logoxgvb |
Posted: Sat 20:41, 04 Dec 2010 Post subject: ugg prezzo A new class FEISTEL password scheme _61 |
|
A new class FEISTEL password scheme
Hardware costs. However,ugg prezzo, the realization of the specific point of view,tory burch, the details can make some adjustments. For example, in the production of key aspects, using a linear shift register can also be used non-linear shift register, according to the actual needs. The program can better resist differential analysis and linear attacks, with a characteristic of a secret algorithm, the security is strong, can serve as an effective encryption scheme. References: [I [2 [3 [4] [5] [6] [7] [8] [9] ElO3El13E123E13] Huan-Guo Zhang, Liu Yuzhen. Cryptography Introduction EM]. Wuhan: Wuhan University Press, 2003. SCHNEIERB. Applied Cryptography EM-1. Wu Shizhong, Zhu Shixiong, Zhang Wenzheng, translated. Beijing: Mechanical Industry Press, 2000. KRISHNASN, RAMAR. BreakingDESusingPsystemsEJ3. TheoreticalComputerScience, 2003,299 (1) :495 - 508. DIFFIEW, HELLMANME. NewdirectionsincryptographyEJ]. IEEETrans. onInformationTheory, 1976, IT-22 (6) :644-654. FLOREAAF, MATULADW, THORNTONMA. Addition-basedexponentiationmodulo2rJ]. ElectronicsLetters20th, 2005,41 (2) :56-57. NEDJAHN, MOURELLELDM. FourhardwareimplementationsfortheM-arymodularexponentiation [c] / / ITNG2006, Nevada: IEEEComputerSociety, 2006. CHANGCC, LOUDC. Fastparallelcomputationofmulti-exponentiationforpublickeycryptosystems [c] / / ProceedingsofInternationalConferenceonParallelandDistributedComputing, ApplicationsandTechnolo-gies (PDCAT). Chengdu, China, 2003. MEYERH. AbstractsofarticlesandrecentliteratureEJ]. Computers & Security ,1999,18:149-154. COURTOISN. ThebestdifferentialcharacteristicsandsubtletiesoftheBiham-shamirAttacksonDES [-DB/OL]. http://eprint. iacr. org ,1005-02-02 / 2006-12-01. COURTOISN. FeistelSchemesandBi-LinearCryptanalysis [-DB/OL]. http://eprint. iacr. Org, / 2005.2004-08-15/2006-12-01. BIHAME, BIRYUKOVA. HowtOstrengthenDESusingexistinghardware [c] / / AdvancesinCryptology,tory burch shoes, LectureNotesinComputerScience917,ugg boots billig, proceedingsofASIACRYPT94, Wollongong, 1995. NISTFIPS197-2001, AdvancedEncryptionStandard (AES) Is]. COPPD. Cryptography [J]. IBMJ. Res. Development, 2000,true religion jeans,44 (1) :246 - 250.
相关的主题文章:
ugg italia Segmentation inhibition of enzymatic br
ugg prezzo A hybrid optimization strategy in order
ugg italia HIV-1 core protein Gag co-expression of |
|