期刊文献+
共找到766篇文章
< 1 2 39 >
每页显示 20 50 100
Walsh Spectral Characteristics and the Auto-Correlation Function Characteristics of Forming Orthomorphic Permutations of Multi-Output Functions 被引量:4
1
作者 ZHAO Yaqun WANG Jue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1895-1898,共4页
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize... Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained. 展开更多
关键词 orthomorphic permutation multi-output functions walsh spectral auto-correlation function
在线阅读 下载PDF
Relationship between Multi-Output Partially Bent Functions and Multi-Output Bent Functions 被引量:2
2
作者 ZHAO Yaqun JU Guizhi WANG Jue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1887-1890,共4页
In this paper, the definition of multl-output partially Bent functions is presented and some properties are discussed. Then the relationship between multi-output partially Bent functions and multi-output Bent function... In this paper, the definition of multl-output partially Bent functions is presented and some properties are discussed. Then the relationship between multi-output partially Bent functions and multi-output Bent functions is given in Theorem 4, which includes Walsh spectrum expression and function expression. This shows that multi-output partially Bent functions and multi-output Bent functions can define each other in principle. So we obtain the general method to construct multi-output partially Bent functions from multi-output Bent functions. 展开更多
关键词 multi-output partially Bent functions multi-output Bent functions Walsh spectrum CONSTRUCTING
在线阅读 下载PDF
Find Better Boolean Functions in the Affine Equivalence Class 被引量:2
3
作者 CHEN Wei-hong LI Na 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2005年第4期395-400,共6页
The Boolean functions in an affine equivalence class are of the same algebraicdegree and nonlinearity, but may satisfy different order of correlation immunity and propa-gation criterion. A method is presented in this ... The Boolean functions in an affine equivalence class are of the same algebraicdegree and nonlinearity, but may satisfy different order of correlation immunity and propa-gation criterion. A method is presented in this paper to find Boolean functions with higherorder correlation immunity or satisfying higher order propagation criterion in an affine equiv-alence class. 8 AES s-box functions are not better Boolean functions in their affine equiva-lence class. 展开更多
关键词 boolean function Walsh spectra BALANCE NONLINEARITY correlation immunity propagation criterion AES S-BOX
在线阅读 下载PDF
On the construction of cryptographically strong Boolean functions with desirable trade-off 被引量:1
4
作者 REN Kui PARK Jaemin KIM Kwangjo 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期358-364,共7页
This paper proposes a practical algorithm for systematically generating strong Boolean functions (f:GF(2) n →GF(2)) with cryptographic meaning. This algorithm takes bent function as input and directly outputs the res... This paper proposes a practical algorithm for systematically generating strong Boolean functions (f:GF(2) n →GF(2)) with cryptographic meaning. This algorithm takes bent function as input and directly outputs the resulted Boolean function in terms of truth table sequence. This algorithm was used to develop two classes of balanced Boolean functions, one of which has very good cryptographic properties:nl(f)=2 2k?1?2k+2k?2 (n=2k), with the sum-of-squares avalanche characteristic off satisfying σf=24k+23k+2+23k-2 and the absolute avalanche characteristic off satisfying σf=24k+23k+2+23k-2. This is the best result up to now compared to existing ones. Instead of bent sequences, starting from random Boolean functions was also tested in the algorithm. Experimental results showed that starting from bent sequences is highly superior to starting from random Boolean functions. Key words Boolean functions - Bent sequences - Nonlinearity - GAC - PC - Balancedness Document code A CLC number TP301.6 展开更多
关键词 boolean functions Bent sequences NONLINEARITY GAC PC BALANCEDNESS
在线阅读 下载PDF
Global Avalanche Characteristics of Boolean Functions by Concatenation
5
作者 Zepeng Zhuo Jinfeng Chong +1 位作者 Ruirui Yu Mingsheng Ren 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2016年第3期91-96,共6页
