期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
INTEGRAL DISTINGUISHERS OF JH AND GRSTL-512 被引量:2
1
作者 LiYanjun WuWenling DongLe 《Journal of Electronics(China)》 2012年第1期94-102,共9页
In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the... In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented. 展开更多
关键词 Hash function SHA-3 candidates Integral distinguisher JH Grcstl
下载PDF
Analysis and confirmation of fixed points in logistic mapping digital-flow chaos 被引量:2
2
作者 GuobaoXu DelingZheng GengZhao 《Journal of University of Science and Technology Beijing》 CSCD 2003年第3期62-65,共4页
The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three... The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three corollaries about the fixed points of logistic mappingare proposed and proved respectively. These theorem and corollaries provide a theoretical basis forchoosing parameter of chaotic sequences in chaotic secure communication and chaotic digitalwatermarking. And they are testified by simulation. 展开更多
关键词 CHAOS logistic mapping fixed point strange attractor
下载PDF
An input signal used in process identification - chaos sequence 被引量:1
3
作者 GengZhao DelingZheng ShaojunHuang 《Journal of University of Science and Technology Beijing》 CSCD 2004年第2期183-186,共4页
The sequences which consist of any segment of a chaos sequence are called asC-sequences. These sequences could be used as a kind of input signals to replace M-sequences in theprocess identification. This substitution ... The sequences which consist of any segment of a chaos sequence are called asC-sequences. These sequences could be used as a kind of input signals to replace M-sequences in theprocess identification. This substitution is theoretically proved to be feasible. InverseC-sequences are created in a way similar to inverse M-sequences to solve the problem thatC-sequences have non-ideal balance property, that is, the numbers of '0' and '1' are unequal.Besides its good pseudo-random property, the sequences have other advantages such as easy togenerate, varieties of the segment and adjustable cycle time. 展开更多
关键词 process identification M-SEQUENCE C-sequence
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部