期刊文献+
共找到454篇文章
< 1 2 23 >
每页显示 20 50 100
A new pseudorandom number generator based on a complex number chaotic equation
1
作者 刘杨 佟晓筠 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第9期142-148,共7页
In recent years, various chaotic equation based pseudorandom number generators have been proposed. However, the chaotic equations are all defined in the real number field. In this paper, an equation is proposed and pr... In recent years, various chaotic equation based pseudorandom number generators have been proposed. However, the chaotic equations are all defined in the real number field. In this paper, an equation is proposed and proved to be chaotic in the imaginary axis. And a pseudorandom number generator is constructed based on the chaotic equation. The alteration of the definitional domain of the chaotic equation from the real number field to the complex one provides a new approach to the construction of chaotic equations, and a new method to generate pseudorandorn number sequences accordingly. Both theoretical analysis and experimental results show that the sequences generated by the proposed pseudorandom number generator possess many good properties. 展开更多
关键词 chaotic equation pseudorandom number generator complex number
下载PDF
CRYPTANALYSIS OF AN IMAGE ENCRYPTION SCHEME WITH A PSEUDORANDOM PERMUTATION AND ITS IMPROVED VERSION
2
作者 WangJing JiangGuoping LinBing 《Journal of Electronics(China)》 2012年第1期82-93,共12页
Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the followin... Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the following:(1) If each row or column of the plain-image matrix is the same,the receiver cannot decrypt correctly.(2) Each plain-text word is correlated with single cipher-text word,but independent of other cipher-text word,which cannot meet the principles of algorithm design-diffusion and confusion.(3) If the cycle numbers are relatively small,statistics attack can be used to reveal some visual information of any other plain-images encrypted with the same secret key.Con-sidering the above problems,we propose an improved algorithm and then analyze its performance.Theoretical analysis and simulation results show that the improved algorithm can obtain better cryptographic properties,such as statistical characteristics,difference characteristics,and so on. 展开更多
关键词 pseudorandom permutation DIFFUSION CONFUSION Theoretical analysis
下载PDF
New Pseudorandom Number Generator Artin-Sc hreier Tower for p = 5
3
作者 Song Huiling 《China Communications》 SCIE CSCD 2012年第10期60-67,共8页
The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we ... The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we propose a new method to construct huge finite fields with the characteristic p = 5 by using an Artin-Schreier tower. Utilizing the recursive basis of the Artin-Schreier tower, we define a nmltiplication algorithm The algorithm can explicitly calculate the multiplication of two elements on the top finite field of this tower, without any primitive element. We also define a linear recurrence equation as an application, which produces a sequence of numbers, and call the new pseudorandom number generator Abstract Syntax Tree (AST) for p = 5. The experircental results show that our new pseudorandom number generator can produce a sequence of numbers with a long period. 展开更多
