期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Pseudorandomness of Camellia-Like Scheme 被引量:6
1
作者 吴文玲 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第1期82-88,共7页
Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camel... Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camellialike scheme. It is then proved that five-round Camellia-like scheme is pseudorandom and eight-round Camellia-like scheme is super-pseudorandom for adaptive adversaries. Further the paper considers more efficient construction of Camellia-like scheme, and discusses how to construct pseudorandom Camellia-like scheme from less random functions. 展开更多
关键词 block cipher CAMELLIA random function pseudorandomness super-pseudorandomness
原文传递
西安电子科技大学李哲在EUROCRYPT发表最新研究成果
2
《信息网络安全》 北大核心 2025年第7期1174-1174,共1页
近日,西安电子科技大学数学与交叉科学研究院菁英副教授李哲与上海交通大学教授邢朝平、博士研究生姚逸洲和副教授袁晨合作,在伪随机关联生成器(Pseudorandom Correlation Generator,PCG)方面取得重要进展,相关论文“Efficient Pseudora... 近日,西安电子科技大学数学与交叉科学研究院菁英副教授李哲与上海交通大学教授邢朝平、博士研究生姚逸洲和副教授袁晨合作,在伪随机关联生成器(Pseudorandom Correlation Generator,PCG)方面取得重要进展,相关论文“Efficient Pseudorandom Correlation Generators for Any Finite Field”被EUROCRYPT(欧密会)2025录用发表。 展开更多
关键词 伪随机关联生成器 EUROCRYPT PSEUDORANDOM PCG
在线阅读 下载PDF
Modified constructions of binary sequences using multiplicative inverse
3
作者 CHEN Zhi-xiong LIN Zhi-xing 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2008年第4期490-500,共11页
Two new families of finite binary sequences are constructed using multiplicative inverse. The sequences are shown to have strong pseudorandom properties by using some estimates of certain exponential sums over finite ... Two new families of finite binary sequences are constructed using multiplicative inverse. The sequences are shown to have strong pseudorandom properties by using some estimates of certain exponential sums over finite fields. The constructions can be implemented fast since multiplicative inverse over finite fields can be computed in polynomial time. 展开更多
关键词 stream cipher binary sequence multiplicative inverse pseudorandomness exponential sum
在线阅读 下载PDF
Linear Complexity of Some Binary Sequences Derived from Fermat Quotients 被引量:9
4
作者 Chen Zhixiong Hu Lei, Du Xiaoni 《China Communications》 SCIE CSCD 2012年第2期105-108,共4页
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotie... We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose. 展开更多
关键词 CRYPTOGRAPHY pseudorandom binary sequences fermat quotients finite fields linear complexity
在线阅读 下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
5
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
在线阅读 下载PDF
Watermarking of Digital Images in Frequency Domain 被引量:6
6
作者 Sami E. I. Baba Lala Z. Krikor +1 位作者 Thawar Arif Zyad Shaaban 《International Journal of Automation and computing》 EI 2010年第1期17-22,共6页
Invisible watermarking methods have been applied in frequency domains, trying to embed a small image inside a large original image. The original bitmap image will be converted into frequency domain to obtain the discr... Invisible watermarking methods have been applied in frequency domains, trying to embed a small image inside a large original image. The original bitmap image will be converted into frequency domain to obtain the discrete cosine transform (DCT) matrices from its blocks. The bits of the logo image are embedded in random color components of the original image, as well as in random positions in each selected block. These positions are alternating current (AC) coefficients of the DCT matrix. The randomness is obtained from RC4 pseudorandom bit generator that determines in which color component this logo image bits will be embedded. The embedded bits have been hidden in random blocks in the image, which are chosen according to a (semi-random) function proposed in this work. 展开更多
关键词 WATERMARKING discrete cosine transform (DCT) pseudorandom bit generator RC4 JPEG
在线阅读 下载PDF
Efficient Schemes for Securing Network Coding Against Wiretapping 被引量:2
7
作者 LIU Guangjun ZHOU Hang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第4期355-362,共8页
Existing solutions for secure network coding either bring significant bandwidth overhead or incur a high computational complexity. For exploiting low-overhead mechanism for secure network coding against wiretapping, t... Existing solutions for secure network coding either bring significant bandwidth overhead or incur a high computational complexity. For exploiting low-overhead mechanism for secure network coding against wiretapping, three efficient schemes are proposed for the applications with different security requirements. The basic idea behind this paper is first to encrypt a small part of source vectors and then subject the remaining original source vectors and the encrypted vectors to a special linear transformation. Also, a lightweight version of this scheme is then presented for resource-constrained networks. Moreover, an extensive scheme with enhanced security is also considered. All proposals are shown to have properties of lower security complexity and smaller bandwidth usage compared with the existing solutions. Also, the proposals can be easy to achieve flexible levels of security for various applications. 展开更多
