期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Linear Span of a Class of Optimal Frequency Hopping Sequences 被引量:1
1
作者 高军涛 胡予濮 李雪莲 《China Communications》 SCIE CSCD 2011年第2期147-151,共5页
For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that... For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that the linear span is very small compared with their periods. To improve the linear span,we transform these optimal frequency hopping sequences into new optimal frequency hopping sequences with large linear span by using a general type of permutation polynomials over a finite field. Furthermore,we give the exact values of the linear span of the transformed optimal frequency hopping sequences. 展开更多
关键词 frequency hopping sequences linear span permutation polynomials optimal sets
在线阅读 下载PDF
A New Method for Meet-in-the-Middle Attacks on Reduced AES 被引量:3
2
作者 董晓丽 胡予濮 +1 位作者 韦永壮 陈杰 《China Communications》 SCIE CSCD 2011年第2期21-25,共5页
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ... A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at FSE2008.We reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192. 展开更多
关键词 AES RIJNDAEL CRYPTANALYSIS meet-in-the-middle attack
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部