期刊文献+
共找到682篇文章
< 1 2 35 >
每页显示 20 50 100
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code
1
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
下载PDF
Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’Dilemma
2
作者 Khaled M.Suwais 《Computers, Materials & Continua》 SCIE EI 2023年第5期2685-2704,共20页
Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of... Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption.Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological,social or physical behaviours.One technique is to utilise the behavioural aspects of game theory in a stream cipher.In this paper,we introduce an enhanced Deoxyribonucleic acid(DNA)-coded stream cipher based on an iterated n-player prisoner’s dilemma paradigm.Our main goal is to contribute to adding more layers of randomness to the behaviour of the keystream generation process;these layers are inspired by the behaviour of multiple players playing a prisoner’s dilemma game.We implement parallelism to compensate for the additional processing time that may result fromadding these extra layers of randomness.The results show that our enhanced design passes the statistical tests and achieves an encryption throughput of about 1,877 Mbit/s,which makes it a feasible secure stream cipher. 展开更多
关键词 ENCRYPTION game theory DNA cryptography stream cipher parallel computing
下载PDF
CeTrivium:A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission
3
作者 Osama S.Younes Abdulmohsen Alharbi +3 位作者 Ali Yasseen Faisal Alshareef Faisal Albalawi Umar A.Albalawi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2895-2920,共26页
Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution... Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution.The CA have recently gained recognition as a robust cryptographic primitive,being used as pseudorandom number generators in hash functions,block ciphers and stream ciphers.CA have the ability to perform parallel transformations,resulting in high throughput performance.Additionally,they exhibit a natural tendency to resist fault attacks.Few stream cipher schemes based on CA have been proposed in the literature.Though,their encryption/decryption throughput is relatively low,which makes them unsuitable formultimedia communication.Trivium and Grain are efficient stream ciphers that were selected as finalists in the eSTREAM project,but they have proven to be vulnerable to differential fault attacks.This work introduces a novel and scalable stream cipher named CeTrivium,whose design is based on CA.CeTrivium is a 5-neighborhood CA-based streamcipher inspired by the designs of Trivium and Grain.It is constructed using three building blocks:the Trivium(Tr)block,the Nonlinear-CA(NCA)block,and the Nonlinear Mixing(NM)block.The NCA block is a 64-bit nonlinear hybrid 5-neighborhood CA,while the Tr block has the same structure as the Trivium stream cipher.The NM block is a nonlinear,balanced,and reversible Boolean function that mixes the outputs of the Tr and NCA blocks to produce a keystream.Cryptanalysis of CeTrivium has indicated that it can resist various attacks,including correlation,algebraic,fault,cube,Meier and Staffelbach,and side channel attacks.Moreover,the scheme is evaluated using histogramand spectrogramanalysis,aswell as several differentmeasurements,including the correlation coefficient,number of samples change rate,signal-to-noise ratio,entropy,and peak signal-to-noise ratio.The performance of CeTrivium is evaluated and compared with other state-of-the-art techniques.CeTrivium outperforms them in terms of encryption throughput while maintaining high security.CeTrivium has high encryption and decryption speeds,is scalable,and resists various attacks,making it suitable for multimedia communication. 展开更多
关键词 stream ciphers cellular automata securing real-time streaming CRYPTOGRAPHY CeTrivium
下载PDF
A novel chaotic stream cipher and its application to palmprint template protection 被引量:3
4
作者 李恒建 张家树 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第4期102-111,共10页
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a cou... Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. 展开更多
关键词 chaotic stream cipher coupled nonlinear dynamic filter biometric protection cancelable competitive code
下载PDF
New State Recovery Attacks on the Grain v1 Stream Cipher 被引量:1
5
作者 Lin Ding Chenhui Jin +4 位作者 Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao 《China Communications》 SCIE CSCD 2016年第11期180-188,共9页
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers. 展开更多
关键词 密码攻击 粮食 输出功能 穷举搜索 密钥流 成功概率 流密码 秩序
下载PDF
Theoretical design for a class of chaotic stream cipher based on nonlinear coupled feedback
6
作者 HuGuojie WangLin FengZhengjin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期155-159,共5页
A class of chaotic map called piecewise-quadratic-equation map to design feedback stream cipher is proposed. Such map can generate chaotic signals that have uniform distribution function, δ-like autocorrelation funct... A class of chaotic map called piecewise-quadratic-equation map to design feedback stream cipher is proposed. Such map can generate chaotic signals that have uniform distribution function, δ-like autocorrelation function. Compared with the piecewise-linear map, this map provides enhanced security in that they can maintain the original perfect statistical properties, as well as overcome the defect of piecewise-linearity and expand the key space. This paper presents a scheme to improve the local complexity of the chaotic stream cipher based on the piecewise-quadratic-equationmap. Both the theoretic analysis and the results of simulation show that this scheme improves the microstructure of the phase-space graph on condition that the good properties of the original scheme are remained. 展开更多
关键词 CHAOS stream cipher nonlinear-coupled feedback phase-space graph.
