期刊文献+
共找到85篇文章
< 1 2 5 >
每页显示 20 50 100
A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes
1
作者 Yongjin Jeon Seungjun Baek Jongsung Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期545-561,共17页
Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the... Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms,research research on the implementation of quantum circuits is essential.This paper presents a new framework to construct quantum circuits of substitution boxes(S-boxes)using system modeling.We model the quantum circuits of S-boxes using two layers:Toffoli and linear layers.We generate vector spaces based on the values of qubits used in the linear layers and apply them to find quantum circuits.The framework finds the circuit bymatching elements of vector spaces generated fromthe input and output of a given S-box,using the forward search or themeet-in-the-middle strategy.We developed a tool to apply this framework to 4-bit S-boxes.While the 4-bit S-box quantum circuit construction tool LIGHTER-R only finds circuits that can be implemented with four qubits,the proposed tool achieves the circuits with five qubits.The proposed tool can find quantum circuits of 4-bit odd permutations based on the controlled NOT,NOT,and Toffoli gates,whereas LIGHTER-R is unable to perform this task in the same environment.We expect this technique to become a critical step toward optimizing S-box quantum circuits. 展开更多
关键词 System modeling quantum circuit s-box circuit quantum computer
在线阅读 下载PDF
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
2
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 Advanced Encryption Standard (AES) s-box Tower Field Hardware Implementation Application Specific Integration Circuit (ASIC)
在线阅读 下载PDF
Genetic Algorithm-Based Approaches for Optimizing S-Boxes
3
作者 YIN Xinchun YANG Jie XIE Li 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期131-134,共4页
Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show... Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show that, with heuristic mutation strategy, the algorithm has high searching efficiency and fast convergence speed. Meanwhile, we also have take the avalanche probability of S-boxes into account, besides nonlinearity and difference uniformity. Under this method, an effective genetic algorithm for 6×6 S-boxes is provided and a number of S-boxes with good cryptographic capability can be obtained. 展开更多
关键词 s-boxes NONLINEARITY difference uniformity avalanche probability variance genetic algorithm heuristic mutation strategy
在线阅读 下载PDF
High-Order Bit Independence Criterion Test for the S-boxes
4
作者 GAO Sheng MA Wenping ZHU Jiwei 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期447-451,共5页
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas... A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications . 展开更多
关键词 CRYPTOGRAPHY Boolean functions s-boxes highorder bit independence criterion (HOBIC) security test
原文传递
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
5
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 CRYPTOGRAPHY Boolean functions Substitution boxes s-boxes strict avalanche criterion (SAC) CONCATENATION CONSTRUCTION
在线阅读 下载PDF
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes
6
作者 Sankhanil Dey Ranjan Ghosh 《Advances in Pure Mathematics》 2018年第3期272-306,共35页
4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations h... 4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations have been counted for all of 16 input and 16 output 4-bit bit patterns of 4-bit Crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxes. Count of existing finite differences from each element of output S-boxes to distant output S-boxes have been noted in Differential Cryptanalysis of S-boxes. In this paper a brief review of these two cryptanalytic methods for 4-bit S-boxes has been introduced in a very lucid and conceptual manner. Two new analysis techniques, one to search for the existing linear approximations among the input vectors (IPVs) and output Boolean functions (BFs) of a particular S-box has also been introduced in this paper. The search is limited to find the existing linear relations or approximations in the contrary to count the number of existent linear relations among all 16, 4-bit input and output bit patterns within all possible linear approximations. Another is to find number of balanced BFs in difference output S-boxes. Better the number of Balanced BFs, Better the security. 展开更多
关键词 Linear CRYPTANALYSIS Differential CRYPTANALYSIS SUBSTITUTION BOXES s-boxes Cryptography CRYPTANALYSIS
在线阅读 下载PDF
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
7
作者 Xuan-Ping Zhang Rui Guo +2 位作者 Heng-Wei Chen Zhong-Meng Zhao Jia-Yin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
原文传递
Design of strong S-boxes based on spatiotemporal chaotic system
8
