首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
  国内免费   1篇
力学   4篇
数学   2篇
  2021年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2007年   1篇
  1994年   1篇
排序方式: 共有6条查询结果,搜索用时 0 毫秒
1
1.
Zhang  Xiaoyang  Yu  Simin  Chen  Ping    Jinhu  He  Jianbin  Lin  Zhuosheng 《Nonlinear dynamics》2017,89(3):1949-1965
Nonlinear Dynamics - In this paper, a novel video chaotic secure communication scheme and its ARM-embedded hardware implementation are investigated, based on the H.264 selective encryption and...  相似文献   
2.
3.
4.
L~p空间的另一组特征不等式   总被引:1,自引:0,他引:1  
徐宗本  张茁生 《数学学报》1994,37(4):433-439
对应于文[1]所建立的Lp空间的二次特征不等式,本文建立了Lp,空间的p次特征不等式,该不等式将Hilbert空间平行四边形律和极化等式推广到了Lp(1< p< ∞) Banach空间.  相似文献   
5.
  Zhuosheng  Liu  Meiru  Duan  Lixia 《Nonlinear dynamics》2021,103(1):897-912
Nonlinear Dynamics - A special class of neurons within the brainstem pre-Bötzinger complex (pre-BötC) may perform diversified electrical actions, which are closely related to the...  相似文献   
6.
In this paper, the security performance analysis for a self-synchronization and closed-loop feedback-based chaotic stream cipher is given. According to the chosen-ciphertext attack method, it is found that under the condition of selecting the ciphertext as fixed value, the original chaotic iterative equation is degenerated into an asymptotically stable iterative one, so that the explicit function of state variables and key parameters can be obtained. Based on this idea, and according to the chosen-ciphertext attack method, a single key decipher algorithm is further investigated. Firstly, multiple pairs of plaintext–ciphertext are obtained by choosing the corresponding multiple frames of ciphertext as fixed values. Secondly, a set of possible estimated values for this single key is acquired by utilizing among one pair of plaintext–ciphertext. Finally, the only estimated value that satisfies all the conditions of multiple pairs of plaintext–ciphertext is determined, as an estimated value from the set of all possible estimated values. Security performance analysis results have shown that, under the condition that only one unknown key needs to be deciphered while the remaining keys are all known, the proposed algorithm can, respectively, decipher each individual key accurately. In addition, the attack complexity of the proposed method is lower than that of the exhaustive attack.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号