Hu Yiping, Feng Dengguo. CRYPTANALYSIS ON MULTI-OUTPUT FEEDFORWARD NETWORK SYSTEM[J]. Journal of Electronics & Information Technology, 1998, 20(6): 787-793.
Citation:
Hu Yiping, Feng Dengguo. CRYPTANALYSIS ON MULTI-OUTPUT FEEDFORWARD NETWORK SYSTEM[J]. Journal of Electronics & Information Technology, 1998, 20(6): 787-793.
Hu Yiping, Feng Dengguo. CRYPTANALYSIS ON MULTI-OUTPUT FEEDFORWARD NETWORK SYSTEM[J]. Journal of Electronics & Information Technology, 1998, 20(6): 787-793.
Citation:
Hu Yiping, Feng Dengguo. CRYPTANALYSIS ON MULTI-OUTPUT FEEDFORWARD NETWORK SYSTEM[J]. Journal of Electronics & Information Technology, 1998, 20(6): 787-793.
An algorithm analysing multi-output feedforward network system is discussed in this paper, the basic idea of the algorithm is to collect and utilize information leak of input information at multiple output ends. As an application, a class of important multi-output feedforward network-multi-output Bent functions is analysed by using the algorithm, and the algorithm is illustrated with a concrete example.
Siegenthaler T. Crytanalysis representation of nonlinearly filtered ML-sequences.[J].Advances in Cryptology-Eurocrypt85, LNCS 219. Berlin: spring-Verlag.1986,:-[2]Meier W.[J].Staffelbach O. Fast correlation attacks on stream ciphers, Advances in Cryptology-Eurocrypt88, LNCS 330, Berlin: Springer-Verlag.1989,:-[3]ForreR. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences.[J].Advances in cryptology-Eurocrypt89, LNCS434, Berlin: Springer-Verlag.1990,:-[4]Nyberg K. Perfect nonlinear S-boxes.[J].Advances in Cryptology-Eurocrypt91, LNCS547, Berlin: Springer-Verlag.1991,:-[5]曾肯成.密码体制中的熵漏现象.北京:中国科技大学研究生院(学术报告).1987.