期刊文献+
共找到500篇文章
< 1 2 25 >
每页显示 20 50 100
实现AES算法中S-BOX和INV-S-BOX的高效方法 被引量:5
1
作者 韩少男 李晓江 《微电子学》 CAS CSCD 北大核心 2010年第1期103-107,共5页
介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路... 介绍了AES中的S-BOX和INV-S-BOX的算法原理,分析目前广泛使用的实现S-BOX和INV-S-BOX的三种方法:直接查表法,扩展欧几里德算法和基于复合域GF((22)2)2)的算法。对直接查表法和基于复合域GF((22)2)2)的算法进行改进,提出了两种改进电路结构。通过综合仿真,给出了按照上述方法实现的硬件电路的面积和关键路径上的时间延迟。结果表明,提出的两种新实现方法与传统实现方法相比,电路面积分别有28%和22%的优化。 展开更多
关键词 AES算法 S-BOX INV-S-BOX galois FIELD 复合galois FIELD 乘法逆运算
下载PDF
Galois Connections in A Topos 被引量:6
2
作者 Tao LU Wei HE Xi Juan WANG 《Journal of Mathematical Research and Exposition》 CSCD 2010年第3期381-389,共9页
In this paper, we investigate the Galois connections between two partially ordered objects in an arbitrary elementary topos. Some characterizations of Galois adjunctions which is similar to the classical case are obta... In this paper, we investigate the Galois connections between two partially ordered objects in an arbitrary elementary topos. Some characterizations of Galois adjunctions which is similar to the classical case are obtained by means of the diagram proof. This shows that the diagram method can be used to reconstruct the classical order theory in an arbitrary elementary topos. 展开更多
关键词 partial order object galois connection topos.
下载PDF
Deformation of Rigid Conjugate Self-dual Galois Representations
3
作者 Yi Feng LIU Yi Chao TIAN +2 位作者 Liang XIAO Wei ZHANG Xin Wen ZHU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2024年第7期1599-1644,共46页
In this article,we study deformations of conjugate self-dual Galois representations.The study is twofold.First,we prove an R=T type theorem for a conjugate self-dual Galois representation with coefficients in a finite... In this article,we study deformations of conjugate self-dual Galois representations.The study is twofold.First,we prove an R=T type theorem for a conjugate self-dual Galois representation with coefficients in a finite field,satisfying a certain property called rigid.Second,we study the rigidity property for the family of residue Galois representations attached to a symmetric power of an elliptic curve,as well as to a regular algebraic conjugate self-dual cuspidal representation. 展开更多
关键词 galois deformation rigid conjugate self-dual galois representations
原文传递
INTEGRABILITY OF SECOND ORDER AUTONOMOUS SYSTEM 被引量:5
4
作者 管克英 雷锦志 《Annals of Differential Equations》 2002年第2期117-135,共19页
The Liouville's integrability of the second order autonomous system is studied. It isproved that a second order polynomial system is Liouville integrable if and only if thereis an integral factor μ(x, y), such th... The Liouville's integrability of the second order autonomous system is studied. It isproved that a second order polynomial system is Liouville integrable if and only if thereis an integral factor μ(x, y), such that or a rational function in x and y. 展开更多
关键词 elementary transcendental function second order autonomous system integrability differential galois theory
原文传递
Koszul algebras and finite Galois coverings 被引量:5
5
作者 ZHAO DeKe HAN Yang 《Science China Mathematics》 SCIE 2009年第10期2145-2153,共9页
The relationships between Koszulity and finite Galois coverings are obtained, which provide a construction of Koszul algebras by finite Galois coverings.