作者 徐刚 赵耿 闵乐泉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第6期107-112,共6页
A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographic... A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographically strong S-boxes based on spatiotemporal chaotic system is proposed in this paper.The discretized Baker map and affine transformation are used orderly by an algorithm to shuffle the table generated by the spatiotemporal chaotic system.The cryptographical properties of these S-boxes such as bijection,nonlinearity,strict avalanche,output bits independence and equiprobable input /output XOR distribution are analyzed.The results of numerical analysis show that the S-box designed by this method can against several attacks and all the criteria for designing good S-box can be satisfied approximately.More strong S-boxes can be obtained by this method with the change of the original conditions or control parameters of the spatiotemporal chaos system.Furthermore,our approach is suitable for practical application in designing cryptosystem. 展开更多
关键词 spatiotemporal chaotic system s-box CRYPTANALYSIS
在线阅读 下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
9
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box s-box correlation power analysis
在线阅读 下载PDF
Constructions of correlation immnue S-boxes with high nonlinearity
10
作者 Yanhan Ji Zhuo Ma +1 位作者 Luyang Li Yujuan Sun 《Journal of Information and Intelligence》 2024年第3期253-260,共8页
S-boxes play a central role in the design of symmetric cipher schemes.For stream cipher appli-cations,an s-box should satisfy several criteria such as high nonlinearity,balanceness,correlation immunity,and so on.In th... S-boxes play a central role in the design of symmetric cipher schemes.For stream cipher appli-cations,an s-box should satisfy several criteria such as high nonlinearity,balanceness,correlation immunity,and so on.In this paper,by using disjoint linear codes,a class of s-boxes possessing high nonlinearity and 1st-order correlation immunity is given.It is shown that the constructed correlation immune S-boxes can possess currently best known nonlinearity,which is confirmed by the example 1st-order correlation immune(12,3)s-box with nonlinearity 2000.In addition,two other frameworks concerning the criteria of balanced and resiliency are obtained respectively. 展开更多
关键词 Boolean function s-boxes NONLINEARITY Correlation immunity Balanceness
原文传递
Optimizing AES S-Box Implementation:A SAT-Based Approach with Tower Field Representations
11
作者 Jingya Feng Ying Zhao +1 位作者 Tao Ye Wei Feng 《Computers, Materials & Continua》 2025年第4期1515-1531,共17页
The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field represen... The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field representations and Boolean Satisfiability(SAT)solvers.Our research makes several significant contri-butions to the field.Firstly,we have optimized the GF(24)inversion,achieving a remarkable 31.35%area reduction(15.33 GE)compared to the best known implementations.Secondly,we have enhanced multiplication implementa-tions for transformation matrices using a SAT-method based on local solutions.This approach has yielded notable improvements,such as a 22.22%reduction in area(42.00 GE)for the top transformation matrix in GF((24)2)-type S-box implementation.Furthermore,we have proposed new implementations of GF(((22)2)2)-type and GF((24)2)-type S-boxes,with the GF(((22)2)2)-type demonstrating superior performance.This implementation offers two variants:a small area variant that sets new area records,and a fast variant that establishes new benchmarks in Area-Execution-Time(AET)and energy consumption.Our approach significantly improves upon existing S-box implementations,offering advancements in area,speed,and energy consumption.These optimizations contribute to more efficient and secure AES implementations,potentially enhancing various cryptographic applications in the field of network security. 展开更多
关键词 AES s-box SAT optimization tower field hardware implementation area efficiency energy consumption
在线阅读 下载PDF
Ultra-low power S-Boxes architecture for AES 被引量:2
12
作者 XING Ji-peng ZOU Xue-cheng GUO Xu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第1期112-117,共6页
