咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 网络空间安全
    • 1 篇 计算机科学与技术...
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 3 篇 round function
  • 1 篇 performance
  • 1 篇 image encryption
  • 1 篇 diffusion
  • 1 篇 pseudo-random fu...
  • 1 篇 structure
  • 1 篇 key scheduling
  • 1 篇 block cipher
  • 1 篇 security
  • 1 篇 key schedule
  • 1 篇 lightweight bloc...
  • 1 篇 chaos
  • 1 篇 rectangle

机构

  • 1 篇 school of electr...
  • 1 篇 henan key labora...
  • 1 篇 zhengzhou inform...
  • 1 篇 trusted computin...
  • 1 篇 department of co...
  • 1 篇 state key labora...

作者

  • 1 篇 hailun yan
  • 1 篇 xin ge
  • 1 篇 fenlin liu
  • 1 篇 mo chen
  • 1 篇 bin lu
  • 1 篇 zhang lei
  • 1 篇 wu wenling
  • 1 篇 xuejia lai
  • 1 篇 yu xiaoli
  • 1 篇 yiyuan luo

语言

  • 3 篇 英文
检索条件"主题词=round function"
3 条 记 录,以下是1-10 订阅
排序:
Designing a Secure round function Based on Chaos
收藏 引用
China Communications 2020年 第5期17卷 29-37页
作者: Bin Lu Xin Ge Fenlin Liu Zhengzhou Information Science and Technology Institute Zhengzhou 45000China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 45000China
A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data tran... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The DBlock family of block ciphers
收藏 引用
Science China(Information Sciences) 2015年 第3期58卷 91-104页
作者: WU WenLing ZHANG Lei YU XiaoLi Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences
In this paper,we propose a new family of block ciphers named *** consists of three variants which are specified as DBlock-128,DBlock-192,and DBlock-256,***-n has the equal n-bit block length and key *** structure of D... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New observation on the key schedule of RECTANGLE
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 106-118页
作者: Hailun YAN Yiyuan LUO Mo CHEN Xuejia LAI Department of Computer Science and Engineering Shanghai Jiao Tong University School of Electronics and Information Shanghai Dianji University
We evaluate the security of RECTANGLE from the perspective of actual key information(AKI).Insufficient AKI permits the attackers to deduce some subkey bits from some other subkey bits, thereby lowering the overall att... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论