下载PDF
STUDY ON STREAM CIPHERS USING GENERATING FUNCTIONS
7
作者 武传坤 《Journal of Electronics(China)》 1993年第1期34-40,共7页
Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functi... Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed. 展开更多
关键词 stream cipher GENERATING Function Complementery SEQUENCE Partial SUM SEQUENCE INVERSE Order SEQUENCE Finitely Generated SEQUENCE B-M Algorithm
下载PDF
The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence
8
作者 Xiangao Huang Chao Wang +1 位作者 Wei Huang Junxian Li 《Circuits and Systems》 2013年第2期165-168,共4页
The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the sho... The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the shortest bit stream sequence reconstructed Boolean function of nonlinear filter in LILI-128 stream cipher generator. Then the least nonlinear Boolean function of generating stream cipher sequence is reconstructed by clusterig, nonlinear predictive and nonlinear synchronization from shortest bit stream sequence. We have verified the correctness of our reconstruction result by simulating the block diagram of Lili-128 keystream generator using our getting Boolean function and implement designers’ reference module of Lili-128 stream cipher public online, and two methods produce the same synchronous keystream sequence under same initial state, so that our research work proves that the nonlinear Boolean function of LILI-128 stream cipher generator is successfully broken. 展开更多
关键词 LILI-128 stream cipher CLOCK Control BOOLEAN Function COMPLEXITY ATTACK
下载PDF
Research on Stream Cipher Model Based on Chaos Theory
9
作者 Sun Wenjie 《International Journal of Technology Management》 2013年第2期91-93,共3页
关键词 混沌流密码 混沌理论 模型 非线性动力系统 输出序列 确定性系统 流密码系统 随机性
下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
10
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
关键词 随机编码 非线性 流密码 安全性 安全框架 布尔方程组 密码设计 哈希函数
下载PDF
序列密码立方攻击研究进展综述
11
作者 田甜 戚文峰 《密码学报(中英文)》 CSCD 北大核心 2024年第1期145-158,共14页
立方攻击由Dinur和Shamir在2009年欧密会上首次提出,是一种高阶差分攻击和代数攻击.经过近十余年的研究,传统立方攻击不断发展,动态立方攻击、基于可分性的立方攻击、相关立方攻击相继提出,攻击思想不断丰富,攻击技术不断改进,逐渐成为... 立方攻击由Dinur和Shamir在2009年欧密会上首次提出,是一种高阶差分攻击和代数攻击.经过近十余年的研究,传统立方攻击不断发展,动态立方攻击、基于可分性的立方攻击、相关立方攻击相继提出,攻击思想不断丰富,攻击技术不断改进,逐渐成为针对基于非线性反馈移位寄存器的序列密码算法的重要攻击方法.特别地,立方攻击自2009年提出以来一直是国际轻量级序列密码标准Trivium最有效的密钥恢复攻击,动态立方攻击攻破了全轮Grain-128算法,Kreyvium、Grain-128AEAD、ACORN这些基于非线性反馈移位寄存器的序列密码算法都可以用立方攻击进行有效分析.本文介绍了立方攻击的基本原理和攻击方法,综述了实验立方攻击、基于可分性立方攻击、立方集构造、动态立方攻击、相关立方攻击等方面的研究进展. 展开更多
关键词 立方攻击 可分性 MILP 序列密码 Trivium
下载PDF
新形态对称密码算法研究
12
作者 吴文玲 王博琳 《密码学报(中英文)》 CSCD 北大核心 2024年第1期128-144,共17页
