布尔的
- 与 布尔的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.
然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。
-
In the fourth chapter, firstly it introduces the Boolean functions algebraic expressions of the 2-value clock-controlled stop-and-go generator and Gunther generator. It reveals the balanced property of the two kinds of Boolean functions, and studies the Walsh cycle spectrum and the autocorrelation function. It also obtains the coincidence rate of their output sequences with affine sum of some bits of input sequences, and analyzes their ability of resisting the best affine approximation cryptanalysis and differential cryptanalysis. Secondly, we properly present a new definition of the Best Affine Approximation, namely BAA on the Boolean vector functions, followed by the spectral characteristic of such defined BAA attacks through using the decomposition formula of the union distribution for random variables. A lower bound of such BAA attacks is proposed. Finally, we also study the spectral characteristic of the second kind of nonlinearity of Boolean vector functions, followed by a higher bound of such nonlinearity. Furthermore, the limited relationship between the second kind of nonlinearity of Boolean vector functions and the linear structure of the linear combination of every component is analyzed.
在第四章中,首先给出了2值密钥流"停走生成器"和"衮特生成器"中实际存在的布尔函数的代数表示,揭示了这两类布尔函数的平衡性,随后研究了它们的Walsh循环谱和自相关函数等,得到了它们的输出序列与输入序列中的某些bit的仿射项的符合率,分析了它们抵抗最佳仿射逼近攻击和差分攻击的能力;其次,我们合理地给出了布尔向量函数最佳仿射逼近的新定义,利用布尔随机变量联合分布的分解式考察了相应的谱特征,并给出了布尔向量函数与其最佳仿射逼近的符合率的一个下界;最后,我们还考察了布尔向量函数第二类非线性度的谱特征,给出了布尔向量函数第二类非线性度的一个上界,并揭示了布尔向量函数第二类非线性度与其各个分量的线性和的线性结构之间存在的制约关系。
-
Using the theories of probability, algebra and spectral theory comprehensively, we investigate some related characteristics of logic functions in cryptography: Firstly, we introduce m order generalized s - correlation immunity of Boolean vector functions and prove that the higher order generalized ε- correlation immunity can guarantee the lower order generalized ε- correlation immunity. Then by applying decomposition formula of joint distribution of Boolean random vectors, we give a spectrum criterion of m order generalized e - correlation immunity of Boolean vector functions. Furthermore, we show that the algebraic degree of m order generalized e - correlation immune Boolean vector functions is not restricted by the correlation immune orders.
本文主要运用概率论的思想和方法,并结合代数学和频谱理论的相关知识,对密码学中逻辑函数的有关性质进行了研究,主要包括以下三个方面的内容:首先,对布尔向量函数的相关免疫性进行了拓展,给出了k维布尔向量函数m阶广义ε-相关免疫的概念,证明了布尔向量函数的高阶广义ε-相关免疫性蕴含低阶广义ε-相关免疫性,并根据布尔随机向量联合分布分解式得到了布尔向量函数m阶广义ε-相关免疫的一个谱判别条件,还说明了m阶广义ε-相关免疫布尔向量函数的代数次数不受相关免疫阶数的制约。
-
Based on the definition of Boolean function on set and positive extension, The sufficient and necessary condition of PBF is proven. At last, an algorithm of generating MSP expression of stack filter positive Boolean function is presented taking advantage of Hasse diagram.
通过定义布尔函数开、闭集和最小项正、负扩展,证明了布尔函数具有层叠性的充要条件是布尔函数开集的正扩展或闭集的负扩展具有不变性,在此基础上,提出了一种通过Hasse图确定层叠滤波器最简正布尔函数的算法。
-
Based on the definition of Boolean function on set and positive extension, The sufficient and necessary condition of PBF is proven. At last,an algorithm of generating MSP expression of stack filter positive Boolean function ispresented taking advantage of Hasse diagram.
通过定义布尔函数开、闭集和最小项正、负扩展,证明了布尔函数具有层叠性的充要条件是布尔函数开集的正扩展或闭集的负扩展具有不变性,在此基础上,提出了一种通过Hasse图确定层叠滤波器最简正布尔函数的算法。
-
Using the concept of Boolean functions and combinatorics theory comprehensively, we investigate the construction on annihilators of Boolean functions and the algebraic immunity of symmetric Boolean functions in cryptography:Firstly, we introduce two methods of constructing the annihilators of Boolean functions, Construction I makes annihilators based on the minor term expression of Boolean function, meanwhile we get a way to judge whether a Boolean function has low degree annihilators by feature matrix. In Construction II, we use the subfunctions to construct annihilators, we also apply Construction II to LILI-128 and Toyocrypt, and the attacking complexity is reduced greatly. We study the algebraic immunitiy of (5,1,3,12) rotation symmetric staturated best functions and a type of constructed functions, then we prove that a new class of functions are invariants of algebraic attacks, and this property is generalized in the end.Secondly, we present a construction on symmetric annihilators of symmetric Boolean functions.