关键词 (quasi-)Koszul algebra smash product Yoneda algebra galois covering 16S37 16G20 16S35 16S40 16W50
原文传递
Negacyclic codes over Galois rings of characteristic 2a 被引量:5
6
作者 ZHU ShiXin 1,2,& KAI XiaoShan 1,2 1 School of Mathematics,Hefei University of Technology,Hefei 230009,China 2 National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China 《Science China Mathematics》 SCIE 2012年第4期869-879,共11页
Abstract We investigate negacyclic codes over the Galois ring GR(2a,m) of length N = 2kn, where n is odd and k≥0. We first determine the structure of u-constacyclic codes of length n over the finite chain ring GR(... Abstract We investigate negacyclic codes over the Galois ring GR(2a,m) of length N = 2kn, where n is odd and k≥0. We first determine the structure of u-constacyclic codes of length n over the finite chain ring GR(2a, m)[u]/〈u2k + 1〉. Then using a ring isomorphism we obtain the structure of negacyclic codes over GR(2a, m) of length N = 2kn (n odd) and explore the existence of self-dual negacyclic codes over GR(2a, m). A bound for the homogeneous distance of such negacvclic codes is also given. 展开更多
关键词 negacyclic codes constacyclic codes galois rings self-dual codes homogeneous distance
原文传递
A Fibonacci View on the Galois NFSR Used in Trivium
7
作者 WANG Hongyu ZHENG Qunxiong QI Wenfeng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第3期1326-1350,共25页
Trivium is an international standard of lightweight stream ciphers(ISO/IEC 29192-3:2012).In this paper,the Trivium-like NFSRs,a class of Galois NFSRs generalized from the Galois NFSR of Trivium,are studied from the pe... Trivium is an international standard of lightweight stream ciphers(ISO/IEC 29192-3:2012).In this paper,the Trivium-like NFSRs,a class of Galois NFSRs generalized from the Galois NFSR of Trivium,are studied from the perspective of Fibonacci NFSRs.It is shown that an n-stage Trivium-like NFSR cannot be equivalent to an n-stage Fibonacci NFSR,which is proved by showing the existence of“collision initial states”.As an intermediate conclusion,a necessary and sufficient condition for a kind of linear degeneracy of a Trivium-like NFSR is obtained from the persepective of interleaved sequences.Moreover,the smallest stage number of a Fibonacci NFSR that can generate all the output sequences of an n-stage Trivium-like NFSR is shown to be greater than n-7 and this value is no less than 371=287+min{93,84,111}specifically for the 288-stage Galois NFSR used in Trivium.These results contradict the existence of a equivalent Fibonacci model of Trivium NFSR of small stage,which implies that Trivium algorithm possesses a fair degree of immunity against“structure attack”. 展开更多
关键词 Fibonacci NFSR galois NFSR interleaved sequence linear degeneracy trivium
原文传递
Improving Video Watermarking through Galois Field GF(2^(4)) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
8
作者 Yasmin Alaa Hassan Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2024年第1期1423-1442,共20页
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4))... Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity.This study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their interaction with distinct irreducible polynomials.The primary aim is to enhance watermarking techniques for achieving imperceptibility,robustness,and efficient execution time.The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process.Scene selection is used strategically to embed watermarks in the most vital frames of the video,while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria,maintaining the video's visual quality.Concurrently,careful consideration is given to execution time,crucial in real-world scenarios,to balance efficiency and efficacy.The Peak Signal-to-Noise Ratio(PSNR)serves as a pivotal metric to gauge the watermark's imperceptibility and video quality.The study explores various irreducible polynomials,navigating the trade-offs between computational efficiency and watermark imperceptibility.In parallel,the study pays careful attention to the execution time,a paramount consideration in real-world scenarios,to strike a balance between efficiency and efficacy.This comprehensive analysis provides valuable insights into the interplay of GF multiplication tables,diverse irreducible polynomials,scene selection,adaptive thresholding,imperceptibility,and execution time.The evaluation of the proposed algorithm's robustness was conducted using PSNR and NC metrics,and it was subjected to assessment under the impact of five distinct attack scenarios.These findings contribute to the development of watermarking strategies that balance imperceptibility,robustness,and processing efficiency,enhancing the field's practicality and effectiveness. 展开更多
关键词 Video watermarking galois field irreducible polynomial multiplication table scene selection adaptive thresholding
下载PDF
Characterizations of semihoops based on derivations
9
作者 WANG Mei ZHANG Xiao-hong 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2024年第2期291-310,共20页
In this paper,we discuss the related properties of some particular derivations in semihoops and give some characterizations of them.Then,we prove that every Heyting algebra is isomorphic to the algebra of all multipli... In this paper,we discuss the related properties of some particular derivations in semihoops and give some characterizations of them.Then,we prove that every Heyting algebra is isomorphic to the algebra of all multiplicative derivations and show that every Boolean algebra is isomorphic to the algebra of all implicative derivations.Finally,we show that the sets of multiplicative and implicative derivations on bounded regular idempotent semihoops are in oneto-one correspondence. 展开更多
关键词 (prelinear)semihoop DERIVATION Heyting algebra galois connection
下载PDF
ON NONLINEARDIFFERENTIALGALOISTHEORY 被引量:1
10
作者 B.MALGRANGE 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2002年第2期219-226,共8页
Let X denote a complex analytic manifold, and let Aut(X) denote the space of invertible maps of a germ (X, a) to a germ (X, b); this space is obviously a groupoid; roughly speaking, a 'Lie groupoid' is a subgr... Let X denote a complex analytic manifold, and let Aut(X) denote the space of invertible maps of a germ (X, a) to a germ (X, b); this space is obviously a groupoid; roughly speaking, a 'Lie groupoid' is a subgroupoid of Aut(X) defined by a system of partial differential equations.To a foliation with singularities on X one attaches such a groupoid, e.g. the smallest one whose Lie algebra contains the vector fields tangent to the foliation. It is called 'the Galois groupoid of the foliation'. Some examples are considered, for instance foliations of codimension one, and foliations defined by linear differential equations; in this last case one recuperates the usual differential Galois group. 展开更多
关键词 Differential galois group Complex analytic manifold Lie groupoid
原文传递
Constructions on Approximately Mutually Unbiased Bases by Galois Rings 被引量:3
11
作者 LI Jin FENG Keqin 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2015年第6期1440-1448,共9页
Several new series of approximately mutually unbiased bases are constructed by using Gauss sums and Jacobi sums over Galois rings GR(p2, r), and the tensor method.
