期刊文献+

有限域GF(2n)上Hadamard型MDS矩阵研究 被引量:2

Investigate for MDS Matrix of Hadamard Type on Finite Fields
在线阅读 下载PDF
导出
摘要 论文研究了有限域GF(2n)上Hadamard矩阵的性质,证明了Hadamard矩阵成为MDS矩阵及对合MDS矩阵的所需满足的必要条件。特别地,当矩阵阶数为4时,证明了充要条件。改进了4阶及8阶Hadamard型MDS矩阵的生成算法。 In this paper,the character of Hadamard Matrices is investigated,and the necessary condition of Hadamard matrix being MDS matrix and involution MDS matrix is given.In special,the necessary and sufficient condition for 4-order matrix are illustrated.Additionally,the generating algorithms are improved for 4-order and 8-order MDS matrix of Hadamard type.
出处 《舰船电子工程》 2014年第5期41-45,共5页 Ship Electronic Engineering
关键词 HADAMARD矩阵 MDS矩阵 对合 Hadamard matrix MDS matrix involution
  • 相关文献

参考文献11

  • 1T. Shirai, K. Shibutani, T. Akishita, et al. The 128- bit Blockcipher CLEFIA[C]//FSE'07, LNCS 4593, Springer Verlag, 2007 : 181-195.
  • 2Schneier B, Kelsey J, Whiting D. The Twofish En- cryption Algorithm: A 128-bit Block Cipher[M]. New York: John Wiley and Sons, Inc,1999:7-11.
  • 3Junod, P. , Vaudenay, S. FOX: A new family of block ciphers[C]//Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, Springer, Heidelberg, 2004,3357: 114-129.
  • 4A. Youssef, S. Mister, S. Tavares. On the Design of Linear Transformations for Substitution-Permutation Encryption Networks[C]//Workshop on Selected Are- as in Cryptography-SAC'97, Ottawa, 1997.164-171.
  • 5王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 6崔霆,金晨辉.对合Cauchy-Hadamard型MDS矩阵的构造[J].电子与信息学报,2010,32(2):500-503. 被引量:15
  • 7Xiao L, Heys H. Hardware design and analysis of block cipher components [C]//Proceedings of the 5th International. Conference on Information Security and Cryptology-ICISC'02,2003,2587: 164-181.
  • 8J Daemen. Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis[D]. Leuven: K U Leuven, 1995.
  • 9Joan Daemen, Lars Knudsen, Vincent Rijmen. The Block Cipher Square[C]//Fast Software Encryption (FSE), 1997 : 149-165.
  • 10Kwon, D, Kim, J, Park, S, et al. New Block Ci- pher: ARIA[C]//Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, Springer, Heidelberg, 2004, 2971:432-445.

二级参考文献12

  • 1王念平,金晨辉,余昭平.对合型列混合变换的研究[J].电子学报,2005,33(10):1917-1920. 被引量:10
  • 2Schneier B, Kelsey J, and Whiting D, et al.. Twofish: A 128-bit block cipher. Available at http://www.schneier.com/, 2007-2-2.
  • 3Wang Mei-qin. Differential cryptanalysis of present. Cryptology ePrint Archive, Report 2007/408.
  • 4Wu Wen-ling, Zhang Wen-tao, and Feng Deng-guo. Impossible differential cryptanalysis of reduce round ARIA and camellia. Journal of Computer Science and Technology, 2007, 22(3): 449-456.
  • 5Daemen J. Cipher and hash function design strategies based on linear and differential cryptanalysis. [Ph.D. dissertation], KU, Leuven, 1995.
  • 6Kang Ju-sung, Hong Seokhie, and Lee Sangjin, et al.. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 2001, 23(4): 158-167.
  • 7Xiao L and Heys H. Hardware design and analysis of block cipher components. Proceedings of the 5th International Conference on Information Security and Cryptology- ICISC'02, 2003 LNCS 2587: 164-181.
  • 8Youssef A, Mister S, and Tavares S. On the design of linear transformations for substitution permutation encryption networks. Workshop on Selected Areas in Cryptography- SAC'97, Ottawa, Workshop record, 1997: 40-48.
  • 9Blomer J, Kalfane M, and Karpinski M, et al.. An Xor-based erasure-resilient coding scheme. Technical Report TR-95-048. International Computer Science Institute, August 1995.
  • 10F J Macwilliams,N J A Sloane.The theory of Error-Correcting Codes[M].NorthHolland:Amsterdam,1977.294-306.

共引文献21

同被引文献19

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部