期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A NEW ROUTING ALGORITHM FOR THE SHUFFLE-EXCHANGE PERMUTATION NETWORK
1
作者 Baoxing CHEN Wenjun XIA Ni DU 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2006年第4期586-591,共6页
In this paper, a new routing algorithm is given for the shuffle-exchange permutation network (SEPn). The length of the path between any two nodes given by our algorithm is not more than 11/16n^2+O(n), i.e., the d... In this paper, a new routing algorithm is given for the shuffle-exchange permutation network (SEPn). The length of the path between any two nodes given by our algorithm is not more than 11/16n^2+O(n), i.e., the diameter of SEPn is at most 11/16n^2+ O(n). This improves on a 1/8(9n^2- 22n+24) routing algorithm described earlier by S. Latifi and P. K. Srimani. We also show that the diameter of SEPn is more than 1/2n^2-n. 展开更多
关键词 Cayley graph fixed degree routing shuffle-exchange permutation network.
原文传递
Formalization of Fault Analysis and a New Approach of Fault Detection
2
作者 王超 谷大武 祝力 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第3期301-306,共6页
Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on ... Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on SPN have been given. The overhead and time tolerance of fault detection have been discussed. The pseudo-blinding method to detect fault attack is introduced, and the balance of the security, overhead and time tolerance based on the evaluation could be made. 展开更多
关键词 fault analysis differential fault analysis (DFA) substitution permutation network (SPN) pseudo-blinding parity-based technique
下载PDF
Linear-Differential Cryptanalysis for SPN Cipher Structure and AES
3
作者 WEI Yongzhuang HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期37-40,共4页
A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential pro... A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential probability (LDP). Moreover, we present a new method for upper bounding the maximum linear-differential probability (MLDP) for 2 rounds of substitution permutation network (SPN) cipher structure. When our result applies to 2-round advanced encryption standard(AES), It is shown that the upper bound of MLDP is up to 1.68×2^-19, which extends the known results for the 2-round SPN. Furthermore, when using a recursive technique, we obtain that the MLDP for 4 rounds of AES is bounded by 2^-73. 展开更多
关键词 linear-differential cryptanalysis substitution permutation network advanced encryption standard (AES).
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部