期刊文献+
共找到233篇文章
< 1 2 12 >
每页显示 20 50 100
Linear complexity of Ding generalized cyclotomic sequences 被引量:2
1
作者 闫统江 陈智雄 肖国镇 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期22-26,共5页
Minimal polynomials and linear complexity of binary Ding generalized cyclotomic sequences of order 2 with the two-prime residue ring Zpq are obtained by Bai in 2005. In this paper, we obtain linear complexity and mini... Minimal polynomials and linear complexity of binary Ding generalized cyclotomic sequences of order 2 with the two-prime residue ring Zpq are obtained by Bai in 2005. In this paper, we obtain linear complexity and minimal polynomials of all Ding generalized cyclotomic sequences. Our result shows that linear complexity of these sequences takes on the values pq and pq-1 on our necessary and sufficient condition with probability 1/4 and the lower bound (pq - 1)/2 with probability 1/8. This shows that most of these sequences are good. We also obtained that linear complexity and minimal polynomials of these sequences are independent of their orders. This makes it no more difficult in choosing proper p and q. 展开更多
关键词 stream cipher generalized cyclotomic sequence linear complexity minimal polynomial
下载PDF
Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences 被引量:1
2
作者 Jeffrey Zheng Weiqiong Zhang +2 位作者 Jin Luo Wei Zhou Ruoyu Shen 《Advances in Pure Mathematics》 2013年第7期5-24,共20页
Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network ... Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network security. From a random sequencing viewpoint, both sequences of HC-256 and real DNA data may have intrinsic pseudo-random properties respectively. In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encode thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional visualization tools to organize various complex interactive properties as visual maps. The Variant Map System (VMS) as an emerging scheme is systematically proposed in this paper to apply multiple maps that used four Meta symbols as same as DNA or RNA representations. System architecture of key components and core mechanism on the VMS are described. Key modules, equations and their I/O parameters are discussed. Applying the VM System, two sets of real DNA sequences from both sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with pseudo DNA sequences generated by HC-256 to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under controllable environment. Visual results are briefly analyzed to explore their intrinsic properties on selected genome sequences. 展开更多
关键词 PSEUDO-RANDOM Number Generator STREAM cipher HC-256 Binary to DNA Pseudo DNA sequence Large Noncoding DNA Analysis 2D MAP Visual Distribution VARIANT MAP System
下载PDF
Statistical Characteristics of the Complexity for Prime-Periodic Sequences
3
作者 NIUZhi-hua LINai-cheng XIAOGuo-zhen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期211-213,共3页
Using the fact that the factorization of x^N — 1 over GF(2) is especiallyexplicit, we completely establish the distributions and the expected values of the lineal complexityand the k-error linear complexity of the N-... Using the fact that the factorization of x^N — 1 over GF(2) is especiallyexplicit, we completely establish the distributions and the expected values of the lineal complexityand the k-error linear complexity of the N-periodic sequences respectively,where N is an odd primeand 2 is a primitive root modulo N. The results show that there are a large percentage of sequenceswith both the linear complexity and the k-enor linear complexity not less than N, quite close totheir maximum possible values. 展开更多
关键词 stream ciphers periodic sequences linear complexity k-error linearcomplexity
下载PDF
Binary Sequences from a Pair of Elliptic Curves
4
作者 CHEN Zhixiong ZHANG Ning XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1511-1515,共5页
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long... A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography. 展开更多
关键词 pseudo-random sequences elliptic curves stream ciphers elliptic curve cryptography
下载PDF
Modified constructions of binary sequences using multiplicative inverse
5
作者 CHEN Zhi-xiong LIN Zhi-xing 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2008年第4期490-500,共11页
