Journal of Computer Applications ›› 2015, Vol. 35 ›› Issue (12): 3447-3449.DOI: 10.11772/j.issn.1001-9081.2015.12.3447
• Information security • Previous Articles Next Articles
Received:
2015-05-22
Revised:
2015-07-28
Online:
2015-12-10
Published:
2015-12-10
通讯作者:
胡建勇(1990-),男,江西新余人,硕士研究生,主要研究方向:密码学
作者简介:
张文政(1966-),男,四川成都人,研究员,硕士,主要研究方向:密码学。
基金资助:
CLC Number:
HU Jianyong, ZHANG Wenzheng. Derivation and spectrum analysis of a kind of low weight spectral annihilator[J]. Journal of Computer Applications, 2015, 35(12): 3447-3449.
胡建勇, 张文政. 一类低频重零化子的推导及频谱分析[J]. 计算机应用, 2015, 35(12): 3447-3449.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2015.12.3447
[1] HU Y, ZHANG Y, XIAO G. Symmetric cryptography[M]. Beijing:Mechanical Industry Press, 2002:63-142. (胡予濮,张玉清,肖国镇.对称密码学[M].北京:机械工业出版社,2002:63-142.) [2] COURTOIS N T, MEIER W. Algebraic attacks on stream ciphers with linear feedback[C]//Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques:Advances in Cryptology-EUROCRYPT 2003, LNCS 2656. Berlin:Springer, 2003:345-359. [3] RØNJOM S, HELLESETH T. A new attack on the filter generator[J]. IEEE Transactions on Information Theory, 2007, 53(5):1752-1758. [4] GONG G, RØNJOM S, HELLESETH T,et al. Fast discrete Fourier spectra attacks on stream ciphers[J]. IEEE Transactions on Information Theory, 2011,57(8):5555-5565. [5] WANG J, CHEN K. Improvement of discrete Fourier transform attack[J]. Journal of Shanghai Jiao Tong University:Natural Science Edition, 2012, 46(2):285-288. (王晶晶,陈克非.序列快速傅里叶攻击的改进[J].上海交通大学学报:自然科学版,2012,46(2):285-288.) [6] WANG J. Fast discrete Fourier spectra attacks on stream ciphers[D]. Shanghai:Shanghai Jiao Tong University, 2013:35-50. (王晶晶.序列密码的快速离散傅里叶频谱攻击[D].上海:上海交通大学,2013:35-50.不太可能是第一页吧,核实引用页码是否有误) [7] RØNJOM S, GONG G, HELLESETH T. On attacks on filtering generators using linear subspace structures[C]//SSC 2007:Proceedings of the 2007 International Workshop on Sequences, Subsequences, and Consequences, LNCS 4893. Berlin:Springer, 2007:204-217. [8] WANG J, CHEN K, ZHU S. Annihilators of fast discrete Fourier spectra attacks[C]//IWSEC 2012:Proceedings of the 7th International Workshop on Security:Advances in Information and Computer Security, LNCS 7631. Berlin:Springer, 2012:182-196. [9] RØNJOM S, HELLESETH T. Attacking the filter generator over GF(2m)[C]//WAIFI 2007:Proceedings of the 1st International Workshop on Arithmetic of Finite Fields, LNCS 4547. Berlin:Springer, 2007:264-275. |
[1] | Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI. Three-factor anonymous authentication and key agreement protocol [J]. Journal of Computer Applications, 2021, 41(11): 3281-3287. |
[2] | Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU. Digital rights management scheme based on secret sharing in blockchain environment [J]. Journal of Computer Applications, 2021, 41(11): 3257-3265. |
[3] | Guangfu WU, Ziheng DAI. Cascaded quasi-cyclic moderate-density parity-check code based public key scheme for resisting reaction attack [J]. Journal of Computer Applications, 2021, 41(11): 3274-3280. |
[4] | Li LI, Hongfei YANG, Xiuze DONG. Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 2021, 41(11): 3251-3256. |
[5] | Lifeng GUO, Qianli WANG. Adaptive secure outsourced attribute-based encryption scheme with keyword search [J]. Journal of Computer Applications, 2021, 41(11): 3266-3273. |
[6] | Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN. Searchable encryption scheme based on splittable inverted index [J]. Journal of Computer Applications, 2021, 41(11): 3288-3294. |
[7] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[10] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[11] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[13] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[14] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[15] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||