排序方式: 共有9条查询结果,搜索用时 13 毫秒
1
1.
Security analysis of a multiple pseudorandom-bit generator based on a spatiotemporal chaotic map 下载免费PDF全文
<正>In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model.Utilizing the error function attack,the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated.We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key,and analyse the key sensitivity and statistical properties of the system. 相似文献
2.
An S-box modified one-way coupled map lattice is applied as a chaotic cryptograph. The security of the system is evaluated from various attacks currently used, including those based on error function analysis, statistical property analysis, and known-plaintext and chosen-ciphertext analytical computations. It is found that none of the above attacks can be better than the brute force attack of which the cost is exhaustively quantitated by the key number in the key space. Also, the system has fairly fast encryption (decryption) speed, and has extremely long period for finite-precision computer realization of chaos. It is thus argued that this chaotic cryptosystem can be a hopeful candidate for realistic service of secure communications. 相似文献
3.
Inferring interactions of time-delayed dynamic networks by random state variable resetting 下载免费PDF全文
Changbao Deng 《中国物理 B》2022,31(3):30502-030502
Time delays exist widely in real systems, and time-delayed interactions can result in abundant dynamic behaviors and functions in dynamic networks. Inferring the time delays and interactions is challenging due to systematic nonlinearity, noises, a lack of information, and so on. Recently, Shi et al. proposed a random state variable resetting method to detect the interactions in a continuous-time dynamic network. By arbitrarily resetting the state variable of a driving node, the equivalent coupling functions of the driving node to any response node in the network can be reconstructed. In this paper, we introduce this method in time-delayed dynamic networks. To infer actual time delays, the nearest neighbor correlation (NNC) function for a given time delay is defined. The significant increments of NNC originate from the delayed effect. Based on the increments, the time delays can be reconstructed and the reconstruction errors depend on the sampling time interval. After time delays are accurately identified, the equivalent coupling functions can also be reconstructed. The numerical results have fully verified the validity of the theoretical analysis. 相似文献
4.
5.
6.
7.
MECHANISM OF HOT ELECTRON GENERATION AND STIMULATED RAMAN SCATTERING IN LASER CAVITY TARGET PLASMA 下载免费PDF全文
Stimulated Raman Scattering (SRS) and X-ray spectrum emitted from many kinds of targets were experimentally investigated on the Nd:glass laser facility Shenguang-I in Shanghai, China. By theoretical analysis and computer simulation for these experiments, the result showed that the mechanism of hot electron generation in laser cavity target was mainly SRS, according to detailed comparison between the cavity target and the plane target. Other results, such as the energy fraction and temperatures of hot electron, energy and angular distribution and wave spectrum in SRS, were also presented in detail. 相似文献
8.
9.
The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. 相似文献
1