共查询到20条相似文献,搜索用时 15 毫秒
1.
一类广义Bent型S-Box的构造 总被引:1,自引:0,他引:1
王章雄 《数学的实践与认识》2002,32(6):999-1002
S-box是密码理论与实践中十分重要的一种装置 ,它的密码性能由其分量函数所决定 .于是 ,选择适当的分量函数来构造 S-box就成了一个重要的研究课题 .在一定意义上 ,Bent函数是最优良的密码函数 .本文通过函数序列半群和置换群来构造其任何非零线性组合为 Bent函数与线性函数之和的函数组 ,从而可由 Bent函数构造出具有高度非线性度和其他良好性状的 S-box 相似文献
2.
We provide two new construction methods for nonlinear resilient S-boxes with given degree. The first method is based on the use of linear error correcting codes together with highly nonlinear S-boxes. Given a [u, m, t + 1] linear code where u = n?d?1, d > m, we show that it is possible to construct (n, m, t, d) resilient S-boxes which have currently best known nonlinearity. Our second construction provides highly nonlinear (n, m, t, d) resilient S-boxes which do not have linear structure, then an improved version of this construction is given. 相似文献
3.
In ℝ
m
×ℝ
n−m
, endowed with coordinates x=(x′,x″), we consider bounded solutions of the PDE
We prove a geometric inequality, from which a symmetry result follows.
相似文献
4.
《Chaos, solitons, and fractals》2005,23(2):413-419
A method for obtaining cryptographically strong 8 × 8 S-boxes based on chaotic maps is presented and the cryptographical properties such as bijection, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution of these S-boxes are analyzed in detail. The results of numerical analysis also show that the S-boxes proposed are of the above properties and can resist the differential attack. Furthermore, our approach is suitable for practical application in designing cryptosystem. 相似文献
5.
Yong Wang Kwok-Wo Wong Xiaofeng Liao Tao Xiang 《Communications in Nonlinear Science & Numerical Simulation》2009,14(7):3089-3099
In this paper, a block encryption scheme based on dynamic substitution boxes (S-boxes) is proposed. Firstly, the difference trait of the tent map is analyzed. Then, a method for generating S-boxes based on iterating the tent map is presented. The plaintexts are divided into blocks and encrypted with different S-boxes. The cipher blocks are obtained by 32 rounds of substitution and left cyclic shift. To improve the security of the cryptosystem, a cipher feedback is used to change the state value of the tent map, which makes the S-boxes relate to the plaintext and enhances the confusion and diffusion properties of the cryptosystem. Since dynamic S-boxes are used in the encryption, the cryptosystem does not suffer from the problem of fixed structure block ciphers. Theoretical and experimental results indicate that the cryptosystem has high security and is suitable for secure communications. 相似文献
6.
In this paper we study the existence of nontrivial solutions for the following system of coupled semilinear Poisson equations:
where is a bounded domain in
We assume that
and the function f is superlinear and with no growth restriction (for example f(s) = s es); then the system has a nontrivial (strong) solution. 相似文献
7.
Stanislav I. Pohozaev 《Milan Journal of Mathematics》2009,77(1):127-150
This paper focuses on the role of critical nonlinearities within the framework of global solvability of nonlinear PDE’s. In
particular, we present some new approach to blow-up issues for nonlinear problems. 相似文献
8.
Peter Roelse 《Designs, Codes and Cryptography》2007,42(1):21-42
This paper presents an iterative construction method for building composite permutations. Its efficiency is based on the concepts of pre-computation and equivalence classes. Equivalence class representatives of permutations on four bits are pre-computed. These class representatives can serve as input to the construction method, however, the results are also of independent interest for applications in cryptography. A well-known example of a cryptosystem using composite permutations for its Substitution boxes (S-boxes) is the Data Encryption Standard (DES). Throughout the paper, DES-like S-boxes are defined as mappings satisfying all design criteria as disclosed by one of the designers of DES. All permutations on four bits with DES-like properties are identified. Starting with pre-computed representatives of classes with such permutations, two iterations of a specialized version of the algorithm are applied to obtain bounds on the minimum differential uniformity and minimum non-linear uniformity of DES-like S-boxes. It is established that the two values cannot be less than eight, and that DES-like S-boxes for which the values are both equal to 12 do exist. In addition, if the non-linear uniformity of each of the four permutations in a DES-like S-box is at most six, as in all DES S-boxes, then its non-linear uniformity cannot be less than ten and its minimum differential uniformity equals 12. 相似文献
9.
