Research on General Permutation Encryption Module Based on Chaos Theory
Research on General Permutation Encryption Module Based on Chaos Theory
-
1LI Xin-she ZHAO Zhi-hui YAO Jun-ping.The analysis and research on the APN permutation property[J].通讯和计算机(中英文版),2009,6(6):17-19.
-
2DU Jun.An approach for solving the permutation problem in blind source separation based on microphone sub-arrays[J].通讯和计算机(中英文版),2009,6(7):46-51.
-
3王新房,马安光.Rijndael算法代数性质及其七轮攻击[J].计算机工程与应用,2005,41(21):86-88. 被引量:1
-
4付梦印,张晓晨,周培德.An Algorithm for Boundary Extraction Based on Turning Row Permutation into Sequence Permutation[J].Journal of Beijing Institute of Technology,2010,19(3):343-347.
-
5Sun Wenjie.Research on Stream Cipher Model Based on Chaos Theory[J].International Journal of Technology Management,2013(2):91-93.
-
6杨义先.ON COSTAS ARRAYS[J].Journal of Electronics(China),1992,9(1):17-25.
-
7TANG Chun-ming.A simple perfect hiding commitment scheme in one-round from any one-way permutation[J].通讯和计算机(中英文版),2008,5(9):51-53.
-
8HU ZhenYu,LIN DongDai,WU WenLing,FENG DengGuo.Constructing parallel long-message signcryption scheme from trapdoor permutation[J].Science in China(Series F),2007,50(1):82-98. 被引量:1
-
9Baoxing CHEN,Wenjun XIA,Ni DU.A NEW ROUTING ALGORITHM FOR THE SHUFFLE-EXCHANGE PERMUTATION NETWORK[J].Journal of Systems Science & Complexity,2006,19(4):586-591.
-
10杨义先.A NEW METHOD FOR DESIGNING FULL FREQUENCY HOP CODES[J].Journal of Electronics(China),1993,10(2):132-138.