军事学 >>> 军事学
搜索结果: 1-13 共查到军事学 sequence相关记录13条 . 查询时间(0.062 秒)
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64     Correlated sequences  Simon  Simeck       font style='font-size:12px;'> 2018/8/2
In this paper, we propose a novel cryptanalytic technique called correlated sequence attack on block ciphers. Our attack exploits the properties of given key dependent sequences of length tt to obtain...
We present new ideas for decreasing the size of secure memory needed for hardware implementations of hash-sequence based signatures proposed recently by Buldas, Laanoja and Truu (in the following re...
We investigate a well-known way to construct pseudo-random sequences by separation p-adic coordinate sequences of linear recurrences over Galois ring. Commonly it is necessary to know rank estimatio...
Broadcast encryption is conventionally formalized as broadcast encapsulation in which, instead of a cipher- text, a session key is produced, which is required to be indistinguishable from random. Such...
Bias in the nonlinear filter generator output sequence      Bias  nonlinear filter generator  output sequence        font style='font-size:12px;'> 2010/3/16
Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Registe...
In this paper, we introduce a new class of PRSGs, called par- titioned pseudorandom sequence generators(PPRSGs), and propose an RFID authentication protocol using a PPRSG, called S-protocol. Since ...
In this paper, we propose a method to get the lower bounds of the 2-adic complexity of a sequence obtained from a periodic sequence over by either inserting or deleting symbols within one period. The ...
Almost Optimal Hash Sequence Traversal     amortization  hash chain  pebbles       font style='font-size:12px;'> 2009/4/13
We introduce a novel technique for computation of consecutive preimages of hash chains. Whereas traditional techniques have a memory-times-computation complexity of O(n) per output generated, the co...
Fractal Hash Sequence Representation and Traversal     amortization  authentication  hash chain       font style='font-size:12px;'> 2009/4/13
We introduce a novel amortization technique for computation of consecutive preim- ages of hash chains, given knowledge of the seed. While all previously known techniques have a memory-times-computat...
A sequence approach to linear perfect hash families     sequence approach  linear perfect hash families       font style='font-size:12px;'> 2009/3/19
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set S = {1, . . . , s} of linear functionals from V to F with the followin...
A d-Sequence based Recursive Random Number Generator     d-Sequence  Recursive Random Number Generator       font style='font-size:12px;'> 2008/12/17
Binary d-sequences were investigated for their cryptographic properties by Subhash Kak in [1,2], who also examined their application to watermarking [3], and made a proposal for their use as random nu...
We consider the problem of efficiently generating sequences in hardware for use in certain cryptographic algorithms. The conventional method of doing this is to use a counter. We show that sequences...
We have discovered conjectural near-addition formulas for Somos sequences. We have preliminary evidence suggesting the existence of modular theta functions.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...