A method for obtaining dynamically cryptographically strong substitution boxes (S-boxes) based on discretized chaotic map is presented in this paper. The cryptographical properties such as bijection, nonlinearity, strict avalanche, output bits independence and equiprobable input/output XOR distribution of these S-boxes are analyzed in detail. The results of numerical analysis show that all the criteria for designing good S-box can be met approximately. As a result, our approach is suitable for practical application in designing block cryptosystem. 相似文献
10.
Antonella Fiacca Nikolas Matzakos S. Papageorgiou Raffaella Servadei 《Czechoslovak Mathematical Journal》2003,53(1):135-159
In this paper we study nonlinear elliptic boundary value problems with monotone and nonmonotone multivalued nonlinearities. First we consider the case of monotone nonlinearities. In the first result we assume that the multivalued nonlinearity is de_ned on all
. Assuming the existence of an upper and of a lower solution, we prove the existence of a solution between them. Also for a special version of the problem, we prove the existence of extremal solutions in the order interval formed by the upper and lower solutions. Then we drop the requirement that the monotone nonlinearity is defined on all of
. This case is important because it covers variational inequalities. Using the theory of operators of monotone type we show that the problem has a solution. Finally, in the last part we consider an eigenvalue problem with a nonmonotone multivalued nonlinearity. Using the critical point theory for nonsmooth locally Lipschitz functionals we prove the existence of at least two nontrivial solutions (multiplicity theorem). 相似文献
11.
Magdi S. Mahmoud 《Journal of Optimization Theory and Applications》2012,152(3):786-798
An efficient state-estimation scheme is developed within the LMI framework for robust decentralized state estimation of systems composed of linear dynamic subsystems coupled by static nonlinear interconnections satisfying quadratic constraints. The procedure utilizes a general linear estimator structure, and consists of two steps, the first giving a block-diagonal Lyapunov matrix together with the robustness degree, and the second determining the filter parameters. Extension to the case of additive filter gain perturbations is established and numerical examples are provided to illustrate the applicability of the method. 相似文献
12.
13.
14.
《Chaos, solitons, and fractals》2007,31(3):571-579
Tang et al. proposed a novel method for obtaining S-boxes based on the well-known two-dimensional chaotic Baker map. Unfortunately, some mistakes exist in their paper. The faults are corrected first in this paper and then an extended method is put forward for acquiring cryptographically strong S-boxes. The new scheme employs a three-dimensional chaotic Baker map, which has more intensive chaotic characters than the two-dimensional one. In addition, the cryptographic properties such as the bijective property, the nonlinearity, the strict avalanche criterion, the output bits independence criterion and the equiprobable input/output XOR distribution are analyzed in detail for our S-box and revised Tang et al.’s one, respectively. The results of numerical analysis show that both of the two boxes can resist several attacks effectively and the three-dimensional chaotic map, a stronger sense in chaotic characters, can perform more smartly and more efficiently in designing S-boxes. 相似文献
15.
16.
This work is devoted to studying a quasilinear elliptic boundary
value problem with superlinear nonlinearities in a weighted Sobolev
space in a domain of $\mathbb{R}^{N}$. Based on the Galerkin method,
Brouwer's theorem and the weighted compact Sobolev-type embedding
theorem, a new result about the existence of solutions is revealed
to the problem. 相似文献
17.
Mathematical Notes - In this work, we investigate the following fractional $$p$$ -Laplacian equation involving a concave-convex nonlinearities as follows, $${rm (P_lambda)} begin{cases}... 相似文献
18.
研究了带跳跃非线性项的p-Laplacian方程结点解的存在性.如果该问题的非线性项跨越其对应齐次问题的Fucik谱,我们证明了该问题至少存在一个结点解. 相似文献
19.
Zai-hong WangDepartment of Mathematics Capital Normal University Beijing China 《应用数学学报(英文版)》2002,18(3):513-522
We provide sufficient conditions for the existence and multiplicity of subharrnonic solutions for Duffing's equations with jumping nonlinearities. 相似文献
20.
Mathematical Notes - For elliptic systems with discontinuous nonlinearities, we study the existence of strong solutions whose values are points of continuity with respect to the state variables for... 相似文献