一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言?xún)?nèi)容
驗(yàn)證碼

全距特征排列及全距置換

費(fèi)如純 王麗娜 董曉梅 于戈

費(fèi)如純, 王麗娜, 董曉梅, 于戈. 全距特征排列及全距置換[J]. 電子與信息學(xué)報(bào), 2002, 24(2): 192-197.
引用本文: 費(fèi)如純, 王麗娜, 董曉梅, 于戈. 全距特征排列及全距置換[J]. 電子與信息學(xué)報(bào), 2002, 24(2): 192-197.
Fei Ruchun, Wang Lina, Dong Xiaomei, Yu Ge. Quick trickle characteristic sequence and quick trickle permutation[J]. Journal of Electronics & Information Technology, 2002, 24(2): 192-197.
Citation: Fei Ruchun, Wang Lina, Dong Xiaomei, Yu Ge. Quick trickle characteristic sequence and quick trickle permutation[J]. Journal of Electronics & Information Technology, 2002, 24(2): 192-197.

全距特征排列及全距置換

Quick trickle characteristic sequence and quick trickle permutation

  • 摘要: 全距置換具有良好的密碼學(xué)性質(zhì)。該文首次提出了全距特征排列的概念,對(duì)全距特征排列的性質(zhì)、計(jì)數(shù)進(jìn)行了研究,并在此基礎(chǔ)上討論了全距置換與全距特征排列之間的映射關(guān)系、最后基于全距特征排列給出了全距置換的一種有效的構(gòu)造方法,首先構(gòu)造全距特征排列,再求出全距置換。
  • 亢保元,田建波,王育民,全距置換,密碼學(xué)進(jìn)展-CHINACRYPT98,北京,科學(xué)出版社,1998,207-211.[2]王育民,劉建偉,通信網(wǎng)的安全-理論與技術(shù),第-版,西安,西安電子科技大學(xué)出版社,1999,126-128.[3]馮登國(guó),裴定一,密碼學(xué)導(dǎo)引,第一版,北京,科學(xué)出版社,1999,107-108.[4]NBS, Data Encryption Standard, FIPS PUB 46, National Bureau of Standards, Washington D.C. [5]K.D. Paterson, Imprimitive permutation groups and trapdoors in iterated block cipher, Proc[J].Fast Software Encryption FSE99, LNCS 1636.1977,1999:201-214[5]S. Even, Y. Mansour, A Construction of a cipher from a single pseudo-random permutation,Journal of Cryptology, 1997, 10(3), 151-162.[6]J. Patarin.[J].Pseudo-random permutation based on the DES scheme, Proc. of EUROCODE90,Lecture Notes in Computer Science, Springer-Verlag.1991,:-[7]J. Patarin, Improved security bounds for pseudo-random permutations, 4th ACM Conference on Computer and Communications Security, 1997, 142-150.M. Naor, O. Reingold, On the construction of pseudo-random permutations: Luby-Rackoff Revisited, Proc. of the 29th ACM Symposium on Theory of Computing, 1997, 189-199.[8]M. Luby, C. Rackoff, How to construct pseudo-random permutations from pseudo-random functions, In SLAM Journal on Computing, 1988, 17(2), 373-386.[9]S.W. Golomb, Oscar Moreno, On periodicity of costas arrays and a conjecture on permutation polynomials, IEEE Trans. on Information Theory, 1996, 42(6), 2252-2253.[10]S. W. Golomb, H. Taylor, Constructions and properties of costas arrays, Proc. IEEE, 1984, 72(9),1143-1163.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  2260
  • HTML全文瀏覽量:  114
  • PDF下載量:  493
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  1900-01-01
  • 修回日期:  1900-01-01
  • 刊出日期:  2002-02-19

目錄

    /

    返回文章
    返回