关键词 finite field pseudorandom number generator AST long period
下载PDF
Security analysis of a multiple pseudorandom-bit generator based on a spatiotemporal chaotic map
4
作者 王世红 李达 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第8期163-170,共8页
In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generat... In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated. We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key, and analyse the key sensitivity and statistical properties of the system. 展开更多
关键词 coupled map lattice cryptoanalysis pseudorandom-bit generator
下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
5
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 pseudorandom SEQUENCES NON-LINEAR FEEDBACK FUNCTION Information Protection
下载PDF
FBC模型的伪随机性和超伪随机性
6
作者 刘楠 金晨辉 +1 位作者 于俊伟 崔霆 《软件学报》 EI CSCD 北大核心 2024年第10期4826-4836,共11页
FBC分组密码算法是入选2018年全国密码算法设计大赛第2轮的10个分组密码算法之一.FBC主要采用四分支两路Feistel结构设计,是一个实现效率高的轻量级分组密码算法.将FBC算法抽象为FBC模型,并研究该模型的伪随机性和超伪随机性,在FBC轮函... FBC分组密码算法是入选2018年全国密码算法设计大赛第2轮的10个分组密码算法之一.FBC主要采用四分支两路Feistel结构设计,是一个实现效率高的轻量级分组密码算法.将FBC算法抽象为FBC模型,并研究该模型的伪随机性和超伪随机性,在FBC轮函数都是相互独立的随机函数的条件下,给出能够与随机置换不可区分所需的最少轮数.结论表明,在选择明文攻击条件下,4轮FBC与随机置换不可区分,因而具有伪随机性;在自适应性选择明密文攻击条件下,5轮FBC与随机置换不可区分,因而具有超伪随机性. 展开更多
关键词 分组密码 FBC模型 伪随机性 超伪随机性
下载PDF
Pseudorandomness of Camellia-Like Scheme 被引量:5
7
作者 吴文玲 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第1期82-88,共7页
Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camel... Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camellialike scheme. It is then proved that five-round Camellia-like scheme is pseudorandom and eight-round Camellia-like scheme is super-pseudorandom for adaptive adversaries. Further the paper considers more efficient construction of Camellia-like scheme, and discusses how to construct pseudorandom Camellia-like scheme from less random functions. 展开更多
关键词 block cipher CAMELLIA random function pseudorandomNESS super-pseudorandomness
原文传递
模拟混合视频处理电路单粒子效应测试系统设计
8
作者 程杰 洪婉君 +6 位作者 伍江雄 温显超 魏亚峰 俞宙 刘杰 叶兵 郭刚 《微电子学》 CAS 北大核心 2024年第3期487-491,共5页
为开展模拟混合视频处理电路的单粒子效应研究,通过改变伪CCD信号源的输出信号,建立一款模拟混合视频处理电路的单粒子效应测试系统,实现该器件的单粒子闭锁、单粒子翻转与单粒子功能中断等单粒子效应的评估。通过在中科院近物所回旋加... 为开展模拟混合视频处理电路的单粒子效应研究,通过改变伪CCD信号源的输出信号,建立一款模拟混合视频处理电路的单粒子效应测试系统,实现该器件的单粒子闭锁、单粒子翻转与单粒子功能中断等单粒子效应的评估。通过在中科院近物所回旋加速器和中国原子能院串列加速器的试验测试,获取有效数据。试验结果表明该试验方法及测试系统可以有效评估器件的单粒子性能,为器件的加固设计提供有力数据支撑。 展开更多
关键词 模拟混合视频处理电路 伪CCD信号源 单粒子效应
下载PDF
RC4加密算法改进研究及电路设计
9
作者 雷文媛 夏宏 师瑞峰 《计算机工程与设计》 北大核心 2024年第9期2561-2568,共8页
针对软件实现RC4算法易遭受攻击且效率不高的问题,基于硬件电路实现算法的思想,引入快速伪随机数发生器提出一种改进RC4并设计电路实现。结合种子密钥和伪随机数进行字节内部与字节间的置乱改进初始化算法,提高算法安全性;设计消耗更少... 针对软件实现RC4算法易遭受攻击且效率不高的问题,基于硬件电路实现算法的思想,引入快速伪随机数发生器提出一种改进RC4并设计电路实现。结合种子密钥和伪随机数进行字节内部与字节间的置乱改进初始化算法,提高算法安全性;设计消耗更少时钟周期的电路生成密钥流,提升加密效率。NIST检测显示改进RC4的密钥流序列随机性优于现存基于硬件的RC4产生的密钥流,仿真结果表明,电路能够完成正确加解密。 展开更多
