期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
满足严格Avalanche标准的布尔函数的性质
1
作者 王建宇 《电子学报》 EI CAS CSCD 北大核心 1995年第7期55-58,共4页
本文讨论了满足严格Avalanche标准的布尔函数的一个必要条件;对满足(n—3)阶严格的Avalanche标准(SAC)的布尔函数,和所有次数不超过二次的满足任意阶严格Avlanche标准的布尔函数,本文给出了它们... 本文讨论了满足严格Avalanche标准的布尔函数的一个必要条件;对满足(n—3)阶严格的Avalanche标准(SAC)的布尔函数,和所有次数不超过二次的满足任意阶严格Avlanche标准的布尔函数,本文给出了它们的布尔多项式特征.WangJianyu(Dept.ofMath.,NankaiUniversity,Tianjin300071)是n元布尔函数,则易证明f(x)满足SAC的充要条件是每一个fi(x)均满足SAC(1≤i≤m)。定义2称f满足m阶严格Avalanche标准(SAC)(1≤m≤n-2),如果f满足:任意选择f的任意m个变元的值后所得到的函数是满足SAC的布尔函数。显然不可能存在满足(n-l)阶SAC的函数,因为任意确定f的任意确定(n-1)个变元的取值以后所得到的函数是仿射函数,它不可能满足SAC因此次数最高的SAC是(n-2)阶SAC。实际上,文献[3]给出了所有满足(n-2)阶SAC的布尔函数的形式。定理1设,满足阶为(n-2)的SAC的充要条件是:里aiεZ2,i=0,1,…,n。因此f是(n-2)阶SAC的布尔函数的充要条件是f的次数为2,且二次项的系数均为1。下面将给出满足? 展开更多
关键词 Avalanche标准 布尔函数 信息论 密码变换
下载PDF
布尔函数非线性性的距离准则
2
作者 卢起骏 吴光龙 《密码与信息》 1991年第4期1-12,共12页
关键词 密码变换 布尔代数 非线性
下载PDF
Optical encryption with cascaded fractional wavelet transforms 被引量:1
3
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) ENCRYPTION DECRYPTION
下载PDF
ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL
4
作者 WeiBaodian LiuDongsu WangXinmei 《Journal of Electronics(China)》 2004年第4期314-321,共8页
The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, wh... The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks. 展开更多
关键词 Rijndael algorithm Balance ACTIVITY Equivalent round transformation Birthday paradox
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
5
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
远程费控表计密钥异常问题处理
6
作者 彭润海 《大众用电》 2017年第4期38-39,共2页
国网长沙供电公司按国网公司要求使用智能远程费控表,表计信息交换及安全认证均需经过身份认证。实际工作中对表计的参数设置、信息返写和下发远程控制等命令时,均先由ESAM模块进行安全认证,身份认证成功后方可执行相关操作。密钥作为... 国网长沙供电公司按国网公司要求使用智能远程费控表,表计信息交换及安全认证均需经过身份认证。实际工作中对表计的参数设置、信息返写和下发远程控制等命令时,均先由ESAM模块进行安全认证,身份认证成功后方可执行相关操作。密钥作为明文相互转密算法中的重要参数,对表计身份认证起着决定性作用。由于密钥的管理与设备问题带来的一些列密钥异常, 展开更多
关键词 安全认证 国网公司 供电公司 信息交换 电能表 湖南省电力公司 存取权限 密码变换 双向身份认证 认证功能
原文传递
An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
7
作者 徐淑奖 陈秀波 +2 位作者 王连海 丁青艳 张淑慧 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期705-710,共6页
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good sym... In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry,the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line(column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. 展开更多
关键词 quantum communication quantum information hiding χ-type quantum state entanglement swapping
原文传递
An improved low-complexity sum-product decoding algorithm for low-density parity-check codes
8
作者 Michaelraj Kingston ROBERTS Ramesh JAYABALAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第6期511-518,共8页
In this paper, an improved low-complexity sum-product decoding algorithm is presented for low-density parity-check (LDPC) codes. In the proposed algorithm, reduction in computational complexity is achieved by utiliz... In this paper, an improved low-complexity sum-product decoding algorithm is presented for low-density parity-check (LDPC) codes. In the proposed algorithm, reduction in computational complexity is achieved by utilizing fast Fourier transform (FFT) with time shift in the check node process. The improvement in the decoding performance is achieved by utilizing an op- timized integer constant in the variable node process. Simulation results show that the proposed algorithm achieves an overall coding gain improvement ranging from 0.04 to 0.46 dB. Moreover, when compared with the sum-product algorithm (SPA), the proposed decoding algorithm can achieve a reduction of 42%-67% of the total number of arithmetic operations required for the decoding process. 展开更多
关键词 Computational complexity Coding gain Fast Fourier transform (FFT) Low-density parity-check (LDPC) codes Sum-product algorithm (SPA)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部