本文主要利用布尔函数的相关概念并结合组合论的相关知识,对密码学中布尔函数的零化子构造问题以及对称布尔函数代数免疫性进行了研究,主要包括以下两方面的内容:首先,给出两种布尔函数零化子的构造方法,构造Ⅰ利用布尔函数的小项表示构造零化子,得到求布尔函数f代数次数≤d的零化子的算法,同时得到通过布尔函数的特征矩阵判断零化子的存在性:构造Ⅱ利用布尔函数退化后的子函数构造零化子,将此构造方法应用于LILI-128,Toyocrypt等流密码体制中,使得攻击的复杂度大大降低;通过研究(5,1,3,12)旋转对称饱和最优函数的代数免疫和一类构造函数的代数免疫,证明了一类函数为代数攻击不变量,并对此性质作了进一步推广。
-
Finally,a simplified case of BOFL,i.e.Boolean Operator Propositional Logicestablished on a Boolean algebra,is further discussed.A complete algorithmfor finding the true level and false level of a formula in BOPL,which subsumes the re-lated work by Wang H.in the propositional logic,is also provided.
对布尔算子模糊逻辑的简化情形一布尔算子命题逻辑作了进一步讨论,放宽了对真值域的要求,将布尔算子命题逻辑建立在布尔代数上,并推广了命题逻辑中的王浩算法,给出了一个完备的求给定公式恒真水平和恒假水平的机械推导算法。
-
The concepts of MP-filters and Boolean MP-filters in NML algebras are introduced in this paper, and by using MP-filters, the structure of NML algebras are established: If F is the Boolean filters, then M/~ is the Boolean algebras, i. e. the quotient algebra of NML algebras is obtained.
讨论了NML代数的性质,并且在NML代数上引入MP-滤子与MP-理想以及布尔MP-滤子的概念,并利用布尔MP-滤子建立了NML代数的结构:若F是布尔滤子,则M/~是布尔代数,即NML代数的商代数是布尔代数。
-
He had sold the last of his furniture, then all duplicates of his bedding,his clothing his blankets, then his herbariums prints; 8ttt8.com he still retained his most precious books, many of which were of the greatest rarity, among others, Les Quadrins Historiques de la Bible, edition of 1560; La Concordance des Bibles, by Pierre de Besse; Les Marguerites de la Marguerite, of Jean de La Haye, with a dedication to the Queen of Navarre; the book de la Charge et Dignite de l'Ambassadeur, by the Sieur de Villiers Hotman; a Florilegium Rabbinicum of 1644; a Tibullus of 1567, with this magnificent inscription: Venetiis,in aedibus Manutianis; lastly, a Diogenes Laertius, printed at Lyons in 1644, which contained the famous variant of the manuscript 411, thirteenth century, of the Vatican, those of the two manuscripts of Venice, 393 394, consulted with such fruitful results by Henri Estienne, all the passages in Doric dialect which are ssbbww.com found in the celebrated manuscript of the twelfth century belonging to the Naples Library.
他把最后的几件木器也卖了,随后,凡属多余的铺盖、衣服、毛毯等物,以及植物标本和木刻图版,也全卖了;但是 dddTt 他还有些极珍贵的藏书,其中有些极为稀有的版本,如一五六○年出版的《历史上的圣经四行诗》,皮埃尔·德·贝斯写的《圣经编年史》,让·德·拉埃写的《漂亮的玛格丽特》,书中印有献给纳瓦尔王后的题词,贵人维里埃-荷特曼写的《使臣的职守和尊严》,一本一六四四年的《拉宾尼诗话》,一本一五六七年迪布尔的作品,上面印有这一卓越的题铭:&威尼斯,于曼奴香府&,还有一本一六四四年里昂印的第欧根尼·拉尔修①的作品,在这版本里,有十三世纪梵蒂冈第四一一号手抄本的著名异文以及威尼斯第三九三号和三九四号两种手抄本的著名异文,这些都是经亨利·埃斯蒂安②校阅并取得巨大成绩的,书中并有多利安方言的所有8 tt t8.com 章节,这是只有那不勒斯图书馆十二世纪的驰名手抄本里才有的。
-
Boer losses, tens of thousands died in concentration camps, May 31, 1902 the two sides signed the "Treaty of Vereeniging," Boolean to stop the resistance, the British annexation of the Transvaal and the Orange, the United Kingdom to give Boer To financial compensation, and to work together to provide Boer oppression of black privilege.
布尔人损失惨重,集中营中死亡达数万人,1902年5月31日双方签定《弗里尼欣和约》,布尔人停止抵抗,英国吞并德兰士瓦和奥兰治,英国给予布尔人以经济补偿,并给布尔人提供一起压迫黑人的特权。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。