In order to measure the correlation propeties of two Boolean functions,the global avalanche characteristics of Boolean functions constructed by concatenation are discussed,i.e.,f_1‖f_2and f_1‖f_2‖f_3‖f_4.Firstly,f... In order to measure the correlation propeties of two Boolean functions,the global avalanche characteristics of Boolean functions constructed by concatenation are discussed,i.e.,f_1‖f_2and f_1‖f_2‖f_3‖f_4.Firstly,for the function f = f_1‖f_2,the cross-correlation function of f_1,f_2 in the special condition are studied.In this case,f,f_1,f_2 must be in desired form.By computing their sum-of-squares indicators,the crosscorrelation function between f_1,f_2 is obtained.Secondly,for the function g = f_1‖f_2‖f_3‖f_4,by analyzing the relation among their auto-correlation functions,their sum-of-squares indicators are investigated.Based on them,the sum-of-squares indicators of functions obtained by Canteaut et al.are investigated.The results show that the correlation property of g is good when the correlation properties of Boolean functions f_1,f_2,f_3,f_4 are good. 展开更多
关键词 boolean function CROSS-CORRELATION function GLOBAL AVALANCHE characteristics sum-of-squaresindicator
在线阅读 下载PDF
ENUMERATING CORRELATION-IMMUNE BOOLEAN FUNCTIONS OF ORDER ONE
6
作者 Tian Haijian Yang Yixian(Dept. of Inform. Eng., Beijing Univ. of Posts and Telecomm., Beijing 100088)Wang Jianyu( Carleton University of Canada) 《Journal of Electronics(China)》 1998年第1期50-57,共8页
A large class of linear structural functions(LSF) satisfying the condition of correlational immunity of order one are constructed by studying the linear structural Boolean functions. With these new founded functions, ... A large class of linear structural functions(LSF) satisfying the condition of correlational immunity of order one are constructed by studying the linear structural Boolean functions. With these new founded functions, the known enumeration bounds of correlation-immune functions of order one are greatly improved. In fact, the best, up to now, lower bound is found. 展开更多
关键词 boolean function STREAM ciphers Correlation-immune function
在线阅读 下载PDF
Evolutionary Design of Boolean Functions
7
作者 WANGZhang-yi ZHANGHuan-guo +1 位作者 QINZhong-ping MENGQing-shu 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期179-182,共4页
We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-lineari... We use evolutionaly computing to synthesize Boolean functions randomly Byusing specific crossover and mutation operator, in evolving process and modifying search space andfitness function, we get some high non-linearity functions which have other good cryptographycharacteristics such as autocorrelation etc Comparing to other heuristic search techniques,evolutionary computing approach is more effective because of global search strategy and implicitparallelism. 展开更多
关键词 boolean function non-linearity evolutionary computing
在线阅读 下载PDF
IMPROVEMENT OF THE ALGORITHM PRINCIPLES FOR MINIMIZATION OF MULTI-OUTPUT FUNCTIONS
8
作者 陈苏 许道荣 《Journal of Electronics(China)》 1993年第2期116-123,共8页
In this paper,the application of extraction principle for logic function minimiza-tion to multi-output case is studied.A defect in original algorithm in dealing with multi-outputextrema is made up,and on this base,thr... In this paper,the application of extraction principle for logic function minimiza-tion to multi-output case is studied.A defect in original algorithm in dealing with multi-outputextrema is made up,and on this base,three kinds of less-than terms in different conditions aredefined.In addition,three kinds of generalized definition of less-than terms are given,so as to findout more efficiently the covers with minimal number of terms and irredundant function outputs.This work makes the multi-output extraction principle closer to perfection.An algorithm basedon the work is presented. 展开更多
关键词 multi-output function MINIMIZATION Reduction of PLA MINIMAL AND-OR expression
在线阅读 下载PDF
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
9
作者 Zhao Wentao Fu Shaojing +1 位作者 Li Chao Qu Longjiang 《China Communications》 SCIE CSCD 2012年第10期33-39,共7页
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o... To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to constmct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is deter- mined for the number of Boolean functions with rmximum algebraic immunity. 展开更多
