Advanced Search
Volume 29 Issue 1
Jan.  2011
Turn off MathJax
Article Contents
Zheng Hao-ran, Jin Chen-hui, Shi Jian-hong. Analysis of a Kind of Balance Feedforward Sequences[J]. Journal of Electronics & Information Technology, 2007, 29(1): 193-196. doi: 10.3724/SP.J.1146.2005.00486
Citation: Zheng Hao-ran, Jin Chen-hui, Shi Jian-hong. Analysis of a Kind of Balance Feedforward Sequences[J]. Journal of Electronics & Information Technology, 2007, 29(1): 193-196. doi: 10.3724/SP.J.1146.2005.00486

Analysis of a Kind of Balance Feedforward Sequences

doi: 10.3724/SP.J.1146.2005.00486
  • Received Date: 2005-05-08
  • Rev Recd Date: 2005-12-22
  • Publish Date: 2007-01-19
  • This paper points out that the stream cipher model in construction and properties of balance feedforword sequences is a filter-combination model with generalized semi-Bent function as feedforward function, and analyses the stream cipher model simply.
  • loading
  • [1] Rothaus O S. On bent functions[J].J Combinatorial Theory (Ser. A.1976, 20:300-305 [2] Siegenthaler T. Correlation immunity of nonlinear combining function for cryptographic applications. IEEE Trans on IT, 1984, IT-30(5): 776-780. [3] Rueppel R A. Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986: 54-141. [4] Meier W and Staffelbach O. Fast correlation attacks on stream ciphers. Advances in Cryptology-Eurocrypt 88, Berlin: Springer-verlag, 1989: 301-314. [5] Forr.[J].e R. A fast correlation attack on nonlinearity feedforward filtered shift-register sequences. Advances in Cryptology-Eurocrypt89, Berlin: Springer-verlag.1990,:- [6] Carlet C. Partially-bent functions. Advances in Cryptology-Eurocrypt 92, Berlin: Springer-verlag,1993: 280-291. [7] 杨义先, 林须端. 编码密码学. 北京: 人民邮电出版社, 1992: 518-630. [8] 丁存生, 肖国镇. 流密码学及其应用. 北京: 国防工业出版社, 1994: 106-180. [9] Chee S.[J].Lee S and Kim K. Semi-bent functions. Advances in Cryptology-Asiacrypt 94, Springer-verlag.1995,:- [10] 胡一平. 谱绝对值均匀的前馈流密码的线性复杂度的稳定性研究. 应用数学学报, 1998, 21(2): 288-294. [11] 温巧燕, 钮心忻, 杨义先. 现代密码学中的布尔函数. 北京: 科学出版社, 2000:183-245. [12] 李世取, 曾本胜, 廉玉忠, 等. 密码学中的逻辑函数. 北京: 北京中软电子出版社, 2003: 113-193. [13] 孙林红, 叶顶峰, 吕述望, 冯登国. 序列密码的复合攻击法[J].电子与信息学报.2004, 26(1):72-76浏览 [14] 金君娥,李超,吴翊. 前馈网络的信息泄漏与收集. 通信学报, 2004, 25(6): 69-75. Jin Jun-e, Li Chao, and Wu Yi. Information leakage and collection of feedforword network. Journal on Communications, 2004, 25(6): 69-75. [15] 金君娥, 李超, 吴翊. 一类平衡前馈序列的构造与性质[J].电子与信息学报.2004, 26(9):1395-1400浏览
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3505) PDF downloads(881) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return