期刊文献+
共找到742篇文章
< 1 2 38 >
每页显示 20 50 100
Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers 被引量:1
1
作者 Muhammad Sajjad Tariq Shah Robinson Julian Serna 《Computers, Materials & Continua》 SCIE EI 2023年第6期5287-5305,共19页
In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the ... In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers(GI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.But the prime field dependent on the Elliptic curve(EC)provides one S-box at a time by fixing three parameters a,b,and p.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability. 展开更多
关键词 Gaussian integers residue class of gaussian integers block cipher S-boxes analysis of S-boxes
在线阅读 下载PDF
Nonlinear Components of a Block Cipher over Eisenstein Integers
2
作者 Mohammad Mazyad Hazzazi Muhammad Sajjad +2 位作者 Zaid Bassfar Tariq Shah Ashwag Albakri 《Computers, Materials & Continua》 SCIE EI 2023年第12期3659-3675,共17页
In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the poi... In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves,chaotic maps,and Gaussian integers has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers(EI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.However,in the same way,by taking three fixed parameters only one S-box is obtained through a prime field-dependent Elliptic curve(EC),chaotic maps,and Gaussian integers.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability. 展开更多
关键词 Eisenstein integers residue class of Eisenstein integers block cipher S-boxes analysis of S-boxes
在线阅读 下载PDF
Automorphism Groups of Some Graphs for the Ring of Gaussian Integers Modulo p^s
3
作者 Hengbin ZHANG Jizhu NAN 《Journal of Mathematical Research with Applications》 CSCD 2020年第2期111-118,共8页
In this paper, the automorphism group is completely determined, of the unitary Cayley graph, the unit graph and the total graph, over the ring of Gaussian integers modulo a prime power.
关键词 AUTOMORPHISM unit GRAPH UNITARY CAYLEY GRAPH GAUSSIAN integers
原文传递
Information Protection Based on Extraction of Square Roots of Gaussian Integers
4
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第3期133-138,共6页
A cryptosystem based on computation of square roots of complex integers modulo composite n is described in this paper. This paper provides an algorithm extracting a square root of Gaussian integer. Various properties ... A cryptosystem based on computation of square roots of complex integers modulo composite n is described in this paper. This paper provides an algorithm extracting a square root of Gaussian integer. Various properties of square roots and a method for finding Gaussian generators are demonstrated. The generators can be instrumental in constructing other cryptosystems. It is shown how to significantly reduce average complexity of decryption per each block of ciphertext. 展开更多
关键词 Public Key CRYPTOSYSTEMS Square-Root EXTRACTION GAUSSIAN integers GAUSSIAN Generator Multiplicative Inverse SQUARE ROOT Algorithm Information Hiding Ambiguity of Recovery
在线阅读 下载PDF
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
5
作者 Boris Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第4期197-204,共8页
There are settings where encryption must be performed by a sender under a time constraint. This paper de-scribes an encryption/decryption algorithm based on modular arithmetic of complex integers called Gaus-sians. It... There are settings where encryption must be performed by a sender under a time constraint. This paper de-scribes an encryption/decryption algorithm based on modular arithmetic of complex integers called Gaus-sians. It is shown how cubic extractors operate and how to find all cubic roots of the Gaussian. All validations (proofs) are provided in the Appendix. Detailed numeric illustrations explain how to use the method of digital isotopes to avoid ambiguity in recovery of the original plaintext by the receiver. 展开更多
关键词 Cryptographic Protocol Secure Communication Time-Constrained ENCRYPTION CUBIC ROOT Extractor GAUSSIAN integers Modular Arithmetic Prefix/Suffix Positioning Digital Isotope Quadratic Residue Jacoby Symbol