关键词 CRYPTOGRAPHY boolean function alge- braic attack algebraic immunity
在线阅读 下载PDF
Spectral Characteristics of the Best Affine Approach of Multi-Output m-Valued Logical Functions
10
作者 ZHAO Yaqun YING Dinghai FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期185-188,共4页
This paper discusses the best affine approach (BAA) of multi-output m-valued logical functions. First, it gives the spectra of rate of accordance between multi-output m-valued logical functions and their affine func... This paper discusses the best affine approach (BAA) of multi-output m-valued logical functions. First, it gives the spectra of rate of accordance between multi-output m-valued logical functions and their affine functions, then analyzes the BAA of multi-output m-valued logical functions and finally gives the spectral characteristics of BAA of multi-output m-valued logical functions. 展开更多
关键词 multi-output m-valued logical functions linear spectrum cyclic spectrum BAA(best affine approach)
在线阅读 下载PDF
The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence
11
作者 Xiangao Huang Chao Wang +1 位作者 Wei Huang Junxian Li 《Circuits and Systems》 2013年第2期165-168,共4页
The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the sho... The nonlinear filter Boolean function of LILI-128 stream cipher generator is studied in this paper. First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the shortest bit stream sequence reconstructed Boolean function of nonlinear filter in LILI-128 stream cipher generator. Then the least nonlinear Boolean function of generating stream cipher sequence is reconstructed by clusterig, nonlinear predictive and nonlinear synchronization from shortest bit stream sequence. We have verified the correctness of our reconstruction result by simulating the block diagram of Lili-128 keystream generator using our getting Boolean function and implement designers’ reference module of Lili-128 stream cipher public online, and two methods produce the same synchronous keystream sequence under same initial state, so that our research work proves that the nonlinear Boolean function of LILI-128 stream cipher generator is successfully broken. 展开更多
关键词 LILI-128 STREAM CIPHER CLOCK Control boolean function COMPLEXITY ATTACK
在线阅读 下载PDF
Multi-output Gaussian Process Regression Model with Combined Kernel Function for Polyester Esterification Processes
12
作者 王恒骞 耿君先 陈磊 《Journal of Donghua University(English Edition)》 CAS 2023年第1期27-33,共7页
In polyester fiber industrial processes,the prediction of key performance indicators is vital for product quality.The esterification process is an indispensable step in the polyester polymerization process.It has the ... In polyester fiber industrial processes,the prediction of key performance indicators is vital for product quality.The esterification process is an indispensable step in the polyester polymerization process.It has the characteristics of strong coupling,nonlinearity and complex mechanism.To solve these problems,we put forward a multi-output Gaussian process regression(MGPR)model based on the combined kernel function for the polyester esterification process.Since the seasonal and trend decomposition using loess(STL)can extract the periodic and trend characteristics of time series,a combined kernel function based on the STL and the kernel function analysis is constructed for the MGPR.The effectiveness of the proposed model is verified by the actual polyester esterification process data collected from fiber production. 展开更多
关键词 seasonal and trend decomposition using loess(STL) multi-output Gaussian process regression combined kernel function polyester esterification process
在线阅读 下载PDF
On Boolean Functions Associated to Finite Aligned Spaces
13
作者 Jose Manuel dos Santos Simoes Pereira 《Journal of Mathematics and System Science》 2018年第3期74-76,共3页
Boolean or switching functions can be associated to finite aligned spaces in a way similar to the way they can be associated to finite topological spaces. We prove a characterization of switching functions associated ... Boolean or switching functions can be associated to finite aligned spaces in a way similar to the way they can be associated to finite topological spaces. We prove a characterization of switching functions associated to aligned spaces which is similar to the one we have given for switching functions associated to finite topological spaces. 展开更多