关键词 network coding SECURITY wiretapping pseudorandom function ENCRYPTION
原文传递
A novel method of constructing high-dimensional digital chaotic systems on finite-state automata 被引量:1
8
作者 Jun Zheng Han-Ping Hu 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第9期233-243,共11页
When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical ... When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical degradation of low-dimensional chaotic maps. This paper presents a novel method to construct high-dimensional digital chaotic systems in the domain of finite computing precision. The model is proposed by coupling a high-dimensional digital system with a continuous chaotic system. A rigorous proof is given that the controlled digital system is chaotic in the sense of Devaney's definition of chaos. Numerical experimental results for different high-dimensional digital systems indicate that the proposed method can overcome the degradation problem and construct high-dimensional digital chaos with complicated dynamical properties. Based on the construction method, a kind of pseudorandom number generator (PRNG) is also proposed as an application. 展开更多
关键词 high-dimensional digital chaotic system dynamical degradation anti-control pseudorandom number generator
原文传递
On the Largest Linear Span of Binary Sequences with Period p^2 from Interleaved Construction 被引量:1
9
作者 LI Shenghua ZENG Xiangyong HU Lei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期707-711,共5页
Let S be a family of binary sequences constructed from interleaved construction. The linear spans of binary sequences in S are studied in this paper. In order to achieve the largest linear span, a criterion is present... Let S be a family of binary sequences constructed from interleaved construction. The linear spans of binary sequences in S are studied in this paper. In order to achieve the largest linear span, a criterion is presented for the base sequences with periodp, where p is a prime and 2 is a primitive root modulop2. It is shown that any sequence in S has the largest linear span under the criterion. Moreover, such base sequences can be chosen easily. 展开更多
关键词 pseudorandom sequence low correlation interleaved constructions linear span
原文传递
CHAOS-BASED FEEDFORWARD OUTPUT FUNCTIONS FOR COMBINING KEYSTREAM GENERATORS 被引量:1
10
作者 Sang Tao Wang Ruli Yan Yixun(Optoelectronic Research Center, Shanghai Institute of Technical Physics, Chinese Academy of Sciences, Shanghai 200083) 《Journal of Electronics(China)》 2001年第4期314-320,共7页
The chaos-based feedforward output functions for combining keystream generators are proposed according to chaotic dynamic theory. The generated binary signals are independently and identically distributed, and have pr... The chaos-based feedforward output functions for combining keystream generators are proposed according to chaotic dynamic theory. The generated binary signals are independently and identically distributed, and have predictable periods. All experiments correspond to the theoretical prediction very well. 展开更多
关键词 CRYPTOGRAPHY CHAOS Keystream GENERATOR PSEUDORANDOM number
在线阅读 下载PDF
Building a Secure Block Ciper on Small and Non- Binary Domain
11
作者 HU Dongping CUIYongquan +4 位作者 YINAihua CHEN Liang CUI Chunying ZOU Deqing HANLansheng 《China Communications》 SCIE CSCD 2014年第9期160-172,共13页
We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between... We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability(NHG) distribution.We prove that our block ciper achieves ideal security,that is,it is indistinguishable from a random permutation even if the adversary had already observed N plaintext-cipertext pairs.In particular,we initiate an efficient and sufficiently precise sampling algorithm for negative hypergeometric distribution. 展开更多
关键词 block cipher small block pseudorandom permutation negativehypergeometric distribution
在线阅读 下载PDF
Construction of k-ary Pseudorandom Elliptic Curve Sequences
12
作者 WU Chenhuang WENG Xin CHEN Zhixiong 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期452-456,共5页
