期刊文献+

弹性函数的计数 被引量:5

Enumeration of Resilient Functions
下载PDF
导出
摘要 通过构造性的方法讨论弹性函数的计数,给出了弹性性最佳时的精确计数. Enumeration of resilient functions is discussed. By applying orthogonal array, the exact number of it is found for some special cases.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2002年第4期21-25,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家重点基础研究发展规划资助项目(G1999035805) 国家杰出青年基金资助项目(69425001) 国家自然科学基金资助项目(69882002 60073049) 国家高等学校骨干教授资助计划资助项目.
关键词 弹性函数 正交矩阵 相关免疫函数 计数 弹性性最佳时 Correlation methods Parallel processing systems
  • 相关文献

参考文献1

二级参考文献13

  • 1[1]Chor B,Goldreich O,astad J H°,Friedman J,Rudich S,Smolensky R.The bit extraction problem or t-resilient functions[A].in Proc.26th IEEE Symp.Foundations of Computer Science[C].1985,26:396-407.
  • 2[2]Bennett C H,Brassard G,Robert J M.Privacy amplification by public discussion[J].SIAM J.Comput,1988,17(2):210-229.
  • 3[3]Rueppel R A.Analysis and design of stream ciphers[M].Berlin Germany: Springer-verlag,1996.
  • 4[4]Siegenthaler.Correlation immunity of nonlinear combining functions for cryptographic[J].IEEE.Trans.Inform.Theory,1984,IT-30 sept,776-779.
  • 5[5]Jurgen Bierbrauer,Gopalakrishnan K,Stinson D R.Bounds for resilient functions and orthogonal arrays[A].Advance in Cryptology-CRYPTO'94,Lecture Notes in Computer Science[C].Springer-verlag,Berlin,Heidelberg,New York: 1994,839:247-256.
  • 6[6]Gopalakrishnan K,Hoffman D G,Stinson D R.A note on a conjecture concerning symmetric resilient functions[C].Inform Processing Lett.,1993,47: 139-143.
  • 7[7]Stinson D R,Massey J L.A infinite class of counterexamples to a conjecture concerning nonlinear resilient functions[J].Cryptology,1995,8(3):167-173.
  • 8[8]ZHANG Xiao-mo,ZHANG Yu-liang.Cryptographically resilient functions[J].IEEE Trans.Inform.Theory,1997,43:1 740-1 747.
  • 9[9]ZHANG Xiao-mo,ZHANG Yu-liang.On nonlinear resilient functions[A].In Advance in cryptology-Eurocrypt'95[C].Berlin: spring-verlag,1996,274-290.
  • 10[10]CHEN Lu-sheng,FU Fang-wei.On the constructions of new resilient functions from old ones[J].IEEE Trans Inform Theory,1999,45(6):2 077-2 082.

共引文献9

同被引文献19

  • 1张木想,肖国镇.有限域上具有卷积性质的可逆线性变换的结构[J].电子学报,1994,22(4):20-23. 被引量:2
  • 2冯登国,肖国镇.有限域上的函数的相关免疫性和线性结构的谱特征[J].通信学报,1997,18(1):40-45. 被引量:9
  • 3Zhang Jie, Chang Zuling, Wen Qiaoyan. Further results of cheating immune secret sharing I J]. The Journal of China Universities of Posts and Communications, 2004,11(4): 26-28.
  • 4Pieprzyk J, Zhang X M. Cheating prevention in secret sharing over GF ( p' ) [ A ]. INDOCRYPT 2001 [ C ].2001. 79-90.
  • 5Stinson D R. Cryptography: theory and practice [ M].CRC Press, 1995.
  • 6Zhang X M, Zheng Y L. Cryptographically resilient functions[J]. IEEE Trans Inform Theory, 1997, 43:1740-1747.
  • 7Zhang X M, Pieprzyk J. Cheating immune secret sharing[A]. The Third International Conference on Information and Communication Security(ICICS) 2001 [ C]. 2001.144-149.
  • 8Pieprzyk J, Zhang X M. Constructions of cheating immune secret sharing[A]. Lecture Notes in Computer Science[C]. 2001. 226-243.
  • 9Chor B,Goldreich O,Hastad J,et al.The bit extraction problem or t-resilient functions[A].Proceeding 26th IEEE Symp Foundations of Computer Science[C].1985.396-407.
  • 10Bennet C H,Brassard G,Robert J M.Privacy amplification by public discussion[J].SIAM J Comput,1988,17(2):210-229.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部