期刊文献+

逐位模2加运算与模2^n加运算的相容程度分析 被引量:10

Consistent degree analysis of bit-wise exclusive-OR and addition module 2n
下载PDF
导出
摘要 深入分析了逐位模 2加运算和模 2 n 加运算的相容程度问题 ,给出了它们的相容概率的计算公式 ;同时给出了它们的一些性质 . The consistent degree of bit\|wise exclusive\|OR and addition module 2\+ n is analyzed.The paper presents the formula of the consistency probability and some characters about them.Some analysis for the character of these two basic cryptographic functions are maked.
出处 《高校应用数学学报(A辑)》 CSCD 北大核心 2003年第2期247-250,共4页 Applied Mathematics A Journal of Chinese Universities(Ser.A)
关键词 逐位模2加运算 模2^n加运算 相容性 相容概率 bit\|wise exclusive\|OR addition module 2\+ n consistency consistent probability
  • 相关文献

参考文献4

  • 1Willi Meier. On the security of the IDEA block cipher[ A ]. Advances in Cryptology-EUROCRYPT'93 [C]. Berlin, Hedelberg ,New York :Springer-Verlag, 1993, 371-386.
  • 2Lai X,Massey J L. A Proposal for a new block encryption standard[A]. Advances in Cryptology-EUROCRYPT'90[C]. Berlin .Hedelberg .New York :Springer-Verlag 1991,389-440.
  • 3Lai X. On the design and security of block ciphers[A]. In: Massey J L ed., ETH Series in Information Proceeding[C]. Vol. 1. 1992,225-248.
  • 4Lai X,Massey J L, Murphy S. Markov ciphers and differential cryptanalysis [A]. Advances in Cryptology-EUROCRYPT' 91[C]. Berlin, Hedelberg, New York :Springer-Verlag, 1991,17-38.

同被引文献45

  • 1孙莹,金晨辉.进位返加与逐位模2加及模2^n加的相容程度分析[J].高校应用数学学报(A辑),2005,20(3):371-376. 被引量:4
  • 2张思胜,余昭平,贾利新.一类k阶拟Hyper-bent函数的刻画[J].河南科学,2006,24(3):330-331. 被引量:1
  • 3张龙,吴文玲,温巧燕.mod 2^n加运算与F2上异或运算差值的概率分布和递推公式[J].北京邮电大学学报,2007,30(1):85-89. 被引量:12
  • 4Ekdahl P, Johansson T. A new version of the stream cipher SNOW[C]// SAC 2002. [ S. l. ] : Springer-Verlag, 2002 : 47-61.
  • 5Biham E, Seberry J, Gonzalez N. Py(Roo) : a fast and secure stream cipher using rolling arrays [ EB/OL ]. (2005) [2009-06-15]. http://www. ecrypt. eu. org/ stream/ 2005/023.
  • 6Lai Xuejia, Massey J L. A proposal for a new block encryption standard [ C ] // EUROCRYPT'90. [S. l.] : Springer-Verlag, 1990 : 389-404.
  • 7Sekar G, Paul S, Preneel B. Distinguishing attacks on the stream cipher Py[EB/OL]. (2005) [ 2009-06-15 ]. http ://www. ecrypt, eu. org/stream/2005/081.
  • 8Crowley P. Improved eryptanalysis of Py [ EB/OL ]. (2006) [ 2009-06-15 ]. http://www. ecrypt. eu. org/ stream/2006/010.
  • 9Baigneres T, Junod P, Vandenay S. How far can we go beyond linear cryptanalysis [ C ] //Asiacrypt 2004. Jeju Island : Springer-Verlag, 2004 : 432-450.
  • 10Ekdahl P, Johansson T. A new version of the stream cipher Snow[ C ]// Proc of Selected Areas in Cryptography - SAC 2002, LNCS 2595 : 47 -61.

引证文献10

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部