We present a method for constructing k-ary sequences over elliptic curves. Using the multiplicative character of order k of finite fields, we construct a family of k-ary pseudorandom elliptic curve sequences. The pseu... We present a method for constructing k-ary sequences over elliptic curves. Using the multiplicative character of order k of finite fields, we construct a family of k-ary pseudorandom elliptic curve sequences. The pseudorandom measures, such as the well-distribution measure, the correlation measure of order e, and the linear complexity are estimated by using certain character sums. Such sequences share the same order of magnitude on the well-distribution measure, the correlation measure of order e as the 'truly' random sequences. The method indicates that it is possible to construct 'good' pseudorandom sequences over elliptic curves widely used in public key cryptography. 展开更多
关键词 pseudorandom sequences discrete logarithms elliptic curves character sums
原文传递
5D Hyper-Chaotic System with Multiple Types of Equilibrium Points
13
作者 XU Changbiao WU Xia +1 位作者 HE Yinghui MO Yunhui 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第5期639-649,共11页
A chaotic system with various equilibrium types has rich dynamic behaviors.Its state can switch flexibly among different families of attractors,which is beneficial to the practical applications.So it has been widely c... A chaotic system with various equilibrium types has rich dynamic behaviors.Its state can switch flexibly among different families of attractors,which is beneficial to the practical applications.So it has been widely concerned in recent years.In this paper,a new 5D hyper-chaotic system is proposed.The important characteristic of the system is that it may have multiple types of equilibrium points by changing system parameters,namely,linear equilibrium point,no equilibrium point,non-hyperbolic unstable equilibrium point and stable hyperbolictype equilibrium point.Furthermore,there are hyper-chaotic phenomena and multi-stability about the coexistence of multiple chaotic attractors and the coexistence of hyper-chaotic attractors and chaotic attractors in the system.In addition,the system,complexity is analyzed.It is found that the complexity is close to 1 in the hyper-chaotic state and a pseudo-random sequence generated by the system passes all the statistical tests.Finally,an analog circuit of the system is designed and simulated. 展开更多
关键词 HYPER-CHAOS equilibrium point multi-stability pseudorandom sequence chaotic circuit
原文传递
New Pseudorandom Number Generator Artin-Sc hreier Tower for p = 5
14
作者 Song Huiling 《China Communications》 SCIE CSCD 2012年第10期60-67,共8页
The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we ... The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we propose a new method to construct huge finite fields with the characteristic p = 5 by using an Artin-Schreier tower. Utilizing the recursive basis of the Artin-Schreier tower, we define a nmltiplication algorithm The algorithm can explicitly calculate the multiplication of two elements on the top finite field of this tower, without any primitive element. We also define a linear recurrence equation as an application, which produces a sequence of numbers, and call the new pseudorandom number generator Abstract Syntax Tree (AST) for p = 5. The experircental results show that our new pseudorandom number generator can produce a sequence of numbers with a long period. 展开更多
关键词 finite field pseudorandom number generator AST long period
在线阅读 下载PDF
A new pseudorandom number generator based on a complex number chaotic equation
15
作者 刘杨 佟晓筠 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第9期142-148,共7页
In recent years, various chaotic equation based pseudorandom number generators have been proposed. However, the chaotic equations are all defined in the real number field. In this paper, an equation is proposed and pr... In recent years, various chaotic equation based pseudorandom number generators have been proposed. However, the chaotic equations are all defined in the real number field. In this paper, an equation is proposed and proved to be chaotic in the imaginary axis. And a pseudorandom number generator is constructed based on the chaotic equation. The alteration of the definitional domain of the chaotic equation from the real number field to the complex one provides a new approach to the construction of chaotic equations, and a new method to generate pseudorandorn number sequences accordingly. Both theoretical analysis and experimental results show that the sequences generated by the proposed pseudorandom number generator possess many good properties. 展开更多