在线阅读 下载PDF
Positive integers possessing a weak order
6
作者 刘弘泉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第4期502-503,共2页
Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(... Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(m) In this paper, we obtain the asymptotic formula: .G(x)=αx^2+O(xlogx),ax x→∞ Our result improves the corresponding result with an error term O(xlog^2 x) of Yang Zhaohua obtained in 1986 展开更多
关键词 integers possessing a weak order asymptotic formula
在线阅读 下载PDF
The Ordinal Interpretation of the Integers and Its Use in Number Theory
7
作者 Nathan Thomas Hamlin 《Open Journal of Discrete Mathematics》 2019年第4期165-175,共11页
The author recently published a paper which claimed that an ordinal interpretation of numbers had limited applicability for cryptography. A further examination of this subject, in particular to what extent an ordinal ... The author recently published a paper which claimed that an ordinal interpretation of numbers had limited applicability for cryptography. A further examination of this subject, in particular to what extent an ordinal interpretation is useful for recurrence sequences, is needed. Hilbert favored an interpretation of the natural numbers that placed their ordinal properties prior to their cardinal properties [1] [2]. The author examines ordinal uses of the integers in number theory in order to discuss the possibilities and limitations of this approach. The author hopes this paper will be useful in clarifying or even correcting some matters that were discussed in his paper of January of 2018. I was trained informally in philosophical realism, and while I think idealism too has a place, at this time in my life I believe that the weight of evidence and usefulness is more on the side of philosophical materialism. I hope this discussion will help supplement for my readers the material in Number in Mathematical Cryptography. I still maintain that a lack of clarity on these matters has hindered progress in cryptography;and it has taken time for me to better understand these things. I hope others who have interest and ability will assist in making these matters clearer. My intention was to work in pure mathematics, and the transition to an applied mindset was difficult for me. As a result, I feel most comfortable in a more middle-of-the road attitude, but have had to slowly move to a more precise analysis of the physical quantities involved. I hope my readers will be patient with my terminology, which is still evolving, and my discussion of things which are more indirectly related, and which are necessary for my expression. These are important things for the mathematical community to understand, and I hope smarter and more knowledgeable people will address my errors, and improve upon the things I might have correct. I am discussing sequences which are sometimes a use of both ordinal and cardinal numbers. 展开更多
关键词 ORDINAL INTERPRETATION integers NUMBER THEORY Hilbert’s THEORY
在线阅读 下载PDF
On the Line Graph of the Complement Graph for the Ring of Gaussian Integers Modulo n
8
作者 Manal Ghanem Khalida Nazzal 《Open Journal of Discrete Mathematics》 2012年第1期24-34,共11页
The line graph for the complement of the zero divisor graph for the ring of Gaussian integers modulo n is studied. The diameter, the radius and degree of each vertex are determined. Complete characterization of Hamilt... The line graph for the complement of the zero divisor graph for the ring of Gaussian integers modulo n is studied. The diameter, the radius and degree of each vertex are determined. Complete characterization of Hamiltonian, Eulerian, planer, regular, locally and locally connected is given. The chromatic number when is a power of a prime is computed. Further properties for and are also discussed. 展开更多
关键词 Complement of a GRAPH Chromatic Index Diameter DOMINATION Number Eulerian GRAPH GAUSSIAN integers Modulo N Hamiltonian GRAPH Line GRAPH Radius Zero DIVISOR GRAPH
在线阅读 下载PDF
Terminating Cycles for Iterated Difference Values of Four—Digit Integers
9
