期刊文献+

基于Ding-Helleseth广义割圆类构造的伪随机k元序列 被引量:1

Pseudorandom Sequences of k Symbols Constructed by Using DingHelleseth Generalized Cyclotomic Classes
下载PDF
导出
摘要 伪随机序列在信息安全系统中扮演着十分重要的角色,虽然有较多的伪随机序列被给出和应用,但仍然满足不了人们日益增长的需求。构造方法及随机性分析是伪随机序列理论中的主要问题,一致分布测度、自相关性以及碰撞与雪崩效应是判断伪随机序列好坏的重要标准。MAUDUIT等人在一系列论文中利用数论方法提出并且研究了一些k元序列的伪随机性,但是仍有很多问题值得研究。文章基于Ding-Helleseth广义割圆类,构造了一大族长度为pq的伪随机k元序列。综合应用数论中的三角恒等式、指数和、特征和的估计,研究了序列的一致分布测度、相关性以及碰撞与雪崩效应。 Pseudorandom sequences play an important role in information security system. Although there are many sequences have been given and studied, the search for new approaches and new constructions should be continued. The construction methods and pseudorandom analysis is the main research content of pseudorandom theory. The well-distribution measure, correlation measure, collision and avalanche effect become the important indexes of pseudorandom sequences to determine good or bad. In a series of papers Mauduit and others introduced and studied the measures of finite sequences of k symbols. In this paper we construct a large family of pseudorandom sequences of k symbols with length pq by using Ding-Helleseth generalized cyclotomic classes, and study the well-distribution measure, correlation measure, collision and avalanche effect by using the properties of trigonometric identity, exponential sum and character sum.
作者 刘华宁 高波
出处 《信息网络安全》 CSCD 2017年第1期8-15,共8页 Netinfo Security
基金 国家自然科学基金[11571277] 陕西省青年科技新星项目[2014KJXX-61] 陕西省自然科学基金[2014JM1007] 陕西省工业科技攻关项目[2016GY-080 2016GY-077]
关键词 伪随机k元序列 割圆类 特征和 pseudorandom sequences of k symbols cyclotomic class character sum
  • 相关文献

参考文献4

二级参考文献52

  • 1Blum L,,Blum M,Shub M.A simple unpredictable pseudo-random number generator[].SIAM Journal on Computing.1986
  • 2Storer T.Cyclotomiy and Difference Set[]..1967
  • 3Ding Cun-sheng,Xiao Guo-zhen,Shah Wei-juan.The Stability Theory of Stream Ciphers[]..1991
  • 4Ding Cun-sheng,Helleseth T,Lam K Y.Several classes of binary sequences with three-level autocorrelation[].IEEE Transactions on Information Theory.1999
  • 5Ding Cun-sheng.Autocorrelation values of generalized cyclotomic sequences of order two[].IEEE Transactions on Information Theory.1998
  • 6Bai En-jian,,Liu Xiao-juan,Xiao Guo-zhen.Linear complexity of new generalized cyclotomic sequences of order two of length pq[].IEEE Transactions on Information Theory.2005
  • 7Bai En-jian,,Fu Xiao-tong,Xiao Guo-zhen.[].IEICE Transactions on Fundamentals of ElectronicsCommunications and Computer Sciences.2005
  • 8SADEGHI A R, NACCACHE D. Towards Hardware-intrinsicSecurity[M]. Heidelberg: Springer, 2010: 99-134.
  • 9DZIEMBOWSKI S , FAUST S.Leakage-resilient Cryptography fromthe Inner-product Extractor[A]. ASIACRYPT 2011 [M]. Heidelberg:Springer, 2011: 702-721.
  • 10SHIN S H, KOBARAK K. Secure Password Authentication Schemesand Their Applications[J].Synthesiology, 2014, 7(3) : 179-189.

共引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部