Results 61 to 70 of about 686 (181)
Power analysis-resistant based on NCL path balance [PDF]
Because of the insufficient research on the essence and the design technique of the path balance structure, the experience of the designer is severely relied on, so it can't be applied in kinds of automatization synthesis techniques.
Fang LUO, Qing-yu OU, Xiao-ping WU
core +1 more source
Attribute-based lightweight reconfigurable access control policy [PDF]
Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed ...
Guozhen SHI+3 more
core +1 more source
Analysis of properties and counting of orbits for k-rotation symmetric Boolean functions [PDF]
The properties of k-rotation symmetric Boolean functions (k-RSBF) were analyzed.It was presented that the Walsh spectrum and auto-correlation value were invariant when the parameters of a k-rotation symmetric Boolean function were under k-circular ...
Guang-pu GAO, Quan LI, Wen-fen LIU
core
Detecting rotation symmetric function based on 0-1 coded spectral technique(基于0-1编码谱技术检测旋转对称函数)
分析了旋转对称函数的0-1编码Hadamard变换谱系数的特点,给出了变量数n为素数的旋转对称函数的必要条件,提出了基于0-1编码Hadamard变换检测旋转对称函数的方法,该方法具有可编程操作以及同时可检测其他特殊布尔函数等优点.
MARu-xing(马汝星“)+1 more
doaj +1 more source
Research on side-channel attacks and defense methods for IoT devices [PDF]
Internet of things (IoT) devices are typically implemented using microcontrollers with limited computational capabilities, which necessitate the use of lightweight symmetric encryption algorithms to ensure data security.
FENG Yi+4 more
core +1 more source
特殊逻辑函数在电路设计中有着独特的优点.从特殊函数的定义出发,提出了检测含任意项特殊逻辑函数的方法,并以实例加以说明.为超大规模集成电路中单元电路的设计与化简提供了新的方法,对进一步完善布尔代数系统具有一定的实际应用意义.
LIXiao-hua(厉晓华)
doaj +1 more source
Attribute-Based Encryption with Arbitrary Boolean Function Access Control [PDF]
特征加密方案(ABE)通过在密文和密钥之间规定访问规则,有效地解决了匿名 访问控制问题。在密文规则的特征加密方案(CP-ABE)中,每个用户与一个特征集相 对应,数据通过特征域上的访问控制结构来加密,用户能够对某个密文解密当且仅当 他的特征集满足该密文中的访问结构。 当前绝大多数CP-ABE方案中,密文长度和加解密所需的计算量都随着访问结构中 的特征个数呈线性增长,这导致密文长度过长,加解密速度很慢。而其余一些密文长 度固定的CP-ABE方案中,对访问控制结构有很强的限制,比如单调性,只能实现与门 结构,
李明
core
Algorithm about minimization of MPRM expansions including don't care terms(包含无关项的MPRM展开式最小化算法)
通过对包含无关项布尔逻辑函数SOP(Sum-of-Products)展开式和MPRM(Mixed Polarity Reed-Muller)展开式的研究,结合基于系数矩阵的FPRM(Fixed Polarity Reed-Muller)展开式极性转换算法,提出了一种包含无关项逻辑函数MPRM展开式最小化算法.首先将包含无关项逻辑函数SOP展开式转换为MPRM展开式,并用系数矩阵的形式表示;然后删除函数中的冗余变量,归纳出一种包含无关项MPRM展开式最小化算法,得到与项数较少的MPRM展开式 ...
WANGDisheng(汪迪生)+1 more
doaj +1 more source
Research on differential properties of Keccak-like nonlinear transform [PDF]
By analyzing the nonlinear transformation in Keccak,n-gram Keccak-like nonlinear transform model was proposed firstly,and the differential properties of this kind of transformation was studied.They are proved that to the n-gram Keccak-like nonlinear ...
Qian-nan LI+3 more
core
An Attribute Reduction Method Based on Rough Sets for Dominating Sets of Graph [PDF]
探讨粗糙集的属性约简和图的支配集问题之间的联系.通过构造信息系统,将粗糙集的属性约简问题与图的支配集问题相联系,从而把图的支配集问题转化为粗糙集的属性约简问题.首先证明图的极小支配集恰是其构造的信息系统的属性约简,然后提出一种基于信息熵的最小支配集算法,最后通过实例验证该算法的可行性和有效性.The relationship between attribute reduction problem in rough sets and dominating set problem in graph is ...
李进金+3 more
core