关键词 加密算法 流密码 伪随机数发生器 密钥流随机性 硬件加密 混合进位加法器 随机性检测
下载PDF
基于格的伪随机函数研究综述
10
作者 李一鸣 刘胜利 《密码学报(中英文)》 CSCD 北大核心 2024年第1期174-190,共17页
伪随机函数是密码学领域最基本的原语之一,其自提出以来便备受关注.近几十年间发展起来的格理论在密码领域取得了很多重要的应用成果,特别是格上很多困难问题被普遍认为具备抵抗量子攻击的特性,在后量子密码方案设计中处于核心地位.对... 伪随机函数是密码学领域最基本的原语之一,其自提出以来便备受关注.近几十年间发展起来的格理论在密码领域取得了很多重要的应用成果,特别是格上很多困难问题被普遍认为具备抵抗量子攻击的特性,在后量子密码方案设计中处于核心地位.对于格上伪随机函数的研究正式起始于Banerjee、Peikert和Rosen在2012年欧密会上发表的工作.此后,密码学家们围绕如何基于格困难问题设计伪随机函数方案开展了大量研究,特别是在提升伪随机函数方案的安全性、效率和并行性,以及扩展伪随机函数的功能方面取得了诸多成果.本文对格上伪随机函数的研究现状进行综述:总结了伪随机函数的通用构造方法以及格上伪随机函数依赖的底层困难问题;整理了现有基于格困难问题设计的伪随机函数方案,重点关注这些方案在提升安全性、效率或并行性方面采用的技术以及取得的成果;整理了格上具备扩展功能的伪随机函数的研究进展,包括具有密钥同态性质的伪随机函数、约束伪随机函数、水印伪随机函数以及可验证伪随机函数. 展开更多
关键词 伪随机函数 格密码 格困难问题
下载PDF
基于格的最优轮数口令认证秘密共享协议
11
作者 胡丞聪 胡红钢 《信息网络安全》 CSCD 北大核心 2024年第6期937-947,共11页
口令认证秘密共享将口令认证和秘密共享相结合,是一个贴合实际用户需求的分布式方案。该协议允许一个用户在多个服务器间共享秘密,并且只需要记忆一个简短口令即可在后续同时完成身份验证以及秘密恢复。协议安全性保证只要敌手控制的服... 口令认证秘密共享将口令认证和秘密共享相结合,是一个贴合实际用户需求的分布式方案。该协议允许一个用户在多个服务器间共享秘密,并且只需要记忆一个简短口令即可在后续同时完成身份验证以及秘密恢复。协议安全性保证只要敌手控制的服务器不超过阈值,敌手就不能从协议中窃取任何有关口令和秘密的信息。口令认证秘密共享方案最初基于离散对数及其变体的假设,不能抵抗量子攻击,因此找到量子安全的构造成为亟需解决的问题。ROY等人提出一种恶意安全且量子安全的构造,但其通信轮数并非最优,在有恶意敌手干扰的情况下,轮数甚至不再是常数。针对轮数优化问题,文章利用可验证不经意伪随机函数原语,给出了基于格的最优轮数的量子安全构造并严格证明了其安全性。此外,协议保证多数诚实服务器场景时,诚实用户一定能在最优轮数内成功恢复正确的秘密,具有很强的鲁棒性。 展开更多
关键词 口令认证 秘密共享 后量子密码 可验证不经意伪随机函数
下载PDF
抗恶意敌手的线性门限隐私集合交集协议
12
作者 贾正坤 张恩 王梦涛 《计算机应用研究》 CSCD 北大核心 2024年第9期2846-2853,共8页
门限隐私集合交集(TPSI)是安全多方计算中的一种特例,其在机器学习、共享拼车、指纹识别等多个领域有广泛的应用。然而,目前存在的方案均基于计算复杂度较高的算法,并且仅在半诚实模型下实现,导致协议计算开销较大且无法抵抗恶意敌手的... 门限隐私集合交集(TPSI)是安全多方计算中的一种特例,其在机器学习、共享拼车、指纹识别等多个领域有广泛的应用。然而,目前存在的方案均基于计算复杂度较高的算法,并且仅在半诚实模型下实现,导致协议计算开销较大且无法抵抗恶意敌手的攻击。为了解决以上问题,首先提出了一个向量不经意匹配测试(VOMT)协议,并基于VOMT和布谷鸟哈希设计了一个高效的半诚实TPSI协议。此外,结合VOMT与对称密钥加密方案构造出向量不经意解密匹配测试(VODMT)协议,并基于VODMT与不经意伪随机函数设计了一个可以抵抗恶意敌手的TPSI协议。随后,分别在半诚实模型和恶意模型下证明了协议的安全性,并分析得出两个协议的计算复杂度和通信复杂度均为线性。在集合大小为4096时,提出的两个协议的在线运行时间分别为0.81 s和1.81 s,而先前的工作则需要5627 s,所以两个协议均是高效的。 展开更多
关键词 隐私计算 门限隐私集合交集 不经意键值对存储 不经意伪随机函数 布谷鸟哈希
下载PDF
A novel method for generating pseudorandom integer strings and pseudorandom sequences 被引量:1
13
作者 胡德文 《Science China(Technological Sciences)》 SCIE EI CAS 2000年第4期413-420,共8页
A new method, referred to as the full-recurrent-decimal-sequences (FRDS) method, is proposed to generate the pseudorandom integer strings and the pseudorandom sequences. The pseudorandom integer strings properties and... A new method, referred to as the full-recurrent-decimal-sequences (FRDS) method, is proposed to generate the pseudorandom integer strings and the pseudorandom sequences. The pseudorandom integer strings properties and the run-length properties of the FRDS-sequences are investigated . By transformation, a new kind of pseudorandom sequences with optimal auto-correlation functions is suggested. 展开更多
关键词 pseudorandom INTEGER strings RUN-LENGTH linear CONGRUENCE generator (LCG) PRIMITIVE root full-recurrent-decimal-sequences (FRDS).
