CSpace

浏览/检索结果: 共8条,第1-8条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
On the Derivative Imbalance and Ambiguity of Functions 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 卷号: 65, 期号: 9, 页码: 5833-5845
作者:  Fu, Shihui;  Feng, Xiutao;  Wang, Qiang;  Carlet, Claude
收藏  |  浏览/下载:163/0  |  提交时间:2020/01/10
Ambiguity  derivative imbalance  differential uniformity  Fourier transform  nonlinearity  
A recursive construction of permutation polynomials over F-q2 with odd characteristic related to Redei functions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 7, 页码: 1481-1498
作者:  Fu, Shihui;  Feng, Xiutao;  Lin, Dongdai;  Wang, Qiang
收藏  |  浏览/下载:142/0  |  提交时间:2020/01/10
Finite fields  Permutation polynomials  Compositional inverse  Redei functions  Dickson polynomials  
Further results on complete permutation monomials over finite fields 期刊论文
FINITE FIELDS AND THEIR APPLICATIONS, 2019, 卷号: 57, 页码: 47-59
作者:  Feng, Xiutao;  Lin, Dongdai;  Wang, Liping;  Wang, Qiang
收藏  |  浏览/下载:161/0  |  提交时间:2020/01/10
Finite fields  Permutation polynomials  Complete permutation polynomials  Monomials  
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
作者:  Fu, Shihui;  Feng, Xiutao
收藏  |  浏览/下载:148/0  |  提交时间:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
Fault Attack on ACORN v3 期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:144/0  |  提交时间:2018/09/08
CAESAR  authenticated cipher  stream cipher  ACORN  fault attack  
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme 期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:  Lin, Zhuosheng;  Yu, Simin;  Feng, Xiutao;  Lu, Jinhu
收藏  |  浏览/下载:124/0  |  提交时间:2019/12/13
Chaotic stream cipher  divide-and-conquer attack  chosen-ciphertext attack  improved chaotic encryption algorithm  
Fault Attack on the Authenticated Cipher ACORN v2 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2017, 页码: 16
作者:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:92/0  |  提交时间:2018/07/30
On algebraic immunity of trace inverse functions on finite fields of characteristic two 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2016, 卷号: 29, 期号: 1, 页码: 272-288
作者:  Feng Xiutao;  Gong Guang
收藏  |  浏览/下载:120/0  |  提交时间:2018/07/30
Algebraic immunity  boolean functions  fast algebraic attacks  trace inverse functions