It is crucial to design energy-efficient advanced encryption standard (AES) cryptography for low power embedded systems powered by limited battery. Since the S-Boxes consume much of the total AES circuit power, an e... It is crucial to design energy-efficient advanced encryption standard (AES) cryptography for low power embedded systems powered by limited battery. Since the S-Boxes consume much of the total AES circuit power, an efficient approach to reducing the AES power consumption consists in reducing the S-Boxes power consumption. Among various implementations of S-Boxes, the most energy-efficient one is the decoder-switchencoder (DSE) architecture. In this paper, we refine the DSE architecture and propose one faster, more compact S-Boxes architecture of lower power: an improved and full-balanced DSE architecture. This architecture achieves low power consumption of 68 μW at 10 MHz using 0.25 ktm 1.SV UMC CMOS technology. Compared with the original DSE S-Boxes, it further reduces the delay, gate count and power consumption by 8%, 14% and 10% respect/vely. At the sane time, simulation results show that the improved DSE S-Boxes has the best performance among various S-Boxes architectures in terms of power-area product and power-delay product, and it is optimal for implementing low power AES cryptography. 展开更多
关键词 AES s-boxes DSE CRYPTOGRAPHY low power
原文传递
Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms
13
作者 CHEN Yi-cheng ZOU Xue-cheng LIU Zheng-lin CHEN Xiao-fei HAN Yu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第2期72-76,共5页
It is an important challenge to implement a lowcost power analysis immune advanced encryption standard (AES) circuit. The previous study proves that substitution boxes (S-Boxes) in AES are prone to being attacked,... It is an important challenge to implement a lowcost power analysis immune advanced encryption standard (AES) circuit. The previous study proves that substitution boxes (S-Boxes) in AES are prone to being attacked, and hard to mask for its non-linear characteristic. Besides, large amounts of circuit resources in chips and power consumption are spent in protecting S-Boxes against power analysis. Thus, a novel power analysis immune scheme is proposed, which divides the data-path of AES into two parts: inhomogeneous S-Boxes instead of fixed S-Boxes are selected randomly to disturb power and logic delay in the non-linear module; at the same time, the general masking strategy is applied in the linear part of AES. This improved AES circuit was synthesized with united microelectronics corporation (UMC) 0.25 μm 1.8 V complementary metal-oxide-semiconductor (CMOS) standard cell library, and correlation power analysis experiments were executed. The results demonstrate that this secure AES implementation has very low hardware cost and can enhance the AES security effectually against power analysis. 展开更多
关键词 AES s-boxes power analysis correlation poweranalysis (CPA)
原文传递
Transparency order versus confusion coefficient:a case study of NIST lightweight cryptography S-Boxes
14
作者 Huizhong Li Guang Yang +2 位作者 Jingdian Ming Yongbin Zhou Chengbin Jin 《Cybersecurity》 EI CSCD 2022年第1期74-93,共20页
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations.In most cases,non-linear components(e.g.S-Boxes)of cryptographic algori... Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations.In most cases,non-linear components(e.g.S-Boxes)of cryptographic algorithms will be chosen as primary targets of side-channel attacks(SCAs).In order to measure side-channel resistance of S-Boxes,three theoretical metrics are proposed and they are revisited transparency order(VTO),confusion coefficients variance(CCV),and minimum confusion coefficient(MCC),respectively.However,the practical effectiveness of these metrics remains still unclear.Taking the 4-bit and 8-bit S-Boxes used in NIST Lightweight Cryptography candidates as concrete examples,this paper takes a comprehensive study of the applicability of these metrics.First of all,we empirically investigate the relations among three metrics for targeted S-boxes,and find that CCV is almost linearly correlated with VTO,while MCC is inconsistent with the other two.Furthermore,in order to verify which metric is more effective in which scenarios,we perform simulated and practical experiments on nine 4-bit S-Boxes under the non-profiled attacks and profiled attacks,respectively.The experiments show that for quantifying side-channel resistance of S-Boxes under non-profiled attacks,VTO and CCV are more reliable while MCC fails.We also obtain an interesting observation that none of these three metrics is suitable for measuring the resistance of S-Boxes against profiled SCAs.Finally,we try to verify whether these metrics can be applied to compare the resistance of S-Boxes with different sizes.Unfortunately,all of them are invalid in this scenario. 展开更多
关键词 Side-channel attacks NIST lightweight cryptography s-boxes Transparency order Confusion coefficient
原文传递
ANALYSIS OF MINIMUM NUMBERS OF LINEARLY ACTIVE S-BOXES OF A CLASS OF GENERALIZED FEISTEL BLOCK CIPHERS
15
作者 Xiaopei GUO Kejian XU +1 位作者 Tongsen SUN Xiubin FAN 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第5期1014-1031,共18页
For a class of generalized Feistel block ciphers, an explicit formula for the minimum numbers of linearly active S-boxes of any round r is presented.
关键词 Block cipher generalized Feistel structure linear spread value the minimum number oflinearly active s-boxes.