原文传递
一种基于CD4094的m序列产生电路
14
作者 吴海涛 梁迎春 《肇庆学院学报》 2024年第5期1-5,共5页
依据m序列的产生原理,文章利用单片CD4094及少量元器件,构造并设计了一种m序列产生电路.首先在分析电路原理基础上,利用示波器实测了电路输出序列;其次利用数值仿真从序列长度、周期性及反馈逻辑等方面检验了输出序列的正确性与m序列产... 依据m序列的产生原理,文章利用单片CD4094及少量元器件,构造并设计了一种m序列产生电路.首先在分析电路原理基础上,利用示波器实测了电路输出序列;其次利用数值仿真从序列长度、周期性及反馈逻辑等方面检验了输出序列的正确性与m序列产生的充要条件;最后从均衡性、游程分布特性及伪噪声特性3方面验证了产生序列符合m序列特性. 展开更多
关键词 伪随机序列 M序列 移位寄存器 CD4094 本原多项式
下载PDF
Construction of k-ary Pseudorandom Elliptic Curve Sequences
15
作者 WU Chenhuang WENG Xin CHEN Zhixiong 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期452-456,共5页
We present a method for constructing k-ary sequences over elliptic curves. Using the multiplicative character of order k of finite fields, we construct a family of k-ary pseudorandom elliptic curve sequences. The pseu... We present a method for constructing k-ary sequences over elliptic curves. Using the multiplicative character of order k of finite fields, we construct a family of k-ary pseudorandom elliptic curve sequences. The pseudorandom measures, such as the well-distribution measure, the correlation measure of order e, and the linear complexity are estimated by using certain character sums. Such sequences share the same order of magnitude on the well-distribution measure, the correlation measure of order e as the 'truly' random sequences. The method indicates that it is possible to construct 'good' pseudorandom sequences over elliptic curves widely used in public key cryptography. 展开更多
关键词 pseudorandom sequences discrete logarithms elliptic curves character sums
原文传递
A Fast Pseudorandom Number Generator with BLAKE Hash Function
16
作者 WANG Houzhen1,2,ZHANG Huanguo1,2 1.Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,Hubei,China 2.School of Computer,Wuhan University,Wuhan 430072,Hubei,China 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期393-397,共5页
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.... This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program. 展开更多
关键词 CRYPTOGRAPHY pseudorandom number generator hash function National Institute of Standards and Technology Statistical Test Suite
原文传递
Gowers norms and pseudorandom measures of subsets
17
作者 Huaning LIU Yuchan QI 《Frontiers of Mathematics in China》 SCIE CSCD 2022年第2期289-313,共25页
Let A ■ ■_(N),and f_(A)(s)={1-|A/N,-|A|/N,for s ∈A,for s■ A.We define the pseudorandom measure of order k of the subset A as follows,P _(k)(A,N)=max D|∑n∈■_(N)|f_(A)(n+c_(1))f_(A)(n+c_(2))…f_(A)(n+c_(k))|where... Let A ■ ■_(N),and f_(A)(s)={1-|A/N,-|A|/N,for s ∈A,for s■ A.We define the pseudorandom measure of order k of the subset A as follows,P _(k)(A,N)=max D|∑n∈■_(N)|f_(A)(n+c_(1))f_(A)(n+c_(2))…f_(A)(n+c_(k))|where the maximum is taken over all D=(c_(1),c_(2),…,C_(K))∈■^(k) with 0≤c_(1)<c_(2)<…ck≤N-1.The subset A ■ ■_(N) is considered as a pseudorandom subset of degree k if P_(k)(A,N)is“small”in terms of N.We establish a link be tween the Gowers norm and our pseudorandom measure,and show that“good”pseudorandom subsets must have“small”Gowers norm.We give an example to suggest that subsets with"small" Gowers norm may have large pseudorandom measure.Finally,we prove that the pseudorandom subset of degree L(k)contains an arithmetic progression of length k,where L(k)=2·lcm(2,4,…,2|k/2|),for k≥4,and lcm(a1,a2,…,al)denotes the least common multiple of a1,a2,…,al. 展开更多
