A structure iterated by the unbalanced Feistel networks is introduced. It is showed that this structure is provable resistant against linear attack. The main result of this paper is that the upper bound of r-round (r...A structure iterated by the unbalanced Feistel networks is introduced. It is showed that this structure is provable resistant against linear attack. The main result of this paper is that the upper bound of r-round (r≥2m) linear hull probabilities are bounded by q^2 when around function F is bijective and the maximal linear hull probabilities of round function F is q. Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.展开更多
给出了Windows XP SP2防火墙的使用方法及应用实例.研究分析了Windows XP SP2防火墙(ICF)技术,在不同的联网环境下对个人防火墙和ICF分别进行了接入、安装、设置、应用实验.结果证明:Windows XP SP2的防火墙技术几乎拥有了其它个人防火...给出了Windows XP SP2防火墙的使用方法及应用实例.研究分析了Windows XP SP2防火墙(ICF)技术,在不同的联网环境下对个人防火墙和ICF分别进行了接入、安装、设置、应用实验.结果证明:Windows XP SP2的防火墙技术几乎拥有了其它个人防火墙技术的优点,且占用系统资源少,对于网络攻击具有较高的防范功能,增强了个人计算机的网络安全性.展开更多
基金Supported by the fund of National Laboratory for Modern Communications (5143603ZDS0601),the outstanding youth science foundation of Henan (0312001800).
文摘A structure iterated by the unbalanced Feistel networks is introduced. It is showed that this structure is provable resistant against linear attack. The main result of this paper is that the upper bound of r-round (r≥2m) linear hull probabilities are bounded by q^2 when around function F is bijective and the maximal linear hull probabilities of round function F is q. Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
文摘给出了Windows XP SP2防火墙的使用方法及应用实例.研究分析了Windows XP SP2防火墙(ICF)技术,在不同的联网环境下对个人防火墙和ICF分别进行了接入、安装、设置、应用实验.结果证明:Windows XP SP2的防火墙技术几乎拥有了其它个人防火墙技术的优点,且占用系统资源少,对于网络攻击具有较高的防范功能,增强了个人计算机的网络安全性.