlag, 2000: 213-223.
  • 10[8]Athreya K B, Ney P E. Branching Processes. Berlin: Springer-Verlag, 1972.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部