Two new families of finite binary sequences are constructed using multiplicative inverse. The sequences are shown to have strong pseudorandom properties by using some estimates of certain exponential sums over finite ... Two new families of finite binary sequences are constructed using multiplicative inverse. The sequences are shown to have strong pseudorandom properties by using some estimates of certain exponential sums over finite fields. The constructions can be implemented fast since multiplicative inverse over finite fields can be computed in polynomial time. 展开更多
关键词 stream cipher binary sequence multiplicative inverse PSEUDORANDOMNESS exponential sum
下载PDF
Pseudo DNA Sequence Generation of Non-Coding Distributions Using Variant Maps on Cellular Automata
6
作者 Jeffrey Zheng Jin Luo Wei Zhou 《Applied Mathematics》 2014年第1期153-174,共22页
In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encoding thousands of large noncoding RNAs ... In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encoding thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional tools to organize various complex interactive properties as visual maps. In this paper, a Pseudo DNA Variant MapPDVM is proposed following Cellular Automata to represent multiple maps that use four Meta symbols as well as DNA or RNA representations. The system architecture of key components and the core mechanism on the PDVM are described. Key modules, equations and their I/O parameters are discussed. Applying the PDVM, two sets of real DNA sequences from both the sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with two sets of pseudo DNA sequences generated by a stream cipher HC-256 under different modes to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under a controllable environment. Various distributions can be observed on both noncoding and coding conditions from their symmetric properties on 2D maps. 展开更多
关键词 Large Noncoding DNA Analysis Stream cipher HC-256 Binary to DNA PSEUDO DNA sequence Visual Distribution VARIANT Map
下载PDF
STUDY ON STREAM CIPHERS USING GENERATING FUNCTIONS
7
作者 武传坤 《Journal of Electronics(China)》 1993年第1期34-40,共7页
Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functi... Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed. 展开更多
关键词 STREAM cipher GENERATING Function Complementery sequence Partial SUM sequence INVERSE Order sequence Finitely Generated sequence B-M Algorithm
下载PDF
几类具有交织级联结构的伪随机序列的线性复杂度
8
作者 王艳 胡声 +1 位作者 韩西林 李顺波 《纯粹数学与应用数学》 2024年第3期435-449,共15页
为构造用于流密码的新的密钥流生成器,本文研究了结合交织和级联技术的伪随机序列的生成.通过计算多项式零点的个数,在特征为2的有限域上,获得了由Legendre序列和Hall序列构造的二元交织序列的线性复杂度.结果表明这些序列的线性复杂度... 为构造用于流密码的新的密钥流生成器,本文研究了结合交织和级联技术的伪随机序列的生成.通过计算多项式零点的个数,在特征为2的有限域上,获得了由Legendre序列和Hall序列构造的二元交织序列的线性复杂度.结果表明这些序列的线性复杂度大于其周期的一半,可抵抗Berlekamp-Massey(B-M)算法的攻击. 展开更多
关键词 流密码 安全性分析 交织序列 线性复杂度 高斯周期
下载PDF
从线性校验子分析方法浅析曾肯成先生的密码分析思想
9
作者 冯登国 《密码学报(中英文)》 CSCD 北大核心 2024年第2期255-262,共8页
曾肯成先生于1986年洞察到了密码体制中的熵漏现象,后来在此基础上提出著名的线性校验子分析方法.本文全面剖析了线性校验子分析方法的发展历程,由此深刻揭示了曾先生的密码分析思想的精髓.首先,介绍曾先生通过观察Geffe序列生成器的熵... 曾肯成先生于1986年洞察到了密码体制中的熵漏现象,后来在此基础上提出著名的线性校验子分析方法.本文全面剖析了线性校验子分析方法的发展历程,由此深刻揭示了曾先生的密码分析思想的精髓.首先,介绍曾先生通过观察Geffe序列生成器的熵漏现象,提出线性校验子分析方法的朴素思想的过程及其蕴含的思想方法;其次,介绍曾先生通过在Geffe序列生成器基础上凝练出的一般问题,提出解决这一问题的一般方法—线性校验子分析方法的过程及其蕴含的思想方法;再次,介绍曾先生通过分析线性校验子分析方法存在的缺陷,进一步完善和改进线性校验子分析方法的过程及其蕴含的思想方法;最后,通过分析从相关分析方法到线性校验子分析方法的进阶之路,阐述了线性校验子分析方法这把利剑的威力. 展开更多
关键词 序列密码 密码分析 线性校验子分析方法 相关分析方法 择多原理
下载PDF
Stream cipher based on GSS sequences
10
作者 HUYupu XIAOGuozhen 《Science in China(Series F)》 2004年第6期681-696,共16页
Generalized self-shrinking sequences, simply named the GSS sequences, are novel periodic sequences that have many advantages in cryptography. In this paper, we give several results about GSS sequence's application... Generalized self-shrinking sequences, simply named the GSS sequences, are novel periodic sequences that have many advantages in cryptography. In this paper, we give several results about GSS sequence's application to cryptography. First, we give a simple method for selecting those GSS sequences whose least periods reach the maximum. Second, we give a method for describing and computing the auto-correlation coefficients of GSS sequences. Finally, we point out that some GSS sequences, when used as stream ciphers, have a security weakness. 展开更多
关键词 auto-correlation coefficient GSS sequence information security least period stream cipher.