《岳阳大学学报》 CAS 1995年第1期4-12,共9页
1. Introduction Since D. R. Kaprekar discoverd the interesting property of the number 6174 an interesting mathematical model has been developed:
关键词 Digit integers Terminating Cycles for Iterated Difference Values of Four
在线阅读 下载PDF
Note on the Product Inequalities for Sequences of Multidimensional Integers
10
作者 MA Li WANG Ru HAN Xin-fangi 《Chinese Quarterly Journal of Mathematics》 2020年第4期397-400,共4页
For multi-dimensional integer-valued sequence, a new proof of the upper-bound and lower-bound estimations on the product of all its components is given in this paper. Those estimations are very important to characteri... For multi-dimensional integer-valued sequence, a new proof of the upper-bound and lower-bound estimations on the product of all its components is given in this paper. Those estimations are very important to characterize the Kondratiev space of random test function, in which space it is convenient to study random distribution,random partial differential equation and other problems. 展开更多
关键词 Multidimensional integer value sequence Product inequality The upper-bound and lower-bound estimates
在线阅读 下载PDF
Integers and Absolute Value
11
《中学生数学》 2025年第20期F0003-F0003,共1页
WHEN am I ever going to use this?GEOGRAPHY Badwater, in Death Valley, California, is the lowest point in North America, while Mt. Mc Knlei y in Alaska, is the highest point. The graph shows their elevations and extrem... WHEN am I ever going to use this?GEOGRAPHY Badwater, in Death Valley, California, is the lowest point in North America, while Mt. Mc Knlei y in Alaska, is the highest point. The graph shows their elevations and extreme temperatures.1. What does an elevation of-86 meters represent?2. What does a temperature of-35°represent?With sea level as the starting point of 0, you can express 86 meters below sea level as 0-86, or-86. A negative number is a number less than 0.Negative numbers like-86, positive numbers like+125, and zero are members of the set of integers. Integers can be represented as points on a number line. 展开更多
关键词 absolute value TEMPERATURE ELEVATION sea level integers number line
原文传递
Adding Integers
12
《中学生数学》 2025年第22期F0003-F0003,共1页
1. Write an integer that describes the game show host's statement.2. Write an addition sentence that describes this situation.The equation-3,200+(-7,400)+(-2,600)=-13,200 is an example of adding integers with the ... 1. Write an integer that describes the game show host's statement.2. Write an addition sentence that describes this situation.The equation-3,200+(-7,400)+(-2,600)=-13,200 is an example of adding integers with the same sign. Notice that the sign of the sum is the same as the sign of each addend. 展开更多
关键词 SIGN SUM addition sentence ADDITION integers
原文传递
Quest towards “factoring larger integers with commercial D-Wave quantum annealing machines” 被引量:3
13
作者 XinMei Wang 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2019年第6期130-130,共1页
Integer factorization (IFP), also called prime factorization, is an important problem in number theory, cryptography, and quantum computation. Factoring large integers to attack the RSA cryptosystem is intractable for... Integer factorization (IFP), also called prime factorization, is an important problem in number theory, cryptography, and quantum computation. Factoring large integers to attack the RSA cryptosystem is intractable for powerful supercomputers, let alone classical computers. In 1994, Shor [1]presented an algorithm that potentially enabled a quantum computer to find prime factors in polynomial time. 展开更多
关键词 QUEST towards FACTORING larger integers with commercial D-WAVE quantum ANNEALING MACHINES
原文传递
The Greatest Prime Factor of the Integers in a Short Interval (Ⅳ) 被引量:1
14
作者 Jia Chaohua Institute of Mathematics Academia Sinica Beijing, 100080 China 《Acta Mathematica Sinica,English Series》 SCIE CSCD 1996年第4期433-445,共13页
Let P(x) denote the greatest prime factor of ∏<sub>x【n≤x+x<sup>1/2</sup></sub>n. In this paper, we shall prove that P(x)】x<sup>0.728</sup>holds true for sufficiently large x.
