>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Galois相关记录74条 . 查询时间(0.375 秒)
We consider the Kisin variety associated to a $n$-dimensional absolutely irreducible mod $p$ Galois representation $\bar\rho$ of a $p$-adic field $K$ and a cocharacter $\mu$. Kisin conjectured that th...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPDZ2kZ2k that allows for secure multiparty computation (MPC) in the dishonest majority setting over the ring of integer...
Security of Multilinear Galois Mode (MGM)     AEAD  privacy  integrity       2019/2/27
In this paper we analyze the new AEAD mode called the Multilinear Galois Mode (MGM) originally proposed in CTCrypt 2017. This mode is currently considered in the Russian Standardization system as the ...
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the ma...
Irreducible Polynomials (IPs) have been of utmost importance in generation of substitution boxes in modern cryptographic ciphers. In this paper an algorithm entitled Composite Algorithm using both mul...
Here we continue investigation of linear complexity properties of different ways to generate pseudo-random sequences over Galois field wich essentially involves linear recurrences over Galois ring a...
We analyze the notion of indiscernibility in the light of the Galois theory of field extensions and the generalization to K-algebras proposed by Grothendieck. Grothendieck's reformulation of Galois th...
In this work we provide low rank estimations for coordinate sequences of linear recurrent sequences (LRS) of maximal period (MP) over Galois ring R=GR(pn,r), p≥5, r≥2, with numbers s such that s=kr+2,...
We explore further the hardness of the RLWE problem for various number rings, construct a new family of vulnerable Galois number fields, give improved attacks for certain rings satisfying some additio...
Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construct new class of bent...
GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers. In this paper we suggest several novel improvements to Fergusons’s authenti...
A new systematic authentication scheme based on the Gray map over Galois rings is introduced. The Gray map determines an isometry between the Galois ring and a vector space over a Galois field. The ...
In earlier eighties of XX century A.A.Nechaev has obtained the criterion of full period of a Galois polynomial over primary residue ring modulo power of 2. Also he has obtained necessary conditions of...
We investigate a well-known way to construct pseudo-random sequences by separation p-adic coordinate sequences of linear recurrences over Galois ring. Commonly it is necessary to know rank estimatio...
Guess-and-determine attacks are based on guessing a subset of internal state bits and subsequently using these guesses together with the cipher’s output function to determine the value of the remain...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...