关键词 Gowers norm pseudorandom measure SUBSET arithmetic progression
原文传递
Boundary evaluation and error correction on pseudorandom spread spectrum photon counting system
18
作者 Shanshan Shen Qian Chen +1 位作者 Weiji He Vuqiang Wang 《Chinese Optics Letters》 SCIE EI CAS CSCD 2017年第9期36-40,共5页
The Cramer–Rao lower bound on range error is modeled for pseudo-random ranging systems using Geiger-mode avalanche photodiodes. The theoretical results are shown to agree with the Monte Carlo simulation, satisfying b... The Cramer–Rao lower bound on range error is modeled for pseudo-random ranging systems using Geiger-mode avalanche photodiodes. The theoretical results are shown to agree with the Monte Carlo simulation, satisfying boundary evaluations. Experimental tests prove that range errors caused by the fluctuation of the number of photon counts in the laser echo pulse leads to the range drift of the time point spread function. The function relationship between the range error and the photon counting ratio is determined by using numerical fitting.Range errors due to a different echo energy is calibrated so that the corrected range root mean square error is improved to 1 cm. 展开更多
关键词 Boundary evaluation and error correction on pseudorandom spread spectrum photon counting system
原文传递
标准PRF假设下基于立体几何变换的轻量级混淆电路协议
19
作者 谭振华 宁婧宇 《计算机学报》 EI CAS CSCD 北大核心 2023年第10期2240-2257,共18页
混淆电路(Garbled Circuit,GC)是安全两方计算(Secure Two-Party Computation,S2PC)的重要基础协议.为保证安全性,GC协议需要调用加密算法对电路中的门信号进行加密混淆.当前,GC协议构造每个二元门(如与门)需调用4次加密算法,标准伪随... 混淆电路(Garbled Circuit,GC)是安全两方计算(Secure Two-Party Computation,S2PC)的重要基础协议.为保证安全性,GC协议需要调用加密算法对电路中的门信号进行加密混淆.当前,GC协议构造每个二元门(如与门)需调用4次加密算法,标准伪随机函数(Pseudorandom Function,PRF)假设下,每个二元门的混淆表至少包含2个密文.如何有效降低加密算法调用次数与混淆表规模,是GC协议提升性能的主要研究问题.本文在标准PRF假设下,提出了一种基于立体几何变换的轻量级混淆电路协议SGT-GC,根据每类二元门信号逻辑设计了专门的立体几何变换,并替代传统的加密算法实现混淆门的构造.其中,对于每个二元混淆与门(AND Gate),首先将其4种可能的输入组合(00,01,10,11)转换为三维空间中不共圆的4个点坐标P00、P01、P10、P11,经过逻辑值为FALSE的三个点(P00,P01,P10)构造圆,然后在经过圆心的圆平面法线上取任意点C,i并满足该点到P00、P01、P10的距离相等且不同于到逻辑值为TRUE的点P11的距离.则该随机点Ci即可作为二元与门混淆表中的交换信息,其通信成本变成1,且不再需要额外的加密算法调用.对于二元混淆异或门以及一元非门,本文也进行了专门的设计并给出了详细的协议过程与数学论证.本文所提出的SGT-GC协议中,每个混淆表中仅需1个共享交换信息,且不需调用任何额外加密算法,避免了多次调用复杂的加密算法所造成的计算成本及传输混淆表中多条密文所造成的通信成本.安全性证明表明,本文所提协议在半诚实模型下满足隐私性、不经意性和可认证性. 展开更多
关键词 混淆电路 安全两方计算 立体几何变换 标准伪随机函数假设 安全协议
下载PDF
两类广义分圆序列的自相关值
20
作者 王艳 韩西林 +1 位作者 闫联陶 相乃姣 《首都师范大学学报(自然科学版)》 2023年第6期1-7,共7页
基于广义分圆理论,构造了一类周期为2p的二元广义分圆序列和一类周期为pq的二元广义分圆序列,利用分圆数和差集理论讨论了这2类序列的自相关函数值。对于周期为2p的二元广义分圆序列,当p≡1(mod8)时,该类序列具有几乎最优的自相关函数值... 基于广义分圆理论,构造了一类周期为2p的二元广义分圆序列和一类周期为pq的二元广义分圆序列,利用分圆数和差集理论讨论了这2类序列的自相关函数值。对于周期为2p的二元广义分圆序列,当p≡1(mod8)时,该类序列具有几乎最优的自相关函数值;当p≡3(mod8)时,该类序列的自相关函数值是四值。对于周期为pq的二元广义分圆序列,当(p-1)(q-1)/4是偶数时,该类序列具有几乎最优的自相关函数值;当(p-1)(q-1)/4是奇数时,该类序列的自相关函数值为四值。结果表明,构造的2类二元广义分圆序列都具有低值自相关性质。 展开更多
关键词 流密码 自相关性 分圆 伪随机序列
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部