相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Progress in Natural Science:Materials International》《Frontiers of Mathematics in China》《Journal of Southeast University(English Edition)》更多>>
State Key Program of National Nature Science Foundation of China(Grant No.61936001);National Nature Science Foundation of Shanghai(Grant Nos.16ZR1411200,17ZR1409800,19ZR1417700);Research and Development Program in Key Areas of Guangdong Province(Grant No.2018B010113001);National Nature Science Foundation of China(Grant No.61572309);partially supported by National Natural Science Foundation of China(Grant No.61772292);partially supported by National Natural Science Foundation of China(Grant No.61772022);Projects of International Cooperation and Exchanges NSFC-RFBR(Grant No.61911530130)。
Dear editor,Pseudorandom sequences play an important role in cryptography.In particular in symmetric cryptography they serve as the secret key.So the designs of pseudorandom sequences and cryptographic indicators are ...
partially supported by National Natural Science Foundation of China(Grant Nos.61272096;61202367);Shanghai Municipal Natural Science Foundation(Grant Nos.13ZR1416100;12ZR1443700);State Scholarship Fund of China Scholarship Council;Chen Z X was partially supported by National Natural Science Foundation of China(Grant Nos.61170246;61373140);State Scholarship Fund of China Scholarship Council;Du X N was partially supported by National Natural Science Foundation of China(Grants Nos.61202395;61462077);Program for New Century Excellent Talents in University(NCET-12-0620)
The Euler quotient modulo an odd-prime power pr (r 〉 1) can be uniquely decomposed as a p-adic number of the form (u(p- 1)Pr- 1 _ 1)/pr ≡- ao (u) + a1 (u)p +... +at- 1 (u)Pr- 1 (mod pr), gcd(u, p)...
Chen Z X and Wu C H were supported by National Natural Science Foundation of China(Grant No.61373140);the Special Scientific Research Program in Fujian Province Universities of China(Grant No.JK2013044);Niu Z H was supported by National Natural Science Foundation of China(Grant Nos.61272096,61202395);Shanghai Municipal Natural Science Foundation(Grant Nos.13ZR1416100,12ZR1443700);Chen Z X and Niu Z H were also supported by the State Scholarship Fund of China Scholarship Council
The k-error linear complexity is an important cryptographic measure of pseudorandom sequences in stream ciphers. In this paper, we investigate the k-error linear complexity of p2-periodic binary sequences defined from...
supported by the National Natural Science Foundation of China(Grant Nos.61373140,61170246);the Special Scientific Research Program in Fujian Province Universities of China(Grant No.JK2013044)
We describe the trace representations of two families of binary sequences derived from the Fermat quotients modulo an odd prime p (one is the binary threshold sequences and the other is the Legendre Fermat quotient s...
supported by National Natural Science Foundation of China (Grant No. 61003291);National High Technology Research and Development Program of China (Grant No. 2011AA010803);Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. FANEDD-2007B74)
Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic primitives. Using the output sequence, in the order of its generation, of a word-oriented crypto- graphic p...
supported by National High-Tech Research&Development Program of China(Grant No.2006AA-01Z420);National Natural Science Foundation of China(Grant No.10990011)
We improve previous results on the asymptotic behavior and the expected value of the joint linear complexity of random multisequences over finite fields. These results are of interest for word-based stream ciphers in ...