关键词 Aligned space topological space boolean function switching function.
在线阅读 下载PDF
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
14
作者 Nahla Fatahelrahman Ibrahim Johnson Ihyeh Agbinya 《Advances in Internet of Things》 2022年第1期9-17,共9页
In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application a... In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis. 展开更多
关键词 Internet of Things Lightweight Cryptographic Scheme Vectorial boolean functions IoT Differential Cryptanalysis
在线阅读 下载PDF
逐重量完美平衡布尔函数的构造
15
作者 赵庆兰 王富佳 秦宝东 《通信学报》 北大核心 2025年第2期97-107,共11页
在FLIP等同态友好流密码的背景下,逐重量完美平衡布尔函数成为密码学中研究的热点问题,但已有的研究结果构造的逐重量完美平衡布尔函数的k-重量非线性度离其上界仍有距离,基于此,提出一种新的逐重量完美平衡布尔函数的构造方法。首先,对... 在FLIP等同态友好流密码的背景下,逐重量完美平衡布尔函数成为密码学中研究的热点问题,但已有的研究结果构造的逐重量完美平衡布尔函数的k-重量非线性度离其上界仍有距离,基于此,提出一种新的逐重量完美平衡布尔函数的构造方法。首先,对于m≥4的正整数,给出了一类2^(m)元的八次基础布尔函数,并利用代数正规型确定其k-重量分布。随后,通过修改此类基础函数的支撑集,构造出了一类2^(m)元逐重量完美平衡布尔函数,从理论上证明了其在每个非平凡等重量子集上都是平衡的。此外,分析了所提构造方法与同类构造方法之间的区别,证明了逐重量完美平衡布尔函数的代数次数。最后,与目前已有的同类函数进行比较,结果表明,新构造的8元函数在k=3和k=4时分别超过现有的k-重量非线性度,达到18和26,新构造的16元函数在k=13时的k-重量非线性度从目前最高值152提高到了160。 展开更多
关键词 FLIP 逐重量完美平衡布尔函数 代数次数 重量非线性度
在线阅读 下载PDF
ON THE DEGREE OF COMPLETENESS OF CRYPTOGRAPHIC FUNCTIONS 被引量:1
16
作者 Liu Jian Chen Lusheng 《Journal of Electronics(China)》 2014年第5期489-495,共7页
This paper discusses the degree of completeness of cryptographic functions, which is one of the cryptographic criteria should be considered in the design of stream ciphers. We establish the relationships between the d... This paper discusses the degree of completeness of cryptographic functions, which is one of the cryptographic criteria should be considered in the design of stream ciphers. We establish the relationships between the degree of completeness and other cryptographic criteria. For resilient Boolean functions, a method to enhance the degree of completeness is proposed, while the nonlinearity and the algebraic degree do not decrease. Moreover, two constructions of resilient functions are provided, which have optimal degree of completeness, high nonlinearity, and high algebraic degree. 展开更多
关键词 Degree of completeness multi-output boolean functions NONLINEARITY Resiliency Linear structures
在线阅读 下载PDF
高非线性四谱值和五谱值布尔函数的构造
17
作者 郭飞 王子龙 段明 《通信学报》 北大核心 2025年第3期144-150,共7页
四谱值和五谱值布尔函数对于密码学应用具有特殊的意义,通过修改Maiorana-McFarland类bent函数,给出了一种偶数元四谱值和五谱值布尔函数的构造,确定了所构造函数的Walsh谱分布,证明其非线性度和半bent函数一样高,为2^(n-1)-2^(n/2)(n... 四谱值和五谱值布尔函数对于密码学应用具有特殊的意义,通过修改Maiorana-McFarland类bent函数,给出了一种偶数元四谱值和五谱值布尔函数的构造,确定了所构造函数的Walsh谱分布,证明其非线性度和半bent函数一样高,为2^(n-1)-2^(n/2)(n为变元数),代数次数能取到3和理论上界n/2+1之间的任意值。并深入研究了该构造的一个子类,包含的函数具有五谱值和最高的代数次数n/2+1,且不存在非零线性结构。 展开更多
关键词 布尔函数 四谱值函数 五谱值函数 非线性度 代数次数
在线阅读 下载PDF
非线性可分Boolean函数分解及神经网络实现 被引量:1
18
作者 贺勤斌 刘曾荣 《科学技术与工程》 2010年第11期2646-2649,2654,共5页
对于2n个顶点用"0"或"1"标记的n维超方体,利用n输入Boolean函数f的输出vi(i=0,1,…,2n-1)与偏移量σi的关系,用一组平行的超平面实现分隔n维超方体顶点。从而,实现非线性可分Boolean函数的分解及二进神经网络隐层... 对于2n个顶点用"0"或"1"标记的n维超方体,利用n输入Boolean函数f的输出vi(i=0,1,…,2n-1)与偏移量σi的关系,用一组平行的超平面实现分隔n维超方体顶点。从而,实现非线性可分Boolean函数的分解及二进神经网络隐层神经元的实现。同时,给出几个例子说明分解方法以及其有效性。 展开更多
关键词 boolean函数 二进神经网络 神经元
在线阅读 下载PDF
单比特函数摄动下干扰布尔网络输出调节问题的可解性
19
作者 曹秀君 付世华 +1 位作者 赵建立 李新岭 《聊城大学学报(自然科学版)》 2025年第2期159-169,共11页
研究干扰布尔网络在单比特函数摄动下的输出调节问题。首先,利用矩阵半张量积,分别确立了带干扰的布尔网络以及参考系统的代数形式。其次,通过建立一个增广系统,将输出调节问题转化为增广系统的鲁棒集合稳定性问题。并且,通过构造一系... 研究干扰布尔网络在单比特函数摄动下的输出调节问题。首先,利用矩阵半张量积,分别确立了带干扰的布尔网络以及参考系统的代数形式。其次,通过建立一个增广系统,将输出调节问题转化为增广系统的鲁棒集合稳定性问题。并且,通过构造一系列状态集合,得到了干扰布尔网络的输出在函数摄动之后仍然可以追踪上参考系统输出的几个判断准则。最后,给出一个例子验证本文所得结果的有效性。 展开更多
关键词 布尔网络 输出调节 干扰输入 单比特函数摄动 矩阵半张量积
在线阅读 下载PDF
Minimal Binary Codes over a Ring
20
作者 PAN Yang GUO Yuxin YE Chang 《湖州师范学院学报》 2025年第2期1-7,共7页
We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh t... We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh transformation.By Gray mapping,we obtain a family of minimal binary linear codes from a generic construction,which have prominent applications in secret sharing and secure two-party computation. 展开更多
关键词 boolean function trace function minimal code secret sharing
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部