原文传递
A Note on Rotation Symmetric S-boxes 被引量:2
16
作者 GAO Guangpu LIN Dongdai LIU Wenfen 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2019年第5期1460-1472,共13页
This paper is twofold.The first is devoted to study a class of quadratic rotation symmetric S-boxes(RSSBs)which was presented by Gao G,et al.,Constructions of quadratic and cubic rotation symmetric bent functions,IEEE... This paper is twofold.The first is devoted to study a class of quadratic rotation symmetric S-boxes(RSSBs)which was presented by Gao G,et al.,Constructions of quadratic and cubic rotation symmetric bent functions,IEEE Transactions on Information Theory,vol.58,no.7,pp.4908–4913,2012,by decomposing a class of cubic rotation symmetric bent functions.The authors obtain its nonlinearity and differential uniformity of such class of S-boxes.In particular,the compositional inversion of the class of rotation symmetric S-boxes is also presented.Then the authors introduce a steepest-descent-like search algorithm for the generation of RSSBs.The algorithm finds 5,6,7,8-bit RSSBs with very good cryptographic properties which can be applied in designing cryptographical algorithms. 展开更多
关键词 Dual Keccak PERMUTATION ROTATION SYMMETRY s-box
原文传递
New construction of highly nonlinear resilient S-boxes via linear codes
17
作者 Haixia ZHAO Yongzhuang WEI 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期175-181,共7页
Highly nonlinear resilient functions play a crucial role in nonlinear combiners which are usual hardware oriented stream ciphers.During the past three decades,the main idea of construction of highly nonlinear resilien... Highly nonlinear resilient functions play a crucial role in nonlinear combiners which are usual hardware oriented stream ciphers.During the past three decades,the main idea of construction of highly nonlinear resilient functions are benefited from concatenating a large number of affine subfunctions.However,these resilient functions as core component of ciphers usually suffered from the guess and determine attack or algebraic attack since the n-variable nonlinear Boolean functions can be easily given rise to partial linear relations by fixing at most nil variables of them.How to design highly nonlinear resilient functions(S-boxes)without concatenating a large number of nil variables affine subfunctions appears to be an important task.In this article,a new construction of highly nonlinear resilient functions is proposed.These functions consist of two classes subfunctions.More specially,the first class(nonlinear part)contains both the bent functions with 2k variables and some affine subfUnctions with n/2-k variables which are attained by using[n/2-k,m,d]disjoint linear codes.The second class(linear part)includes some linear subfunctions with nil variables which are attained by using[n/2,m,d]disjoint linear codes.It is illustrated that these resilient functions have high nonlinearity and high algebraic degree.In particular,It is different from previous well-known resilient S-boxes,these new S-boxes cannot be directly decomposed into some affine subftinctions with nil variables by fixing at most nil variables.It means that the S-boxes(vectorial Boolean functions)which use these resilient functions as component functions have more favourable cryptography properties against the guess and determine attack or algebraic attacks. 展开更多
关键词 stream cipher s-box disjoint linear codes resiliency NONLINEARITY
原文传递
A CRYPTOGRAPHIC STUDY ON S-BOXES OF DES TYPE Ⅲ
18
作者 YANG Junhui (Computing Center of Academia Sinica,Beijing 100080,China)DAI Zongduo ZENG Kencheng (Graduate School of Academia Sinica,Beijing 100039,China) 《Systems Science and Mathematical Sciences》 SCIE EI CSCD 1992年第1期27-32,共6页
The so-called selected permutations on the set of the first 16 non-negative integers are classified under the action of a certain motion group.Adata-base consisted of the class representatives has been provided.
关键词 DES s-box
在线阅读 下载PDF
A CRYPTOGRAPHIC STUDY ON S—BOXES OF DES TYPE Ⅰ AN INTEGRATED ANALYSIS OF THE DESIGN CRITERIA FOR S-BOXES
19
作者 杨君辉 戴宗铎 曾肯成 《Systems Science and Mathematical Sciences》 SCIE EI CSCD 1991年第2期104-110,共7页
An integrated analysis of the design criteria for the S-boxes used in the DES is made.Among others,the exclusion principle between the degree of nonlinearity and the degree of I/O—correlation immunity for partial var... An integrated analysis of the design criteria for the S-boxes used in the DES is made.Among others,the exclusion principle between the degree of nonlinearity and the degree of I/O—correlation immunity for partial variables is established. 展开更多
关键词 DES s-box
在线阅读 下载PDF
Rijndael S-box仿射运算研究 被引量:4
20
作者 刘景美 韦宝典 王新梅 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期94-97,129,共5页
证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确... 证明了有限域上q 多项式、n阶矩阵和线性函数间的等价关系;然后通过证明有限域上同一线性函数在严格不同基下对应不同矩阵,扩展出一种通用的方法快速确定有限域上线性函数和n阶矩阵间的线性关系;提出了有限域上q 多项式和n阶矩阵相互确定的一种新方案,从本质上解释了RijndaelS box代数表达式的简洁性. 展开更多
关键词 AES RIJNDAEL s-box 有限域 q-多项式
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部