排序方式: 共有84条查询结果,搜索用时 0 毫秒
81.
The nonlinear congruential method is an attractive alternative to the classical linear congruential method for pseudorandom number generation. We give new bounds of exponential sums with sequences of iterations of Rédei functions over prime finite fields, which are much stronger than bounds known for general nonlinear congruential pseudorandom number generators. 相似文献
82.
We construct two families of authentication schemes using highly nonlinear functions on finite fields of characteristic 2.
This leads to improvements on an earlier construction by Ding and Niederreiter if one chooses, for instance, an almost bent
function as the highly nonlinear function. 相似文献
83.
A novel image encryption method based on total shuffling scheme 总被引:4,自引:0,他引:4
Guoji Zhang 《Optics Communications》2011,284(12):2775-37
In this paper, a novel image encryption method based on skew tent chaotic map and permutation-diffusion architecture is proposed. In the proposed method, the P-box is chosen as the same size of plain-image, which shuffles the positions of pixels totally. The keystream generated by skew tent chaotic map is related to the plain-image. Statistical analysis, information entropy analysis, and sensitivity analysis to plaintext and key on the proposed scheme are provided in this paper. It can be seen that this algorithm is efficient and reliable, with high potential to be adopted for network security and secure communications. 相似文献
84.
《Journal of the Egyptian Mathematical Society》2014,22(3):365-372
In this paper, designing an appropriate linear and nonlinear feedback control, the two identical integer order chaotic systems are synchronized by analytically and numerically. It has been realizing that, synchronization using linear feedback control method is efficient than nonlinear feedback control method due to the less computational complexity and the synchronization error. ElGamal public key cryptosystem is described through the proposed Diffie–Hellman key exchange protocol based on the synchronized chaotic systems using linear feedback control and their security are analyzed. The numerical simulations are given to validate the correctness of the proposed synchronization of chaotic systems and the ElGamal cryptosystem. 相似文献