期刊文献+

逻辑异或在计算机中的秘密 被引量:1

The XOR Secret in Computer System
下载PDF
导出
摘要 随着信息科技的进步,带动各项产业信息化、计算机化及数字化,虽然此等便利丰富了人类生活,另一方面却存在着不为人知的隐忧。本文即以一例XOR(Exclusive or),分别就技术面,教科书面,法律面,密码系统面等四个方向来探讨。 As information technology advances,production informatization,computerization,and digitalization are promoted.Although these facilitate to enrich human life,there are still some worries unknown.This paper will probe into technical way,textbooks issue,legal aspects and cryptosystem based on the case of XOR(exclusive OR).
出处 《福建师大福清分校学报》 2011年第2期1-7,共7页 Journal of Fuqing Branch of Fujian Normal University
关键词 异或 汇编代码 操作码 一对一关系 XOR assembly Code operation Code one to one relationship
  • 相关文献

参考文献5

  • 1Alan Edelman. The mathematics of the Pentium division bug[J]. SIAM Review, 1997, 39(1):54-67.
  • 2Yannick Chevalier, Ralf Kusters, Michael Rusinowitch and Mathieu Turuani. An NP decision procedure for protocol insecurity with XOR[J]. Theoretical Computer Science, 2005, 338:247-274.
  • 3Intel Corporation. Intel Architecture Software Developer's Manual, Volume 2: Instruction Set Reference [EB/OL]. http://download.intel.com/design/PentiumII/manuals/24319102.PDF, 2011--01-15/2011-01-15.
  • 4Jianhong Zhang and Yumin Wang. An improved signature scheme without using one-way hash functions[J]. Applied Mathematics and Computation, 2005, 170(2):905-908.
  • 5The Svin. ASM Community[EB/OL]. http://www.asmcommunity.net/board/index.php?topic=8963, 2011-01-15/2011- 01-15.

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部