Cryptographic properties of the single cycle T-function's output sequences are investigated.Bounds of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated res...Cryptographic properties of the single cycle T-function's output sequences are investigated.Bounds of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated respectively.The Maximum Sidelobe Ratio(MSR) of the kth coordinate sequence and the MSR of state output sequence are given respectively.The bounds of autocorrelation functions show that the values of autocorrelation functions are large when shifts are small.Comparisons of the autocorrelations between the state output sequence and coordinate output sequence are illustrated.The autocorrelation properties demonstrate that T-functions have cryptographic weaknesses and the illustration result shows coordinate output sequences have better autocorrelation than that of state output sequences.展开更多
In this paper,we investigate the tensor similarity and propose the T-Jordan canonical form and its properties.The concepts of the T-minimal polynomial and the T-characteristic polynomial are proposed.As a special case...In this paper,we investigate the tensor similarity and propose the T-Jordan canonical form and its properties.The concepts of the T-minimal polynomial and the T-characteristic polynomial are proposed.As a special case,we present properties when two tensors commute based on the tensor T-product.We prove that the Cayley-Hamilton theorem also holds for tensor cases.Then,we focus on the tensor decompositions:T-polar,T-LU,T-QR and T-Schur decompositions of tensors are obtained.When an F-square tensor is not invertible with the T-product,we study the T-group inverse and the T-Drazin inverse which can be viewed as the extension of matrix cases.The expressions of the T-group and T-Drazin inverses are given by the T-Jordan canonical form.The polynomial form of the T-Drazin inverse is also proposed.In the last part,we give the T-core-nilpotent decomposition and show that the T-index and T-Drazin inverses can be given by a limit process.展开更多
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ...Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.展开更多
基金supported by National Natural Science Foundation of China under Grant No.60833008,60970119the Scientific Research Foundation of Education of Department of Shaanxi Provincial Government of China under Grant No.11JK0503+1 种基金Youth Science and Technology Foundation of Xi'an University of Architecture and Technology under Grant No.QN0831,QN1024Foundation of Guangxi Key Laboratory of Information and Communications under Grant No.20902
文摘Cryptographic properties of the single cycle T-function's output sequences are investigated.Bounds of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated respectively.The Maximum Sidelobe Ratio(MSR) of the kth coordinate sequence and the MSR of state output sequence are given respectively.The bounds of autocorrelation functions show that the values of autocorrelation functions are large when shifts are small.Comparisons of the autocorrelations between the state output sequence and coordinate output sequence are illustrated.The autocorrelation properties demonstrate that T-functions have cryptographic weaknesses and the illustration result shows coordinate output sequences have better autocorrelation than that of state output sequences.
基金the National Natural Science Foundation of China(Grant No.11771099)the Hong Kong Research Grant Council(Grant Nos.PolyU 15302114,15300715,15301716 and 15300717)the Innovation Program of Shanghai Municipal Education Commission.
文摘In this paper,we investigate the tensor similarity and propose the T-Jordan canonical form and its properties.The concepts of the T-minimal polynomial and the T-characteristic polynomial are proposed.As a special case,we present properties when two tensors commute based on the tensor T-product.We prove that the Cayley-Hamilton theorem also holds for tensor cases.Then,we focus on the tensor decompositions:T-polar,T-LU,T-QR and T-Schur decompositions of tensors are obtained.When an F-square tensor is not invertible with the T-product,we study the T-group inverse and the T-Drazin inverse which can be viewed as the extension of matrix cases.The expressions of the T-group and T-Drazin inverses are given by the T-Jordan canonical form.The polynomial form of the T-Drazin inverse is also proposed.In the last part,we give the T-core-nilpotent decomposition and show that the T-index and T-Drazin inverses can be given by a limit process.
基金supported by the National Natural Science Foundation of China (60833008,60803149)the Scientific Research Foundation of Education Department of Shaanxi Provincial Government of China (11JK0503)the Youth Science and Technology Foundation of Xi’an University of Architecture and Technology (QN0831,QN1024)
文摘Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.