关键词 chaotic equation pseudorandom number generator complex number
原文传递
A Fast Pseudorandom Number Generator with BLAKE Hash Function
16
作者 WANG Houzhen ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期393-397,共5页
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Thr... This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program. 展开更多
关键词 CRYPTOGRAPHY pseudorandom number generator hash function National Institute of Standards and Technology Statistical Test Suite
原文传递
CRYPTANALYSIS OF AN IMAGE ENCRYPTION SCHEME WITH A PSEUDORANDOM PERMUTATION AND ITS IMPROVED VERSION
17
作者 WangJing JiangGuoping LinBing 《Journal of Electronics(China)》 2012年第1期82-93,共12页
Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the followin... Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the following:(1) If each row or column of the plain-image matrix is the same,the receiver cannot decrypt correctly.(2) Each plain-text word is correlated with single cipher-text word,but independent of other cipher-text word,which cannot meet the principles of algorithm design-diffusion and confusion.(3) If the cycle numbers are relatively small,statistics attack can be used to reveal some visual information of any other plain-images encrypted with the same secret key.Con-sidering the above problems,we propose an improved algorithm and then analyze its performance.Theoretical analysis and simulation results show that the improved algorithm can obtain better cryptographic properties,such as statistical characteristics,difference characteristics,and so on. 展开更多
关键词 Pseudorandom permutation DIFFUSION CONFUSION Theoretical analysis
在线阅读 下载PDF
A novel absolute displacement detecting magnetic sensor
18
作者 郝双晖 刘勇 +1 位作者 宋宝玉 郝明晖 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第2期81-85,共5页
A novel magnetic grating based on calibration was proposed.Two tracks,look-up track and index track,were used to realize absolute output.Magnets of look-up track were magnetized according to N-S-N-S,and magnetic field... A novel magnetic grating based on calibration was proposed.Two tracks,look-up track and index track,were used to realize absolute output.Magnets of look-up track were magnetized according to N-S-N-S,and magnetic field was sensed by 6 linear Hall sensors.Three signals whose phase shift is 120° were obtained through difference,and the offset of magnetic head in a signal period could be obtained by look-up table;Magnets of index track were magnetized according to pseudorandom binary sequence.Hall sensors were used to get the absolute offset of the signal period to which the magnetic head is belonged.The magnetic grating was calibrated using a higher resolution optical grating:output of optical grating and signals from magnetic grating were sampled at the same time and transmitted to computer,the relation between them could be got and stored in MCU for looking-up.The displacement was got according to Hall signals while in working state.A magnetic grating prototype was made,and it could realize absolute detecting in 2048 mm and the resolution could achieve to 0.001 mm.Its structure is simple,cost is very low and it is suitable for mass production. 展开更多
关键词 displacement detecting absolute output pseudorandom binary sequence
在线阅读 下载PDF
AUTOCORRELATIONS OF l-SEQUENCES WITH CERTAIN SHIFTS
19
作者 Xu Hong Qi Wenfeng 《Journal of Electronics(China)》 2007年第4期439-442,共4页
In this paper, the autocorrelations of maximal period Feedback with Carry Shift Register sequences (l-sequences) are discussed. For an l-sequence a with connection integer q = p^e(e ≥ 2) and period T = p^t-1(p- ... In this paper, the autocorrelations of maximal period Feedback with Carry Shift Register sequences (l-sequences) are discussed. For an l-sequence a with connection integer q = p^e(e ≥ 2) and period T = p^t-1(p- 1), and for any integer i, 1 ≤ i ≤ e/2, by calculating the number of certain sets, it is shown that the autocorrelation of a with shift τ= kT/2p^i is Ca(τ) =(-1)^k-1 T/p^2i-1, where 1 ≤ k ≤ 2p^i - 1, and gcd(k,2p^i) = 1. This result shows there do exist some shifts such that the autocorrelations of l-sequences are high although most autocorrelations are low. Such result also holds for the decimations of l-sequences. 展开更多
关键词 Pseudorandom sequences l-sequences Feedback with Carry Shift Register (FCSR) sequences AUTOCORRELATIONS
在线阅读 下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
20
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 PSEUDORANDOM SEQUENCES NON-LINEAR FEEDBACK FUNCTION Information Protection
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部