安全多方计算、全同态加密和零知识证明是解决数据安全问题的重要密码技术,其快速发展和应用需求驱动,引发了新形态对称密码的设计与安全性分析.本文系统介绍适宜安全多方计算、全同态加密和零知识证明的新形态对称密码算法.首先梳理新... 安全多方计算、全同态加密和零知识证明是解决数据安全问题的重要密码技术,其快速发展和应用需求驱动,引发了新形态对称密码的设计与安全性分析.本文系统介绍适宜安全多方计算、全同态加密和零知识证明的新形态对称密码算法.首先梳理新形态对称密码算法的应用需求和设计目标;然后归类介绍新形态对称密码算法的设计理念和最新的安全性评估结果;最后总结探讨新形态对称密码算法的设计特点以及面临的问题. 展开更多
关键词 分组密码 流密码 杂凑函数 安全多方计算 全同态加密 零知识证明
下载PDF
基于时变互耦合双混沌系统的轻量级序列密码
13
作者 杨杰超 胡汉平 +1 位作者 帅燕 邓宇昕 《信息网络安全》 CSCD 北大核心 2024年第3期385-397,共13页
文章针对资源受限的物联网环境下的数据加密传输问题,设计了一种基于时变互耦合双混沌系统的轻量级序列密码。以Tent和Arnold混沌映射为基础,通过引入累加器和耦合项,构造一种用于序列密码内部状态更新的时变双混沌系统,基于位操作,对... 文章针对资源受限的物联网环境下的数据加密传输问题,设计了一种基于时变互耦合双混沌系统的轻量级序列密码。以Tent和Arnold混沌映射为基础,通过引入累加器和耦合项,构造一种用于序列密码内部状态更新的时变双混沌系统,基于位操作,对密钥流输出部分进行设计。文章对算法的基本运算、参数、精度、实现方式和策略进行设计并在FPGA上实现,硬件资源消耗为2370个等效门,密钥流输出速率为1.68 bit/clk。分析表明,该密码具有良好的安全性和抗攻击能力,与ISO/IEC标准的轻量级序列密码相比,安全性、资源消耗和吞吐量均有显著优势。 展开更多
关键词 物联网 双混沌系统 轻量级 退化 序列密码
下载PDF
流密码框架下的SM4专用认证加密算法
14
作者 李胡 彭长根 侯金秋 《计算机工程与应用》 CSCD 北大核心 2024年第2期272-278,共7页
认证加密算法是能同时满足数据机密性与完整性的对称密码算法,在数据安全领域具有广泛应用。针对基于分组密码的认证加密算法的安全性以及效率需求,提出一种基于SM4轮函数的专用认证加密算法SMRAE。算法采用流密码思想,从SM4底层部件出... 认证加密算法是能同时满足数据机密性与完整性的对称密码算法,在数据安全领域具有广泛应用。针对基于分组密码的认证加密算法的安全性以及效率需求,提出一种基于SM4轮函数的专用认证加密算法SMRAE。算法采用流密码思想,从SM4底层部件出发,结合Feistel结构设计状态更新函数用于轮变换,处理256 bit消息只需调用4个SM4轮函数指令。在初始化阶段将初始向量和密钥经过16轮迭代,使差分充分随机化;利用SM4加密消息,将生成的密文参与轮变换,实现状态更新和加密并行;解密时先进行消息认证,降低时间消耗,提高算法安全性。安全性分析与实验结果表明SMRAE能够抵抗伪造攻击、差分攻击和猜测攻击等主流攻击,效率高于AES-GCM,与SM4效率相当,具备一定的实用性。 展开更多
关键词 SM4 认证加密 分组密码 FEISTEL结构 流密码
下载PDF
A VLIW Architecture Stream Cryptographic Processor for Information Security 被引量:4
15
作者 Longmei Nan Xuan Yang +4 位作者 Xiaoyang Zeng Wei Li Yiran Du Zibin Dai Lin Chen 《China Communications》 SCIE CSCD 2019年第6期185-199,共15页
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they ... As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not achieve a better tradeoff between high speed processing and high flexibility.ASIC has fast processing speed,but its flexibility is poor,GPP has high flexibility,but the processing speed is slow,FPGA has high flexibility and processing speed,but the resource utilization is very low.This paper studies a stream cryptographic processor which can efficiently and flexibly implement a variety of stream cipher algorithms.By analyzing the structure model,processing characteristics and storage characteristics of stream ciphers,a reconfigurable stream cryptographic processor with special instructions based on VLIW is presented,which has separate/cluster storage structure and is oriented to stream cipher operations.The proposed instruction structure can effectively support stream cipher processing with multiple data bit widths,parallelism among stream cipher processing with different data bit widths,and parallelism