PERMUTATION

作品数:181被引量:137H指数:6
导出分析报告
相关作者:黄群林洁梅陈平雁钱俊赵佳因更多>>
相关机构:南方医科大学北京城市学院空军军医大学(第四军医大学)上海大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划福建省自然科学基金国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 学科=自动化与计算机技术x
条 记 录,以下是1-10
视图:
排序:
WAS:improved white-box cryptographic algorithm over AS iteration
《Cybersecurity》2025年第1期142-152,共11页Yatao Yang Yuying Zhai Hui Dong Yanshuo Zhang 
supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
关键词:White-box cryptography Block cipher Substitution permutation network structure Anti-key extraction Anti-code lifting 
An efficient permutation approach for SbPN-based symmetric block ciphers
《Cybersecurity》2024年第2期113-130,共18页Mir Nazish M.Tariq Banday Insha Syed Sheena Banday 
The University Grants Commission,Government of India,supported the research work in the form of a Junior Research Fellowship(190520461818).
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end cons...
关键词:Lightweight cryptography PRESENT GIFT SbPN Cortex-M LPC1768 Bit-band memory 
On the size generalizibility of graph neural networks for learning resource allocation
《Science China(Information Sciences)》2024年第4期235-250,共16页Jiajun WU Chengjian SUN Chenyang YANG 
supported by National Natural Science Foundation of China(Grant Nos.61731002,62271024)。
Size generalization is important for learning resource allocation policies in wireless systems with time-varying scales.If a neural network for learning a wireless policy is not generalizable to the size of its input,...
关键词:size generalization graph neural networks resource allocation permutation equivariance 
Recover the Secret Components in a ForkCipher
《Chinese Journal of Electronics》2023年第3期597-602,共6页HOU Tao ZHANG Jiyan CUI Ting 
supported by the National Natural Science Foundation of China(61772547,61902428,61802438,61672031);the Foundation of Key Laboratory of National Defense Science and Technology(61421030107).
Recently, a new cryptographic primitive has been proposed called ForkCiphers. This paper aims at proposing new generic cryptanalysis against such constructions. We give a generic method to apply existing decomposition...
关键词:Recovery attack ForkCipher Substitution-permutation network(SPN) Feistel network Secret design criteria 
A color image encryption algorithm based on hyperchaotic map and DNA mutation
《Chinese Physics B》2023年第3期131-142,共12页高昕瑜 孙博 曹颖鸿 Santo Banerjee 牟俊 
the National Natural Science Foundation of China(Grant No.62061014);the Provincial Natural Science Foundation of Liaoning(Grant No.2020-MS-274);the Basic Scientific Research Projects of Colleges and Universities of Liaoning Province,China(Grant No.LJKZ0545).
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam...
关键词:color image encryption hyperchaotic map cross-plane permutation DNA mutation 
Modified 2 Satisfiability Reverse Analysis Method via Logical Permutation Operator
《Computers, Materials & Continua》2023年第2期2853-2870,共18页Siti Zulaikha Mohd Jamaludin MohdAsyraf Mansor Aslina Baharum Mohd Shareduwan Mohd Kasihmuddin Habibah A.Wahab Muhammad Fadhil Marsani 
Universiti Sains Malaysia for Short Term Grant with Grant Number 304/PMATHS/6315390.
The effectiveness of the logic mining approach is strongly correlated to the quality of the induced logical representation that represent the behaviour of the data.Specifically,the optimum induced logical representati...
关键词:Logic mining logical permutation discrete hopfield neural network knowledge extraction 
Designing Optimal Large Four-Level Experiments:A New TechniqueWithout Recourse to Optimization Softwares
《Communications in Mathematics and Statistics》2022年第4期623-652,共30页A.M.Elsawah 
partially supported by the UIC Grants(Nos.R201810,R201912 and R202010);the Zhuhai Premier Discipline Grant.
Experimental design is an effective statistical tool that is extensively applied in modern industry,engineering,and science.It is proved that experimental design is a powerful and efficient means to screen the relatio...
关键词:Multiple quadrupling technique TA algorithm Augmented design technique Level permutation technique CONFOUNDING Hamming distance Space-filling 
DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
《Computers, Materials & Continua》2022年第8期3299-3312,共14页Jyoti Khandelwal Vijay Kumar Sharma Dilbag Singh Atef Zaguia 
This work was supported by Taif university Researchers Supporting Project Number(TURSP-2020/114),Taif University,Taif,Saudi Arabia.
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very ...
关键词:Image steganography threshold value SORTING discrete wave transformation singular value decomposition color band division PERMUTATION 
Fractal sorting vector-based least significant bit chaotic permutation for image encryption被引量:1
《Chinese Physics B》2021年第6期226-235,共10页Yong-Jin Xian Xing-Yuan Wang Ying-Qian Zhang Xiao-Yu Wang Xiao-Hui Du 
supported by the National Natural Science Foundation of China (Grant No. 61672124);the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203);the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013);the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103);the Jinan City 20-University Funding Projects for Introducing Innovation Team Program,China (Grant No. 2019GXRC031)。
The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSB...
关键词:chaotic image encryption fractal sorting vector bit-level permutation FSV-based LSB chaotic permutation 
A new diagnosis strategy under the PMC model and applications
《High Technology Letters》2020年第1期34-43,共10页Liang Jiarong Chen Fang Zhang Qian 
Supported by the National Natural Science Foundation of China(No.61862003,61761006);the Natural Science Foundation of Guangxi of China(No.2018GXNSFDA281052,2017GXNSFAA198263)。
A new diagnosis method, called Double-Syndrome diagnostic, is proposed, which can identify faulty nodes by comparing 2 different syndromes. For the same system, the average number of faulty nodes identified correctly ...
关键词:Double-Syndrome DIAGNOSTIC (k t)-diagnosable (k t/t)-diagnosable HYPERCUBE 2D(3D)mesh PERMUTATION STAR graph 
检索报告 对象比较 聚类工具 使用帮助 返回顶部