原文传递
Structure of frequency hopping sequences family based on block cipher
11
作者 LI Zan CHANG Yi-lin +1 位作者 CAI Jue-ping WANG Yu-min 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2006年第3期301-306,共6页
A novel family of frequency-hopping(FH)se-quences based on iterated block cipher is proposed for frequencyhopping multiple-access(FHMA)communica-tions.The design offers a class of nonlinear FH codes with high security... A novel family of frequency-hopping(FH)se-quences based on iterated block cipher is proposed for frequencyhopping multiple-access(FHMA)communica-tions.The design offers a class of nonlinear FH codes with high security,large linear span and a uniform spread over the entire frequency bandwidth.Moreover,FH sequences among the family are independent from each other and they perform as well as random patterns in terms of multi-ple access interference in anti-jamming applications.With the performance of packet error and throughput for FHMA network being derived in theory,many numerical results of the 3DES sequences are presented,comparing with those of shift register sequences and chaotic FH sequences.Effi-ciently implemented in field programmable gate arrays(FPGA),the generator prototype of the proposed sequence has been realized and incorporated into fast FH radio. 展开更多
关键词 block cipher FH sequences FHMA VHDL FPGA
原文传递
一种基于混沌的序列密码生成方法 被引量:45
12
作者 王相生 甘骏人 《计算机学报》 EI CSCD 北大核心 2002年第4期351-356,共6页
由于混沌系统对初始条件和混沌参数非常敏感以及生成的混沌序列具有非周期性和伪随机性的特性 ,近年来混沌系统在密码学领域中得到了较多研究 .该文提出一种基于混沌的序列密码生成方法 ,该方法通过随机改变混沌映射的参数来提高混沌的... 由于混沌系统对初始条件和混沌参数非常敏感以及生成的混沌序列具有非周期性和伪随机性的特性 ,近年来混沌系统在密码学领域中得到了较多研究 .该文提出一种基于混沌的序列密码生成方法 ,该方法通过随机改变混沌映射的参数来提高混沌的复杂性 .同时在有限精度实现时 ,通过引入扰动序列使得输出的混沌序列具有良好的自相关性、均匀分布特性和随机统计特性 ,而且其周期可用混沌参数改变的周期与扰动序列的周期的乘积来度量 .理论研究和模拟结果表明 。 展开更多
关键词 混沌 扰动 M序列 序列密码生成方法 密码学
下载PDF
基于分组加密同步信息的自同步序列密码算法 被引量:6
13
作者 张游杰 马俊明 卫艳艳 《计算机应用》 CSCD 北大核心 2016年第A01期42-45,共4页
