stream cipher 中文意思是什麼

stream cipher 解釋
串流加密法
  • stream : n 1 河流,小河;川,溪。2 流出,流注;一連串,(人物等的)輩出。3 (事件等的)連續;(財富等的)...
  • cipher : n 1 零〈即0〉。2 數碼,阿拉伯數字。3 暗號,暗碼,密碼;密碼索引 (=cipher key)。4 (姓名首字母...
  1. Cipher feedback mode, a block cipher mode whereby it s implemented as a self - synchronizing stream cipher

    密碼反饋方式( cipher feedback mode ) ,作為自同步序列密碼實現的一種分組密碼方式。
  2. The stream cipher mode encodes data one bit at a time

    流密碼模式一次一位對數據進行編碼。
  3. How to designed stream cipher based on pca has been studied

    指出了如何利用pca技術構造序列密碼。
  4. A multidimensional chaotic stream cipher design based on parameters switching

    一種基於參數切換的高維混沌流密碼設計
  5. However, block cipher algorithms tend to execute more slowly than stream ciphers

    但是,塊密碼演算法執行起來通常比流密碼慢。
  6. Although it tends to execute more slowly than stream cipher, block cipher is more secure

    盡管塊密碼的執行速度慢于流密碼,但塊密碼更安全。
  7. A new non - linear stream cipher algorithm with ability of self synchronization is presented. this algorithm is also realized using verilog hdl and is simulated

    文章提出了一種帶有自同步功能的非線性流密碼加密演算法,並用verilog語言進行參數化的描述。
  8. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜合運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的密碼性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列密碼、分組密碼以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。
  9. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密碼標準。
  10. Word - oriented memorable logics in stream cipher design

    序列密碼設計中的整字帶記憶邏輯
  11. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該密鑰生成器生成的混沌序列密碼的密碼學特性良好。同時,本文還努力的尋求一種在有限精度條件下混沌加密的可實現方案,並利用混沌序列密碼對跳頻系統進行加密。
  12. In the paper, we construct the pseudorandom generator based on the hamilton array code and stream cipher after researching the theory of the hamilton array code and the technology of the encrypt. it can improve the ciphers " ability of resisting to many attacks if we use it to replace the key schedule algorithm of the ciphers

    本文在研究了hamilton陣列編碼的理論與加密技術后,構造了一個基於hamilton陣列編碼和序列密碼的偽隨機產生器,這個產生器用來替代分組密碼演算法的專用密鑰編排演算法,可以提高演算法的抗攻擊能力,從而實現了對稱密碼兩大領域的結合。
  13. Among the algorithmic design, the corresponding solution to the problems of transforming from the real sequence to binary sequence and precision in the chaotic stream cipher is put forward, and more efficient algorithm and better randomness of key sequence are obtained

    在演算法的設計中,我們對混沌序列密碼所面臨的實數序列到二進制序列的轉化和精度等問題採取了相應的解決方法,從而獲得較高的演算法執行效率和良好的密鑰序列隨機性。
  14. Logical cipher contactless ic card chip is the most current in the entire world and our country, so this design direction is it, and the algorithm of cipher adopt stream cipher corresponding and compatible with philips mifare card

    非接觸ic卡中邏輯加密型是目前世界和國內應用比較廣泛的,故本設計的方向選擇了非接觸邏輯加密型ic卡,加密演算法採用了和philips的mifare卡相兼容的流密碼加密演算法。
  15. A two - dimensional one - way coupled map lattice is proposed for cryptography of self - synchronizing stream cipher, which n ^ 2 space units produce chaotic stream outputs in parallel

    摘要提出了由單向二維耦合的映象格點組成新的時空混沌自同步流密碼系統,它能夠產生並輸出n ^ 2個平行混沌流密碼。
  16. The design and analysis of the key stream generators are always the central task of the stream cipher

    對密鑰流生成器的設計與分析一直是序列密碼研究的中心課題。
  17. 3. many methods to designed stream cipher based on cellular automata and their security have been studied

    研究了利用細胞自動機構造序列密碼的方式,並對它們進行了安全性分析。
  18. At first, some basic knowledge in stream cipher and cellular automata has been introduced ; second, properties of one kind of cellular automata such as its periodicity, its topologies and the connection between its states have been deeply researched ; third, the algorithms base on cellular automata and their security have been discussed ; finally, i have implemented one simple cellular automata and one simple linear feedback shift register, and have analyzed the advantage and the disadvantage of cellular automata

    文章首先介紹了序列密碼及細胞自動機的相關知識;然後對一類簡單的加法細胞自動機的周期性、拓撲結構以及各狀態之間的相互關系進行了研究;對利用細胞自動機構造序列密碼和分組密碼的方式及其安全性進行了研究;最後實現了一類簡單的ca和lfsr ,分析了細胞自動機在硬體實現上的優點。
  19. In the part of image encryption, chaotic map based on kolmogorov flow is used to permute. changing the traditional stream - cipher, new chaotic pseudo - random sequence generator based on the theory of product cipher is presented to substitute the pixel. based on it, linear map to confuse the pixel is presented further, withstanding statistical attack

    在圖像加密方面,採用基於kolmogorovflows的混沌映射對圖像進行置亂,對傳統流加密進行改造,提出了基於乘積密碼理論的新型混沌偽隨機序列發生器完成象素的混淆,並在此基礎上進一步採用線性映射對象素進行擴散以抵抗統計攻擊。
分享友人