among branch control and stream cipher processing with high instruction level parallelism;the designed separate/clustered special bit registers and general register heaps,key register heaps can satisfy cryptographic requirements.So the proposed processor not only flexibly accomplishes the combination of multiple basic stream cipher operations to finish stream cipher algorithms.It has been implemented with 0.18μm CMOS technology,the test results show that the frequency can reach 200 MHz,and power consumption is 310 mw.Ten kinds of stream ciphers were realized in the processor.The key stream generation throughput of Grain-80,W7,MICKEY,ACHTERBAHN and Shrink algorithm is 100 Mbps,66.67 Mbps,66.67 Mbps,50 Mbps and 800 Mbps,respectively.The test result shows that the processor presented can achieve good tradeoff between high performance and flexibility of stream ciphers. 展开更多
关键词 stream cipher VLIW architecture PROCESSOR RECONFIGURABLE application-specific instruction-set
下载PDF
Algebraic Attack on Filter-Combiner Model Keystream Generators
16
作者 WUZhi-ping YEDing-feng MAWei-ju 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期259-262,共4页
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new criterion for designing Filter-Combiner model was alsoproposed: the total length I. of Linear Finite State Machines used in the model should be largeenough and the degree d of Filter-Combiner function should be approximate [L/2]. 展开更多
关键词 algebraic attack Filter-Combiner model stream cipher 'XL' algorithm function composition
下载PDF
Cipher quasi-chaotic code for frequency hopping communications
17
作者 王宏霞 何晨 虞厥邦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期248-256,共9页
The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run t... The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run the FH codes in code-division multiple access (CDMA) systems. But the finite precision of computation and the fact of the low-dimensional chaos predicted easily cause difficulty in chaotic application. In this paper, some disadvantages associated with the conventional FH codes and the chaotic code scrambled by m-sequences are reviewed briefly. In order to overcome these drawbacks to some extents, a new higher performance FH code called cipher quasi-chaotic (CQC) code is proposed, which is generated by combining the clock-controlled stream cipher technique and chaotic dynamics. Performance analysis applying in FH communication systems of this kind of code is given. The privacy of the CQC sequence is also analyzed. 展开更多
关键词 frequency hopping Hamming correlation CHAOS clock-controlled stream cipher.
