搜索结果: 1-14 共查到“军事学 cycle”相关记录14条 . 查询时间(0.109 秒)
In the area of distributed graph algorithms a number of network's entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortunately, an inherent ...
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
format-preserving encryption small-domain block ciphers Markov chains
2017/9/14
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in format-preserving encryption: domain targeting and domain completion. In domain targeting, where we ...
New construction of single-cycle T-function families
cryptography permutation function single cycle T-function
2016/12/15
The single cycle T-function is a particular permutation function with complex algebraic structures, maximum period and efficient implementation in software and hardware. In this paper, on the basis of...
Reverse Cycle Walking and Its Applications
format-preserving encryption small-domain block ciphers Markov chains
2016/12/9
We study the problem of constructing a block-cipher on a "possibly-strange" set SS using a block-cipher on a larger set TT. Such constructions are useful in format-preserving encryption, where for exa...
New construction of single cycle T-function families
single cycle T-function families secret-key cryptography
2016/7/20
The single cycle T-function is a particular permutation function with complex algebraic structures, maximum period and efficient implementation in software and hardware. In this paper, on the basis of...
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Any Cycle Length (Ring-)LWE
2016/2/23
Informally, a public-key encryption scheme is k-circular secure if a cycle of k encrypted secret keys
(Encpk1
(sk2), Encpk2
(sk3), . . . , Encpkk
(sk1)) is indistinguishable from encryptions of ze...
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
proof-of-work graph-theory large random graphs
2016/1/26
We introduce the first graph-theoretic proof-of-work system, based on finding small cycles or
other structures in large random graphs. Such problems are trivially verifiable and arbitrarily
scalable...
Recently, Kalikinkar Mandal and Guang Gong presented a family of nonlinear pseudorandom
number generators using Welch-Gong Transformations in their paper [6]. They also performed
the cycle decomposi...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
feedback shift register cycle structure symmetric group
2015/12/31
In this paper, we consider the cycle structures of feedback shift registers (FSRs).
At the beginning, the cycle structures of two special classes of FSRs, pure circulating
registers (PCRs) and pure ...
Single-Cycle Implementations of Block Ciphers
block ciphers lightweight cryptography single-cycle
2015/12/29
Security mechanisms to protect our systems and data from
malicious adversaries have become essential. Strong encryption algorithms
are an important building block of these solutions. However, each
...
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle
RC4 Non-randomness Pseudo-random Index
2015/12/22
In this very short note we prove that the pseudo-random index j of RC4 is indeed not
pseudo-random. This is a simple result that missed our attention for quite a long time. We
show that in long term...
The Single Cycle T-functions
T-functions
2012/3/23
In this paper the single cycle T-functions are studied. Making use of the explicit formulas of sum and product of 2-adic integers, we present the necessary and sufficient conditions on the generalized...
The number of initial states of the RC4 cipher with the same cycle structure
initial states RC4 cipher cycle structure
2009/4/7
RC4 cipher is the most widely used stream cipher in software applications. It was
designed by R. Rivest in 1987. In this paper we find the number of keys of the RC4 cipher
generating initial permuta...