期刊文献+

非线性布尔函数处理模型研究与设计 被引量:1

The Research and Design of a Model of Non_line Boolean Function Processing
下载PDF
导出
摘要 针对序列密码算法中非线性布尔函数的实现,利用布尔函数的拆分建模,提出一种以布尔函数拆分、布尔函数计算和输出回写为基础的通用非线性布尔函数处理模型,模型能够完成不同形式的非线性布尔函数实现。为更好地评估模型的实现能力,完成了序列密码中常见的非线性布尔函数的算法适配。适配结果表明,和现有的方式相比,模型适配能力较强,资源占用低,具有较好的发展前景。 Focus on the realization of non line Boolean function of the stream cipher, this paper uses the split and modeling of the Boolean function, and proposes a universal process model of non line Boolean function based on the split of the Boolean function and the calculate and backup as well. in order to evaluate the ability of the model better, this paper finishes the adapt of common stream cipher. The result shows that this model owns good ability of adapt and lower resource ,and then has a good development future.
出处 《计算机安全》 2014年第8期8-11,共4页 Network & Computer Security
关键词 非线性布尔函数 拆分建模 布尔函数计算 non_line Boolean function, split and modeling,non_line Boolean function calculate
  • 相关文献

参考文献3

二级参考文献5

共引文献23

同被引文献11

  • 1刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 2金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 3刘邦.序列密码非线性运算单元可重构设计技术研究[D].郑州:信息工程大学,2011.
  • 4LU Y, VAUDENAY S. Cryptanalysis of bluetooth keystream generator two-lever E0 [M]// LEE J P. Advances in Cryptology—Asiarcypt 2004, LNCS 3329. Berlin: Springer, 2004:147-158.
  • 5BATINA L, LANO J, MENTENS N, et.al, Energy, performance, area versus security trade-offs for stream ciphers [EB/OL]. [2016-01-02]. http://xueshu.baidu.com/s?wd=paperuri%3A%28f5e4b24c3cdc6f218dbfff977513bb56%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Bjsessionid%3DFF3F4DFE947080373088C232E0F96C28%3Fdoi%3D10.1.1.87.6629%26rep%3Drep1%26type%3Dpdf&ie=utf-8&sc_us=15751774956421205228.
  • 6GALANIS M D, KITSOS P, KOSTOPOULOS G, et al. Comparison of the hardware implementation of stream ciphers [J]. The International Arab Journal of Information Technology, 2005, 2(4): 267-274.
  • 7GVRKAYNAK F K, LUETHI P, BERNOLD N, et al. Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, Trivium, VEST, ZK-Crypt [EB/OL]. [2016-01-04]. https://www.cosic.esat.kuleuven.be/ecrypt/stream/papersdir/2006/015.pdf.
  • 8ANDERSON J H, WANG Q. Area-efficient FPGA logic elements: architecture and synthesis [C]//ASPDAC '11: Proceedings of the 2011 16th Asia and South Pacific Design Automation Conference. Piscataway, NJ: IEEE, 2011:369-375.
  • 9刘依依.eSTREAM和流密码分析现状[J].信息安全与通信保密,2009,31(12):47-49. 被引量:13
  • 10冯登国.NESSIE工程简介[J].信息安全与通信保密,2001,23(3):36-39. 被引量:6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部