期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Analysis of a Class of Logical Functions over Galois and Z_m Rings 被引量:1
1
作者 陈卫红 曾洪杰 《Chinese Quarterly Journal of Mathematics》 CSCD 2002年第4期105-110,共6页
In this paper, the author analyzed some cryptographic properties of a class of logical functions, f(x,y)=(q(x),...,q(x))·y+h(x),over Galois rings and residue rings, presented the relationship between the characte... In this paper, the author analyzed some cryptographic properties of a class of logical functions, f(x,y)=(q(x),...,q(x))·y+h(x),over Galois rings and residue rings, presented the relationship between the character spectrum of f(x,y) and the character speetrum of q(x),h(x) and the relationship between the cryptographic properties of f(x,y) and the cryptographic properties of h(x). 展开更多
关键词 logical function character spectrum cryptographic properties
在线阅读 下载PDF
SELECTION OF THE LINEAR COMBINING VECTOR G OF THE GENERALIZED SELF-SHRINKING GENERATORS
2
作者 Dong Lihua Zeng Yong Hu Yupu 《Journal of Electronics(China)》 2006年第4期506-509,共4页
Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomia... Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomial ofL GSS sequences and the comparison of their degrees, an algorithm for selecting the linear combining vector G is presented, which is simple to understand, to implement and to prove. By using this method, much more than 2^L-l linear combining vectors G of the desired properties will be resulted. Thus in the practical application the linear combining vector G can be chosen with great arbitrariness. Additionally, this algorithm can be extended to any finite field easily. 展开更多
关键词 CRYPTOGRAPHY Stream cipher M-SEQUENCE Generalized Self-Shrinking (GSS) sequences
在线阅读 下载PDF
Research on Stream Cipher Model Based on Chaos Theory
3
作者 Sun Wenjie 《International Journal of Technology Management》 2013年第2期91-93,共3页
Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disa... Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disadvantages of the present chaos encryption model, the paper proposes a chaotic stream cipher model based on chaos theory, which not only overcomes finite precision effect, but also improves the randomness of chaotic system and output sequence. The Sequence cycle theory generated by the algorithm can reach more than 10600 at least, which completely satisfies the actual application requirements of stream cipher system. 展开更多
关键词 chaos theory stream cipher ALGORITHM
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部