针对现有同步序列密码算法不适用于网络传输中1对n传输模式的问题,提出一种基于分组加密同步信息的自同步序列密码算法。该算法首先生成一个随机数作为同步信息,用分组密码算法对其进行加密保护;同时以此随机数作为序列密码算法的密钥种... 针对现有同步序列密码算法不适用于网络传输中1对n传输模式的问题,提出一种基于分组加密同步信息的自同步序列密码算法。该算法首先生成一个随机数作为同步信息,用分组密码算法对其进行加密保护;同时以此随机数作为序列密码算法的密钥种子,对数据进行序列加密形成密文;最后将密文与加密后的同步信息一同发往接收端;接收端按相反过程解密得到原始数据。该算法在计算机上利用高级加密标准(AES)实现同步信息的分组加密、用RC4实现数据的序列加密后,在数据包很小时,性能不如单纯的AES;当数据包在128 B以上时,性能优于AES,并且数据包越大,其性能相对AES越优。当数据包为1 KB时,其加密速度为AES算法的12倍,解密速度是AES算法的16倍;数据包达到5 MB以上时,其性能与RC4基本相同,加密速度可达AES的25倍,解密速度可达AES的69倍。分析和实验结果表明,该算法在总体运算速度上优于AES算法,安全性上与AES算法相近,适应性上优于RC4算法,比较适用于UDP、TCP等网络传输协议的加密保护。 展开更多
关键词 分组密码 序列密码 自同步序列密码 高级加密标准 RC4
下载PDF
基于可变参数混沌的序列密码的设计 被引量:10
14
作者 王相生 王小港 甘骏人 《计算机工程》 CAS CSCD 北大核心 2001年第9期103-104,165,共3页
提出一种基于混沌的序列密码生成方法,该方法通过随机改变混沌映射的参数来提高混沌的复杂性。同时在有限精度实现时,通过引入扰动序列使得输出的混沌序列具有良好的自相关性、均匀分布特性和随机统计特性。理论研究和模拟结果表明,... 提出一种基于混沌的序列密码生成方法,该方法通过随机改变混沌映射的参数来提高混沌的复杂性。同时在有限精度实现时,通过引入扰动序列使得输出的混沌序列具有良好的自相关性、均匀分布特性和随机统计特性。理论研究和模拟结果表明,该混沌序列加密方法具有较好的保密性,并且便于软硬件实现。 展开更多
关键词 混沌 M序列 序列密码 计算机模拟
下载PDF
一种多级混沌图像加密算法研究 被引量:8
15
作者 韦鹏程 张伟 杨华千 《计算机科学》 CSCD 北大核心 2005年第7期172-175,244,共5页
由于图像本身具有数据量大、像素点之间高相关性和高冗余性等特点,因此不能用一般的文本加密算法来进行图像加密。而混沌具有初始条件和参数敏感性、遍历性和混合性等优良特性,混沌图像加密是一种效率高、安全性好的图像加密方法。本文... 由于图像本身具有数据量大、像素点之间高相关性和高冗余性等特点,因此不能用一般的文本加密算法来进行图像加密。而混沌具有初始条件和参数敏感性、遍历性和混合性等优良特性,混沌图像加密是一种效率高、安全性好的图像加密方法。本文提出了一种多级混沌图像加密算法,首先对二维混沌进行离散和规范化,用其对图像像素点进行空间置乱,然后用混合混沌序列对图像的像素灰度值扩散进一步掩盖明文和密文的关系,因而该方法可以有效地抵抗统计和差分攻击。同时,对提出的算法进行仿真实验和安全性分析,结果表明该算法具有安全性高,加密速度快等特点。 展开更多
关键词 混沌 算法研究 多级 图像加密算法 参数敏感性 像素灰度值 安全性分析 初始条件 优良特性 加密方法 差分攻击 仿真实验 像素点 数据量 冗余性 相关性 混合性 遍历性 规范化 行空间 序列对 特点 二维 置乱 密文 明文 抵抗
下载PDF
GF(q)上的广义自缩序列 被引量:17
16
作者 胡予濮 白国强 肖国镇 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2001年第1期5-7,共3页
给出GF(q)上生成密钥流的一种简单算法———广义自缩生成器 .GF(q)上的广义自缩序列族B(a)具有群结构 .这些序列之间具有很好的相关性 .这些序列在一个周期之内是均衡的 .族B(a)中不少于 (q- 1) / q的序列具有最小周期qn-1;不少于 (q2 ... 给出GF(q)上生成密钥流的一种简单算法———广义自缩生成器 .GF(q)上的广义自缩序列族B(a)具有群结构 .这些序列之间具有很好的相关性 .这些序列在一个周期之内是均衡的 .族B(a)中不少于 (q- 1) / q的序列具有最小周期qn-1;不少于 (q2 - 1) / q2 的序列具有不小于qn-2 展开更多
关键词 流密码 广义自缩序列 密钥流 序列密码体制 保密通信
下载PDF
一类广义自缩序列的伪随机性 被引量:12
17
作者 董丽华 高军涛 胡予濮 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第3期394-398,共5页
讨论了一类广义自缩序列的伪随机性.证明了该类序列的最小周期于64种情形中有56种取到最大(即2n-1);具有良好的低阶自相关性.
