一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

序列密碼的復(fù)合攻擊法

孫林紅 葉頂鋒 呂述望 馮登國(guó)

孫林紅, 葉頂鋒, 呂述望, 馮登國(guó). 序列密碼的復(fù)合攻擊法[J]. 電子與信息學(xué)報(bào), 2004, 26(1): 72-76.
引用本文: 孫林紅, 葉頂鋒, 呂述望, 馮登國(guó). 序列密碼的復(fù)合攻擊法[J]. 電子與信息學(xué)報(bào), 2004, 26(1): 72-76.
Sun Lin-hong, Ye Ding-feng, Lǚ Shu-wang, Feng Deng-guo. Composite Attack on Sequence Cipher[J]. Journal of Electronics & Information Technology, 2004, 26(1): 72-76.
Citation: Sun Lin-hong, Ye Ding-feng, Lǚ Shu-wang, Feng Deng-guo. Composite Attack on Sequence Cipher[J]. Journal of Electronics & Information Technology, 2004, 26(1): 72-76.

序列密碼的復(fù)合攻擊法

Composite Attack on Sequence Cipher

  • 摘要: 該文針對(duì)序列密碼,提出了復(fù)合攻擊的思想,并用相關(guān)攻擊和求逆攻擊復(fù)合對(duì)前饋網(wǎng)絡(luò)進(jìn)行了 分析,理論和實(shí)驗(yàn)結(jié)果給出了復(fù)合攻擊法的計(jì)算復(fù)雜度,并與常用的攻出法進(jìn)行了比較。
  • Zeng K.[J].Yang C H, Rao T R N. An improved linear syndrome algorithm in cryptanalysis with applications. In: Advances in Cryptology- EUROCRYPT90, Berlin, Springer-Verlag.1991,:-[2]Zeng K.[J].Huang H. On the linear syndrome method in cryptanalysis. In: Advances in CryptologyEUROCRYPT88, London, Springer-Verlag.1989,:-Meier W.[J].Staffelbach O. Fast correlation attacks on stream ciphers. In: Advances iii CryptologyEUROCRYPT88, Brelin, Springer-Verlag.1989,:-[3]Zeng K.[J].Yang C H, Rao T R N. On the linear consistency test(LCT) in cryptanalysis with applications. In: Advances in Cryptology-EUROCRYPT89, Barcelona, Springer-Verlag.1990,:-[4]Anderson R J. Searching for the optimum correlation attack. Fast Software EncryptionLeuven94, Lecture Notes in Computer Science, vol.1008, B. Preneel, Springer-Verlag, 1995:137-143[5]Golic J Dj. On the security of nonlinear filter generators. Fast Software Encryption-Cambridge96,Lecture Notes in Computer Science, vo1.1039, D. Gollmanned, Springer-Verlag, 1996: 173-188.[6]Chepyzhov V.[J].Johansson T, Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. Fast Software Encryption, FSE2000, Lecture Notes in Computer Science, SpringerVerlag.2000,:-[7]Athreya K B, Ney P E. Branching Processes. Berlin: Springer-Verlag, 1972.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  2196
  • HTML全文瀏覽量:  89
  • PDF下載量:  509
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2002-09-24
  • 修回日期:  2003-04-30
  • 刊出日期:  2004-01-19

目錄

    /

    返回文章
    返回