首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   6篇
  国内免费   1篇
数学   2篇
物理学   9篇
无线电   1篇
  2013年   3篇
  2011年   1篇
  2010年   1篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
排序方式: 共有12条查询结果,搜索用时 437 毫秒
1.
一类改进的混沌迭代加密算法   总被引:3,自引:0,他引:3       下载免费PDF全文
指出了最近提出的一类混沌迭代分组密码算法的缺陷,通过选择明文攻击可以恢复出置换后的明文.算法中二进制序列的产生只依赖于密钥,而与明文无关,从而使算法容易造成信息泄露并遭受攻击.基于此,给出了一种可以抵御选择明文攻击的安全性更高的算法. 关键词: 混沌 混沌密码 攻击 安全性  相似文献   
2.
徐淑奖  陈秀波  钮心忻  杨义光 《中国物理 B》2013,22(6):60307-060307
Quantum steganography that utilizes quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.  相似文献   
3.
借助于计算机符号计算系统Maple,用Weiss,Tabor和Carnevale等人提出的WTC方法首次验证非线性弦振动方程具有Painlevé性质,并得到非线性弦振动方程的Bcklund变换,用Hirota直接方法分析非线性弦振动方程孤子解的聚变现象.  相似文献   
4.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.  相似文献   
5.
徐淑奖  王继志  杨素香 《中国物理 B》2008,17(11):4027-4032
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.  相似文献   
6.
姜璐  郭玉翠  徐淑奖 《中国物理》2007,16(9):2514-2522
Some new exact solutions of the Burgers--Fisher equation and generalized Burgers--Fisher equation have been obtained by using the first integral method. These solutions include exponential function solutions, singular solitary wave solutions and some more complex solutions whose figures are given in the article. The result shows that the first integral method is one of the most effective approaches to obtain the solutions of the nonlinear partial differential equations.  相似文献   
7.
分析了一种基于循环移位操作和XOR运算的混沌加密算法,并指出该类算法在增强选择明文攻击安全性的同时,严重降低了加密算法对误码的稳健性,从而限制了该类算法的广泛应用。通过相关算法的描述与比较,提出了一种可以有效抵抗误码的改进算法。  相似文献   
8.
本文研究一类描述在顺流方向上存在可变剪切流动的长波的变系数Boussinesq方程: utt {αuxxx [β f(x)]ux ωuux g(x)u}x=0的Plainleve性质及相似解,其中f(x)和g(x)是两个实函数.通过对方程进行标准的WTS检验,得到了方程可积的必要条件,即方程具有Painleve性质的条件;应用CK直接方法对方程进行了相似约化,得到了原方程的五组相似变换和相似解;用这些相似解可进一步求得方程的精确解析解.  相似文献   
9.
运用首次积分法并借助计算机符号计算系统Mathematica得到了一类非线性反应扩散方程u_t-u_(xx) au βu~2 γu~3=0的精确解,其中既包括已知的类孤立波解,又有新的精确解.  相似文献   
10.
指出了最近提出的一类混沌迭代分组密码算法的缺陷,通过选择明文攻击可以恢复出置换后的明文.算法中二进制序列的产生只依赖于密钥,而与明文无关,从而使算法容易造成信息泄露并遭受攻击.基于此,给出了一种可以抵御选择明文攻击的安全性更高的算法.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号