下载PDF
轻量级序列密码算法lizard的FPGA设计与优化 被引量:1
18
作者 肖超恩 仓晓彤 张磊 《北京电子科技学院学报》 2023年第1期9-18,共10页
Lizard序列密码算法作为类似eSTREAM组合中Grain的算法,由于较小的内部状态,具有较好的硬件实现优势。为了在硬件层面提高该算法实现的工作频率,同时一定程度上降低资源消耗,本文使用Verilog硬件语言对该算法进行FPGA实现,并提出两种设... Lizard序列密码算法作为类似eSTREAM组合中Grain的算法,由于较小的内部状态,具有较好的硬件实现优势。为了在硬件层面提高该算法实现的工作频率,同时一定程度上降低资源消耗,本文使用Verilog硬件语言对该算法进行FPGA实现,并提出两种设计方案。首先,本文基于二段式有限状态机设计了算法实现的基础版本。其次,本文在基础版本设计的基础上通过对密码Lizard算法的原理分析,完成了算法6比特并行版本的设计,进一步提高了算法运行的吞吐率。最后,在Vivado 2019.2.1环境中采用赛灵思公司的Spartan7系列的硬件平台XC7S50FGGA484-1芯片,使用Verilog硬件设计语言对密码Lizard算法两种设计版本进行设计、综合和实现,再通过ModelSim 10.4进行仿真验证,结果表明两种设计的工程实现结果与标准测试向量相同。性能测试结果显示:在基础版本中,Lizard序列密码算法实现了最小的面积消耗,最高工作频率达到221MHz;在并行版本中,Lizard序列密码算法实现最大的吞吐量可达1254Mbps,提高了数据加密运算的速率。 展开更多
关键词 轻量级 流密码 现场可编程门阵列 并行优化
下载PDF
两类广义分圆序列的自相关值
19
作者 王艳 韩西林 +1 位作者 闫联陶 相乃姣 《首都师范大学学报(自然科学版)》 2023年第6期1-7,共7页
基于广义分圆理论,构造了一类周期为2p的二元广义分圆序列和一类周期为pq的二元广义分圆序列,利用分圆数和差集理论讨论了这2类序列的自相关函数值。对于周期为2p的二元广义分圆序列,当p≡1(mod8)时,该类序列具有几乎最优的自相关函数值... 基于广义分圆理论,构造了一类周期为2p的二元广义分圆序列和一类周期为pq的二元广义分圆序列,利用分圆数和差集理论讨论了这2类序列的自相关函数值。对于周期为2p的二元广义分圆序列,当p≡1(mod8)时,该类序列具有几乎最优的自相关函数值;当p≡3(mod8)时,该类序列的自相关函数值是四值。对于周期为pq的二元广义分圆序列,当(p-1)(q-1)/4是偶数时,该类序列具有几乎最优的自相关函数值;当(p-1)(q-1)/4是奇数时,该类序列的自相关函数值为四值。结果表明,构造的2类二元广义分圆序列都具有低值自相关性质。 展开更多
关键词 流密码 自相关性 分圆 伪随机序列
下载PDF
一种面向序列密码的混合粒度并行运算单元 被引量:2
20
作者 曲彤洲 戴紫彬 +1 位作者 陈琳 刘燕江 《电子与信息学报》 EI CSCD 北大核心 2023年第1期78-86,共9页
针对可重构密码处理器对于不同域上的序列密码算法兼容性差、实现性能低的问题,该文分析了序列密码算法的多级并行性并提出了一种反馈移位寄存器(FSR)的预抽取更新模型。进而基于该模型设计了面向密码阵列架构的可重构反馈移位寄存器运... 针对可重构密码处理器对于不同域上的序列密码算法兼容性差、实现性能低的问题,该文分析了序列密码算法的多级并行性并提出了一种反馈移位寄存器(FSR)的预抽取更新模型。进而基于该模型设计了面向密码阵列架构的可重构反馈移位寄存器运算单元(RFAU),兼容不同有限域上序列密码算法的同时,采取并行抽取和流水处理策略开发了序列密码算法的反馈移位寄存器级并行性,从而有效提升了粗粒度可重构阵列(CGRA)平台上序列密码算法的处理性能。实验结果表明与其他可重构处理器相比,对于有限域(GF)(2)上的序列密码算法,RFAU带来的性能提升为23%~186%;对于GF(2u)域上的序列密码算法,性能提升达约66%~79%,且面积效率提升约64%~91%。 展开更多
关键词 粗粒度可重构阵列 序列密码算法 反馈移位寄存器 流水线
下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部