期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
ANALYSIS OF THE MUTUAL INFORMATION BETWEEN INPUT AND OUTPUT OF A CLASS OF CLOCK-CONTROLLED SEQUENCES 被引量:3
1
作者 Fan Xiubin Li Shiqu(Department of Information Researches, Zhengzhou Information Engineering Institute, Zhengzhou 450002) 《Journal of Electronics(China)》 2000年第2期185-192,共8页
In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output seque... In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output sequence, and its divergent rate is gaven. 展开更多
关键词 clock-controlled sequenceS Mutual information π-class Σ-ALGEBRA
下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
2
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 PSEUDORANDOM sequenceS non-linear FEEDBACK FUNCTION Information Protection
下载PDF
Convergence of the median filterings of sequences 被引量:1
3
作者 叶万洲 周性伟 《Science China Mathematics》 SCIE 1999年第4期382-386,共5页
Suppose that x={x(n)}<sub>n∈Z</sub> is a sequence of real numbers. For each p∈N, x<sup>(p)</sup>={x<sup>(p)</sup>(n)}<sub>n∈Z</sub> is the resulting sequence ... Suppose that x={x(n)}<sub>n∈Z</sub> is a sequence of real numbers. For each p∈N, x<sup>(p)</sup>={x<sup>(p)</sup>(n)}<sub>n∈Z</sub> is the resulting sequence of x through p times median filterings with window 2k+1. It is proved that when p→∞, both x<sup>(2p)</sup> and x<sup>(2p-1)</sup> are convergent. Thus the problem of convergence of the median filters of infinite-length sequences is completely solved. 展开更多
关键词 MEDIAN niter non-linear filter RECURRENT sequence.
原文传递
Some Statistical Properties of Feedforward Sequences (Ⅱ)
4
作者 戴宗铎 冯绪宁 +1 位作者 刘木兰 万哲先 《Science China Mathematics》 SCIE 1994年第2期129-136,共8页
In this paper,we continuously discuss the statistical properties of non-linear feedforward sequences of m-sequences We give the number of 0-runs and 1-runs in some cases.
关键词 non-linear FEEDFORWARD sequenceS (NFS) FIBONACCI sequence 0-runs and 1-runs
原文传递
Security analysis of a new stream cipher 被引量:4
5
作者 ZHANG Bin FENG Dengguo 《Science in China(Series F)》 2006年第3期286-301,共16页
In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled ... In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(2^26)-byte known plaintext with success rate 93.4597% and complexity O(2^113), which is much lower than 2^512, the complexity of exhaustive search. 展开更多
关键词 stream cipher divide-and-conquer attack non-linear feedback shift registers (NLFSR) chaotic sequence.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部