期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Research of Methods for Lost Data Reconstruction in Erasure Codes over Binary Fields 被引量:2
1
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期43-48,共6页
In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform... In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future. 展开更多
关键词 binary fields data reconstruction decoding erasure codes
在线阅读 下载PDF
Software Implementation of Elliptic Curve Encryption over Binary Field
2
作者 ZHANG Xianfeng QIN Zhiguang ZHOU Shijie LIU Jinde(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期54-59,共6页
The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism ... The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism for key exchange based on Diffie-Hellman is described in detailsfor further applications.Based on these theoretic foundations,the software based on ECC is developedand an application is provided.The software is characterized by excellent security as well as highefficiency. 展开更多
关键词 network security elliptic curve cryptography(ECC) encryption software binary field
在线阅读 下载PDF
FAST FOURIER TRANSFORMS ON BINARY FIELDS
3
作者 F.Schipp W.R.Wade 《Analysis in Theory and Applications》 1998年第1期91-100,共0页
We give a unified treatment of Fast Fourier Transforms for UDMD systems which contains, as special cases, Fast Fourier algorithms for character groups of many subgroups associated with binary fields.
关键词 FAST FOURIER TRANSFORMS ON binary fieldS
全文增补中
Generalization of Advanced Encryption Standard Based on Field of Any Characteristic
4
作者 Nabilah Abughazalah Majid Khan +2 位作者 Noor Munir Ammar SAlanazi Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第12期6121-6138,共18页
Nowadays most communications are done by utilizing digital transmission mechanisms.The security of this digital information transmitted through different communication systems is quite important.The secrecy of digital... Nowadays most communications are done by utilizing digital transmission mechanisms.The security of this digital information transmitted through different communication systems is quite important.The secrecy of digital data is one of the burning topics of the digitally developed world.There exist many traditional algorithms in the literature to provide methods for robust communication.The most important and recent modern block cipher named the advanced encryption standard(AES)is one of the extensively utilized encryption schemes with binary based.AES is a succession of four fundamental steps:round key,sub-byte,shift row,and mix column.In this work,we will provide an innovative methodology for extending the AES in a Galois fieldwith any characteristic p.All four steps in the fundamental process with binary characteristics will be adjusted because of the new enhancement.By applying double affine transformations,we have enhanced the number of options in our suggested substitution boxes.The reconstruction of the nonlinear confusion component and encryption structure provides robustness in the generalized AES.The increase in the keyspace due to the Galois field generalization implies that we have improved additional confusion abilities and broadened the current notions.The implementation of the proposed structure of AES for image,audio,and video encryption will provide high security for secure communication. 展开更多
关键词 AES generalized AES binary field ternary function
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部