您要查找的是不是:
- This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough, which is based on digital Piecewise Linear Chaotic Maps (PLCM). 该文指出一类基于数字化逐段线性混沌映射的混沌流密码方案是不够安全的。
- This paper presents a kind of novel Lissajous chaotic stream ciphers based on the analysis of the random number in network security authentication cryptography. 在网络安全认证加密中的随机数的基础上,提出了一类新型的李沙育混沌流密码。
- This paper analyzes the chaotic stream cipher proposed in "Chaos-based secure communication in a large community", it finds that the frontal values of the encryption sequence of the stream cipher are not sensitive to the least significant bits of the key. 对Wang Shihong的“Chaos-based secure communication in a large community”一文提出的混沌序列密码算法进行了分析,发现该加密算法产生的加密乱数序列的前若干值对密钥低位比特的变化不敏感。
- CRYPTANALYSIS OF A CLASS OF CHAOTIC STREAM CIPHERS 一类混沌流密码的分析
- Analysis and Design of Lissajous Chaotic Stream Ciphers 李沙育混沌流密码的分析与设计
- Electronic chart encryption method based on chaotic stream cipher 基于混沌流密码体制的电子海图数据加密方法
- One Chaotic Stream Cipher System Based on Nonlinear Coupled Feedback 一种基于非线性耦合反馈的混沌流密码体制
- A multidimensional chaotic stream cipher design based on parameters switching 一种基于参数切换的高维混沌流密码设计
- Experimental Study of Different Parameters on Chaotic Stream Ciphers for Information Encryption 信息加密的混沌流密码受参数变化影响的实验研究
- chaotic stream ciphers 混沌流密码
- Again, the result is similar to a stream cipher. 同样,结果类似于流加密。
- Keywords Chaos;Information Security;Cryptography;Cryptanalysis;Chaotic stream Cipher; 混沌;信息安全;密码学;密码分析;混沌序列密码;
- Block ciphers with long keys are stronger than stream ciphers. 使用长密钥的块密码比流密码更强。
- The stream cipher mode encodes data one bit at a time. 流密码模式一次一位对数据进行编码。
- Therefor, the new stream cipher can be applied to Network Security. 该密码系统能构被应用于网络安全等领域。
- Chaos Stream Cipher Algorithm of Mathematical Formulae and Chemical Reaction Equations 数学公式和化学反应式的混沌序列加密算法
- In 2005, Andreas Klein presented another analysis of the RC4 stream cipher. 在2005年,安德烈克莱因提出了另一种分析的RC4流密码。
- However, block cipher algorithms tend to execute more slowly than stream ciphers. 但是,块密码算法执行起来通常比流密码慢。
- The construction of feedforward network against attacks in stream ciphers isstudied in this paper. 研究了流密码体制中抗攻击前馈网络的构造。
- They are often constructed from other primitives, such as block ciphers, unkeyed-hash functions or stream ciphers. 当密码学依靠数学上的难解问题时,常常用在非对称密码学中,一些算法如因式分解就是潜在的攻击手段。