关键词 MATH In The Greatest Prime Factor of the integers in a Short Interval
原文传递
on the Distribution of Square-full Integers 被引量:1
15
作者 Cai Yingchun (Department of Mathematics,Shandong Normal University,Jinan 250014,China) 《Acta Mathematica Sinica,English Series》 SCIE CSCD 1997年第2期269-280,共12页
Let △(x)be the error term in the asymptotic formula for the counting function of square-full integers.In the present paper it is proved that △(x)=O(x<sup>27/4+ε</sup>),which improves on the exponent... Let △(x)be the error term in the asymptotic formula for the counting function of square-full integers.In the present paper it is proved that △(x)=O(x<sup>27/4+ε</sup>),which improves on the exponent 33/5 obtained by X.D.CAO. 展开更多
关键词 Squarefull integers Riemann Hypothesis Trigonometrical sum
原文传递
THE DISTRIBUTION OF κ-FULL INTEGERS
16
作者 展涛 《Chinese Science Bulletin》 SCIE EI CAS 1988年第3期260-261,共2页
Let k≥2 is a fixed integer. A natural number n is called k-full if p^k|n whenever p is a prime factor of n. Let A_k(x) denote the number of k-full integers not exceeding x. A. Ivi(?) proved on the Lindelof hypothesis
关键词 INTEGER whenever EXCEEDING HYPOTHESIS RIEMANN FULL integers 上望 下声
在线阅读 下载PDF
GOLDBACH AND NON-GOLDBACH EXTENSIONS OF SOME CYCLO-TOMIC RINGS OF INTEGERS
17
作者 王世强 《Chinese Science Bulletin》 SCIE EI CAS 1985年第5期702-,共1页
This letter is a continuation of previous work(Scientia Sinica, 27(1984), 1: 16—23). By using number-theoretic and model-theoretic arguments, we establish the existence of Goldbach and nonGoldbach extension rings of ... This letter is a continuation of previous work(Scientia Sinica, 27(1984), 1: 16—23). By using number-theoretic and model-theoretic arguments, we establish the existence of Goldbach and nonGoldbach extension rings of certain cyclotomic rings of integers and of some related rings of integers. The results obtained are as follows (The following Lemma is cited from the author’s previous work to help the reader to comprehend Theorem 1). 展开更多
关键词 integers rings CONTINUATION CITED CYCLO LETTER 云孙
在线阅读 下载PDF
ON THE ERROR FUNCTION OF THE SQUARE-FULL INTEGERS
18
作者 展涛 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 1989年第2期227-235,共9页
Let L(x) denote the number of square-full integers not exceeding x. It is proved in [1] thatL(x)~(ζ(3/2)/ζ(3))x<sup>1/2</sup>+(ζ(2/3)/ζ(2))x<sup>1/3</sup> as x→∞,where ζ... Let L(x) denote the number of square-full integers not exceeding x. It is proved in [1] thatL(x)~(ζ(3/2)/ζ(3))x<sup>1/2</sup>+(ζ(2/3)/ζ(2))x<sup>1/3</sup> as x→∞,where ζ(s) denotes the Riemann zeta function. Let △(x) denote the error function in the asymptotic formula for L(x). It was shown by D. Suryanaryana<sup>[2]</sup> on the Riemann hypothesis (RH) that1/x integral from n=1 to x |△(t)|dt=O(x<sup>1/10+s</sup>)for every ε】0. In this paper the author proves the following asymptotic formula for the mean-value of △(x) under the assumption of R. H.integral from n=1 to T (△<sup>2</sup>(t/t<sup>6/5</sup>)) dt~c log T,where c】0 is a constant. 展开更多
关键词 RIEMANN asymptotic integers ASSUMPTION ERROR HYPOTHESIS proof EXCEEDING 土生 LEMMA
原文传递
DISTRIBUTION OF k-FULL INTEGERS
19
作者 展涛 《Science China Mathematics》 SCIE 1989年第1期20-37,共18页
In this paper we discuss the error function △_k(x) in the problem of distribution of k-fullintegers. Under the Riemann hypothesis, an asymptotic formula for the mean-value of △_k(x)is given.
关键词 k-full integers RIEMANN HYPOTHESIS mean-value THEOREM Tauber theorem.
原文传递
On the Longest Length of Consecutive Integers
20
作者 Min Zhi ZHAO Qi-Man SHAO 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2011年第2期329-338,共10页
Choose m numbers from the set {1,2,... ,n} at random without replacement. In this paper we first establish the limiting distribution of the longest length of consecutive integers and then apply the result to test rand... Choose m numbers from the set {1,2,... ,n} at random without replacement. In this paper we first establish the limiting distribution of the longest length of consecutive integers and then apply the result to test randomness of selecting numbers without replacement. 展开更多
关键词 Sampling without replacement consecutive integers limit distribution test of randomness
原文传递
上一页 1 2 38 下一页 到第
使用帮助 返回顶部