期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
On Algebraic Immunity of Trace Inverse Functions on Finite Fields of Characteristic Two 被引量:1
1
作者 FENG Xiutao GONG Guang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第1期272-288,共17页
The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC... The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks. 展开更多
关键词 Algebraic immunity boolean functions fast algebraic attacks trace inverse functions
原文传递
WEYL TRANSFORMATIONS ON MANIFOLDS Ⅱ. Generalized Trace and Inverse Mapping Formula
2
作者 钱敏 许连超 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 1992年第4期289-297,共9页
The two gate formula for a diffusion X_t in R^n is considered.The formula gives an expressionof the density function of X_t in terms of the path integral of the Brownian bridge starting from xand ending on y at time t.
关键词 WEYL TRANSFORMATIONS ON MANIFOLDS Generalized trace and Inverse Mapping Formula
原文传递
Iterative inverse beamforming algorithm and its application in multiple targets detection of passive sonar 被引量:4
3
作者 LI Qihu WEI Chonghua XUE Shanhua 《Chinese Journal of Acoustics》 CSCD 2017年第2期208-216,共9页
With the increasing of detection ability of passive sonar,the weak signal detection problem in multiple interferences becomes more and more important.In the time/bearing record(TBR) display of sonar detection,when t... With the increasing of detection ability of passive sonar,the weak signal detection problem in multiple interferences becomes more and more important.In the time/bearing record(TBR) display of sonar detection,when there exist traces of multiple interferences,the identification of weak signal is difficult or impossible.The adaptive noise cancellation technique provides the theoretical basis for suppressing strong interferences.But the solution for finding the steady-state optimum filter matrix is quite difficult due to the real time calculation of inverse matrix of input data correlation matrix.The iterative inverse beamforming(IBF) algorithm for solving the optimum filter vector,which is expressed by inverse matrix of the ocean environment data,is derived in this paper,by which,the optimum filter can be eventually expressed as a sum of series simple matrices of constructed from sensor data.Based on the algorithm proposed in this paper,some examples of at sea experiment are provided.The strong interferences are cancelled and the weak signal is emerged,even it didn't appear in the conventional beamforming(CBF) processing. 展开更多
关键词 sonar inverse cancellation iterative traces ocean suppressing considerably directional suppressed
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部