期刊文献+

关于密码体制中布尔置换的构造 被引量:4

On the Constructions of Boolean Permutations in Cryptosystems
下载PDF
导出
摘要 布尔置换在密码体制的设计中有着重要的应用。本文讨论了布尔置换的构造 ,给出了两种构造方法。 Boolean permutations have important applications in the design of cryptosystems. This paper discusses the constructions of Boolean permutations and presents two construction methods.
出处 《工程数学学报》 CSCD 北大核心 2002年第2期23-30,共8页 Chinese Journal of Engineering Mathematics
关键词 布尔置换 平衡函数 非线性度 boolean permutation balanced function nonlinearity construction.
  • 相关文献

参考文献2

二级参考文献3

  • 1王新梅,Electron Lett,1990年,26卷,898页
  • 2武传坤,博士学位论文,1993年
  • 3Pieprzyk J,Proc Auscrypt’90,1990年,237页

共引文献17

同被引文献17

  • 1Pieprzyk J,Finkelstein G.Towards effective nonlinear cryptosystern design[J].IEEE Proceedings,Part E,1988,135(6):325-335.
  • 2Kim K,Matsumoto T,Imai H.A recursive construction method of S-boxes satisfying strict avalanche criterion[C] //Advances in Cryptology-Crypto' 90.[S.l.] :Springer-Verlag,1991:565-573.
  • 3Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM,1978;21(2):120-126.
  • 4GUIDO B, JOAN D, MICHAEL P, et al. The keccak reference, Submission to NIST [ EB/OL ]. ( 2011- 01- 14 ). http://keccak. noekeon, org/Keccak-referen-ce-3.0, pdf.
  • 5NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm ( SHA- 3 ) family [ J ]. Federal Register Notices ,2007,72 ( 212 ) :62212-62220.
  • 6XU Guo, MEETA S, SINAN H, et al. Silicon implementation of SHA-3 finalists: BLAKE, Gr:bstl, JH, Keccak and Skein[ EB/ OL ]. http://rijndael, ece. vt. edu/schaun/papers/2011 dsd. pdf.
  • 7GUIDO B, JOAN D, MICHAEL P, et al. RADIOGATUN, a beh- and-mill hash function [ C ]//Proc of the 2nd Cryptoga'aphic Hash Workshop. 2006.
  • 8JOAN D, CLAPP C S K. Fast hashing and stream encryption with PANAMA[C]//Lecture Notes in Computer Science,vol 1372. [ S. 1. ] : Springer-Verlag,1998:60-74.
  • 9JOAN D. Cipher and hash function design strategies based on linear and differential cryptanalysis [ D ]. [ S. 1. ] : Katholick Universiteit Leaven, 1995.
  • 10EPHRAIM A. Sharing nonlinear gates in the presence of glitches [ D ]. Enschede, Holland: University of Twente, 2010.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部