The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC...The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks.展开更多
The two gate formula for a diffusion X_t in R^n is considered.The formula gives an expressionof the density function of X_t in terms of the path integral of the Brownian bridge starting from xand ending on y at time t.
With the increasing of detection ability of passive sonar,the weak signal detection problem in multiple interferences becomes more and more important.In the time/bearing record(TBR) display of sonar detection,when t...With the increasing of detection ability of passive sonar,the weak signal detection problem in multiple interferences becomes more and more important.In the time/bearing record(TBR) display of sonar detection,when there exist traces of multiple interferences,the identification of weak signal is difficult or impossible.The adaptive noise cancellation technique provides the theoretical basis for suppressing strong interferences.But the solution for finding the steady-state optimum filter matrix is quite difficult due to the real time calculation of inverse matrix of input data correlation matrix.The iterative inverse beamforming(IBF) algorithm for solving the optimum filter vector,which is expressed by inverse matrix of the ocean environment data,is derived in this paper,by which,the optimum filter can be eventually expressed as a sum of series simple matrices of constructed from sensor data.Based on the algorithm proposed in this paper,some examples of at sea experiment are provided.The strong interferences are cancelled and the weak signal is emerged,even it didn't appear in the conventional beamforming(CBF) processing.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.61572491the 973 Program under Grant No.2011CB302401the open project of the SKLOIS in Institute of Information Engineering,Chinese Academy of Sciences under Grant No.2015-MS-03
文摘The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks.
基金This project is supported by the National Natural Science Foundation of China
文摘The two gate formula for a diffusion X_t in R^n is considered.The formula gives an expressionof the density function of X_t in terms of the path integral of the Brownian bridge starting from xand ending on y at time t.
基金supported by the National Natural Science Foundation of China(11304343)
文摘With the increasing of detection ability of passive sonar,the weak signal detection problem in multiple interferences becomes more and more important.In the time/bearing record(TBR) display of sonar detection,when there exist traces of multiple interferences,the identification of weak signal is difficult or impossible.The adaptive noise cancellation technique provides the theoretical basis for suppressing strong interferences.But the solution for finding the steady-state optimum filter matrix is quite difficult due to the real time calculation of inverse matrix of input data correlation matrix.The iterative inverse beamforming(IBF) algorithm for solving the optimum filter vector,which is expressed by inverse matrix of the ocean environment data,is derived in this paper,by which,the optimum filter can be eventually expressed as a sum of series simple matrices of constructed from sensor data.Based on the algorithm proposed in this paper,some examples of at sea experiment are provided.The strong interferences are cancelled and the weak signal is emerged,even it didn't appear in the conventional beamforming(CBF) processing.