关键词 MUB galois rings Gauss sums Jacobi sums tensor method
原文传递
面向可重构并行化处理的线性反馈移位寄存器统一架构研究 被引量:3
12
作者 郑诚玮 戴紫彬 李伟 《微电子学与计算机》 CSCD 北大核心 2015年第11期111-115,共5页
为了解决目前线性反馈移位寄存器实现方式在运算速度、灵活性和安全性三个方面存在的不足,研究了Fibonacci LFSR和Galois LFSR的结构特点,提取出了两者可重构和并行化实现方式的共同点,研究并实现了两者的统一架构.统一架构的可重构实... 为了解决目前线性反馈移位寄存器实现方式在运算速度、灵活性和安全性三个方面存在的不足,研究了Fibonacci LFSR和Galois LFSR的结构特点,提取出了两者可重构和并行化实现方式的共同点,研究并实现了两者的统一架构.统一架构的可重构实现方式提高了电路的灵活性,并行化处理方式提高了电路的运算速度,灵活可变的结构增加了电路的安全性.和文献[6]中的设计相比,面积减小了47.4%,电路延迟缩减了11.5%. 展开更多
关键词 FIBONACCI LFSR galois LFSR 并行化 可重构 统一架构
下载PDF
Differential Galoisian approach to Jacobi integrability of general analytic dynamical systems and its application 被引量:1
13
作者 Kaiyin Huang Shaoyun Shi Shuangling Yang 《Science China Mathematics》 SCIE CSCD 2023年第7期1473-1494,共22页
The Morales-Ramis theory provides an effective and powerful non-integrability criterion for complex analytic Hamiltonian systems via the differential Galoisian obstruction.In this paper,we give a new Morales-Ramis typ... The Morales-Ramis theory provides an effective and powerful non-integrability criterion for complex analytic Hamiltonian systems via the differential Galoisian obstruction.In this paper,we give a new Morales-Ramis type theorem on the meromorphic Jacobi non-integrability of general analytic dynamical systems.The key point is to show that the existence of Jacobian multipliers of a nonlinear system implies the existence of common Jacobian multipliers of Lie algebra associated with the identity component.In addition,we apply our results to the polynomial integrability of Karabut systems for stationary gravity waves in finite depth. 展开更多
关键词 Morales-Ramis theory Jacobi integrability differential galois groups Karabut systems
原文传递
0,1 distribution in the highest level sequences of primitive sequences over Z2e 被引量:1
14
作者 范淑琴 韩文报 《Science China Mathematics》 SCIE 2003年第4期516-524,共9页
In this paper, we discuss the 0, 1 distribution in the highest level sequence ae-1 of primitive sequence over Z2e generated by a primitive polynomial of degree n. First we get an estimate of the 0, 1 distribution by u... In this paper, we discuss the 0, 1 distribution in the highest level sequence ae-1 of primitive sequence over Z2e generated by a primitive polynomial of degree n. First we get an estimate of the 0, 1 distribution by using the estimates of exponential sums over Galois rings, which is tight for e relatively small to n. We also get an estimate which is suitable for e relatively large to n. Combining the two bounds, we obtain an estimate depending only on n, which shows that the larger n is, the closer to 1/2 the proportion of 1 will be. 展开更多
关键词 primitive sequence highest level sequence galois ring exponential sum over galois ring 0 1 distribution
原文传递
Incremental Maintenance of Quotient Cube Based on Galois Lattice 被引量:2
15
作者 Cui-PingLi Kum-HoeTung ShanWang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第3期302-308,共7页
Data cube computation is a well-known expensive operation and has been studied extensively. It is often not feasible to compute a complete data cube due to the huge storage requirement. Recently proposed quotient cube... Data cube computation is a well-known expensive operation and has been studied extensively. It is often not feasible to compute a complete data cube due to the huge storage requirement. Recently proposed quotient cube addressed this fundamental issue through a partitioning method that groups cube cells into equivalent partitions. The effectiveness and efficiency of the quotient cube for cube compression and computation have been proved. However, as changes are made to the data sources, to maintain such a quotient cube is non-trivial since the equivalent classes in it must be split or merged. In this paper, incremental algorithms are designed to update existing quotient cube efficiently based on Galois lattice. Performance study shows that these algorithms are efficient and scalable for large databases. 展开更多
关键词 galois lattice quotient cube incremental maintenance
原文传递
一种基于Galois环振的真随机数发生器设计 被引量:2
16
作者 李清 王立辉 +2 位作者 刘丹 单伟君 柳逊 《科学技术与工程》 北大核心 2012年第17期4057-4060,4068,共5页
提出了一种基于Galois环振的真随机数发生器设计方法。为了改善随机性,采用了合理的采集手段和后处理方式。该方案采用纯数字电路设计,功耗较低,集成度较高,便于实现。最后基于真随机数测试标准AIS31,对实际设计的真随机数发生器进行了... 提出了一种基于Galois环振的真随机数发生器设计方法。为了改善随机性,采用了合理的采集手段和后处理方式。该方案采用纯数字电路设计,功耗较低,集成度较高,便于实现。最后基于真随机数测试标准AIS31,对实际设计的真随机数发生器进行了评测。实验结果表明,本设计符合AIS31的测试要求。 展开更多