关键词 序列密码 M序列 广义自缩序列 伪随机性
下载PDF
广义Legendre序列和广义Jacobi序列的线性复杂度 被引量:10
18
作者 胡予濮 魏仕民 肖国镇 《电子学报》 EI CAS CSCD 北大核心 2000年第2期113-117,共5页
本文讨论广义Legendre序列和两类广义Jacobi序列的线性复杂度 .对于广义Legendre序列 ,给出了当rt=3 ,4时的线性复杂度和当rt=8及一般奇素数时的部分结果 .对于第一类广义Jacobi序列 ,给出了当rt=2 ,3 ,4时的线性复杂度和当rt=8时的部... 本文讨论广义Legendre序列和两类广义Jacobi序列的线性复杂度 .对于广义Legendre序列 ,给出了当rt=3 ,4时的线性复杂度和当rt=8及一般奇素数时的部分结果 .对于第一类广义Jacobi序列 ,给出了当rt=2 ,3 ,4时的线性复杂度和当rt=8时的部分结果 .对于第二类广义Jacobi序列 ,给出了当rt=2 ,3时的线性复杂度和当rt 为一般奇素数时的部分结果 。 展开更多
关键词 Legendre序列 Jacobi序列 线性复杂度 密码学
下载PDF
一种基于Hnon映射和m-序列的混沌序列密码算法研究 被引量:5
19
作者 韦鹏程 张伟 杨华千 《计算机科学》 CSCD 北大核心 2005年第6期69-72,共4页
在详细分析二维Henon映射的混沌和密码学特性的基础上,结合收缩式发生器,提出一种基于m-序列和Henon混沌序列的混合混沌序列密码算法。同时对该系统的安全性能进行了深入分析,理论和实验结果表明:在有限精度实现下,该方法可以有效提高... 在详细分析二维Henon映射的混沌和密码学特性的基础上,结合收缩式发生器,提出一种基于m-序列和Henon混沌序列的混合混沌序列密码算法。同时对该系统的安全性能进行了深入分析,理论和实验结果表明:在有限精度实现下,该方法可以有效提高混沌系统的复杂性和周期性,并且算法安全性高、运算速度快,适于在Internet上对多媒体信息的保密传输。 展开更多
关键词 M-序列 算法研究 序列密码 映射 Internet 混合混沌序列 多媒体信息 密码算法 安全性能 有限精度 混沌系统 运算速度 密码学 收缩式 周期性 复杂性 二维 保密
下载PDF
基于混沌理论的文件安全系统 被引量:10
20
作者 陈谊 白少华 翁贻方 《计算机工程》 CAS CSCD 北大核心 2003年第14期129-132,共4页
混沌信号具有良好的随机性,可以作为序列密码应用于保密通信。该文基于混沌理论,设计了一种安全性高、代价低、易于软件实现的混沌序列密码加密算法,并在此基础上,结合DES、3DES和RSA通用标准加密算法和数字签名、完整性检验等安全... 混沌信号具有良好的随机性,可以作为序列密码应用于保密通信。该文基于混沌理论,设计了一种安全性高、代价低、易于软件实现的混沌序列密码加密算法,并在此基础上,结合DES、3DES和RSA通用标准加密算法和数字签名、完整性检验等安全技术,提出了一个比较完整的文件安全系统的设计方案,该系统具有安全性好、易于使用、速度快的特点。 展开更多
关键词 文件安全系统 混沌 加密 序列密码
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部