logoxgvb
Joined: 30 Aug 2010 Posts: 1580
Read: 0 topics
Warns: 0/5 Location: hdfttv
|
Posted: Sat 20:41, 04 Dec 2010 Post subject: ugg prezzo A new class FEISTEL password scheme _61 |
|
|
A new class FEISTEL password scheme
Hardware costs. However,[link widoczny dla zalogowanych], the realization of the specific point of view,[link widoczny dla zalogowanych], the details can make some adjustments. For example, in the production of key aspects, using a linear shift register can also be used non-linear shift register, according to the actual needs. The program can better resist differential analysis and linear attacks, with a characteristic of a secret algorithm, the security is strong, can serve as an effective encryption scheme. References: [I [2 [3 [4] [5] [6] [7] [8] [9] ElO3El13E123E13] Huan-Guo Zhang, Liu Yuzhen. Cryptography Introduction EM]. Wuhan: Wuhan University Press, 2003. SCHNEIERB. Applied Cryptography EM-1. Wu Shizhong, Zhu Shixiong, Zhang Wenzheng, translated. Beijing: Mechanical Industry Press, 2000. KRISHNASN, RAMAR. BreakingDESusingPsystemsEJ3. TheoreticalComputerScience, 2003,299 (1) :495 - 508. DIFFIEW, HELLMANME. NewdirectionsincryptographyEJ]. IEEETrans. onInformationTheory, 1976, IT-22 (6) :644-654. FLOREAAF, MATULADW, THORNTONMA. Addition-basedexponentiationmodulo2rJ]. ElectronicsLetters20th, 2005,41 (2) :56-57. NEDJAHN, MOURELLELDM. FourhardwareimplementationsfortheM-arymodularexponentiation [c] / / ITNG2006, Nevada: IEEEComputerSociety, 2006. CHANGCC, LOUDC. Fastparallelcomputationofmulti-exponentiationforpublickeycryptosystems [c] / / ProceedingsofInternationalConferenceonParallelandDistributedComputing, ApplicationsandTechnolo-gies (PDCAT). Chengdu, China, 2003. MEYERH. AbstractsofarticlesandrecentliteratureEJ]. Computers & Security ,1999,18:149-154. COURTOISN. ThebestdifferentialcharacteristicsandsubtletiesoftheBiham-shamirAttacksonDES [-DB/OL]. [link widoczny dla zalogowanych] iacr. org ,1005-02-02 / 2006-12-01. COURTOISN. FeistelSchemesandBi-LinearCryptanalysis [-DB/OL]. [link widoczny dla zalogowanych] iacr. Org, / 2005.2004-08-15/2006-12-01. BIHAME, BIRYUKOVA. HowtOstrengthenDESusingexistinghardware [c] / / AdvancesinCryptology,[link widoczny dla zalogowanych], LectureNotesinComputerScience917,[link widoczny dla zalogowanych], proceedingsofASIACRYPT94, Wollongong, 1995. NISTFIPS197-2001, AdvancedEncryptionStandard (AES) Is]. COPPD. Cryptography [J]. IBMJ. Res. Development, 2000,[link widoczny dla zalogowanych],44 (1) :246 - 250.
相关的主题文章:
[link widoczny dla zalogowanych]
[link widoczny dla zalogowanych]
[link widoczny dla zalogowanych]
The post has been approved 0 times
|
|