关键词 galois 环振 真随机数发生器 AIS31
下载PDF
Topology-Transparent Transmission Scheduling Algorithms in Wireless Ad Hoc Networks 被引量:2
17
作者 MAXiao-lei WANGChun-jiang LIUYuan-an MALei-lei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期95-100,共6页
In order to maximize the average throughput and minimize the transmissionslot delay in wireless Ad Hoc networks, an optimal topology-transparent transmission schedulingalgorithm-multichannel Time-Spread Multiple Acces... In order to maximize the average throughput and minimize the transmissionslot delay in wireless Ad Hoc networks, an optimal topology-transparent transmission schedulingalgorithm-multichannel Time-Spread Multiple Access (TSMA) is proposed. Further analysis is shownthat the maximum degree is very sensitive to the network performance for a wireless Ad Hoc networkswith N mobile nodes. Moreover, the proposed multichannel TSMA can improve the average throughput Mtimes and decrease the average transmission slot delay M times, as compared with singlechannel TSMAwhen M channels are available. 展开更多
关键词 ad hoc networks TSMA topology-transparent scheduling galois field
原文传递
Improved Information Set Decoding Algorithms over Galois Ring in the Lee Metric
18
作者 LI Yu WANG Li-Ping 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第3期1319-1335,共17页
The security of most code-based cryptosystems relies on the hardness of the syndrome decoding(SD) problem.The best solvers of the SD problem are known as information set,decoding(ISD) algorithms.Recently,Weger,et al.(... The security of most code-based cryptosystems relies on the hardness of the syndrome decoding(SD) problem.The best solvers of the SD problem are known as information set,decoding(ISD) algorithms.Recently,Weger,et al.(2020) described Stern’s ISD algorithm,s-blocks algorithm and partial Gaussian elimination algorithms in the Lee metric over an integer residue ring Z_(pm),where p is a prime number and m is a positive integer,and analyzed the time complexity.In this paper,the authors apply a binary ISD algorithm in the Hamming metric proposed by May,et al.(2011)to solve the SD problem over the Galois ring GR(p^(m),k) endowed with the Lee metric and provide a detailed complexity analysis.Compared with Stern’s algorithm over Zpmin the Lee metric,the proposed algorithm has a significant improvement in the time complexity. 展开更多
关键词 galois ring information set decoding lee metric syndrome decoding
原文传递
Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF(2^(n))
19
作者 Mohammad Mazyad Hazzazi Hafeez Ur Rehman +1 位作者 Tariq Shah Hajra Younas 《Computers, Materials & Continua》 SCIE EI 2023年第8期2033-2060,共28页
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit valu... Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit values.To overcome the separate flaws of elliptic curve cryptography(ECC)and the Hill cipher(HC),we present an approach to picture encryption by combining these two encryption approaches.In addition,to strengthen our scheme,the group laws are defined over the rational points of a given elliptic curve(EC)over a Galois field(GF).The exclusive-or(XOR)function is used instead of matrix multiplication to encrypt and decrypt the data which also refutes the need for the inverse of the key matrix.By integrating the inverse function on the pixels of the image,we have improved system security and have a wider key space.Furthermore,through comprehensive analysis of the proposed scheme with different available analyses and standard attacks,it is confirmed that our proposed scheme provides improved speed,security,and efficiency. 展开更多
关键词 Elliptic curve galois field group law hill cipher
下载PDF
An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity
20
作者 Akshaykumar Meshram Monia Hadj Alouane-Turki +1 位作者 N.M.Wazalwar Chandrashekhar Meshram 《Computers, Materials & Continua》 SCIE EI 2023年第6期5337-5353,共17页
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly... Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature. 展开更多
关键词 Client anonymity Chebyshev chaotic maps authenticated key exchange statistical experiment galois fields
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部