Boolean相关论文
GENERATING AND COUNTING A CLASS OF BINARY BENT SEQUENCES WHICH IS NEITHER BENT-BASED NOR LINEAR-BASE
I. INTRODUCTION MacWilliams and Sloane listed as an open problem the classification of all Bent functions of a given ord......
这一期咱们做一个风靡文曲星的小游戏:猜数字,这里是要做它的简易版。为了让程序尽量简洁且能让大家看懂,咱们讲一下Function函数......
Algebraic immunity has been considered as one of cryptographically significant properties for Boolean functions. In this......
All (2m +1)-variable symmetric Boolean functions with submaximal algebraic immunity 2m-1 are described and constructed. ......
Boolean algebra successfully describes the logical behavior of a digital circuit, and has been widely used in electronic......
The Optical Implementation of High Efficiency Packed Redundant Binary Number Addition Based on Boole
The Optical Implementation of High Efficiency Packed Redundant Binary Number Addition Based on Boolean Polarization-encoded L...
The Optical Implementation of High Efficiency Packed Redundant Binary Number Addition......
By analysing problems in the traditional design theory of digital circuits it is proposed that both switching variable a......
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic att......
ATPG for very large scale integrated circuit designs is an important problem in industry. With the advent of SOC designs......
This paper presents an account of how literal and metaphoric readings of spatial prepositions in so-called“Boolean Phra......
We find extremely large low-magnetic-field magnetoresistance(~350%at 0.2T and ~180%at 0.1T) in germanium at room tempera......
Boolean and relational operations, which are defined for solving mathematically logical problems,are always required in ......
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based ......
Convolutional codes have been widely used in many applications such as digital video, radio, and mobile communication. N......
如果你卷入数据的海洋而不能自拔,一个叫做Enfish Onespace(beta版)的新应用可能会成为你的救命恩人。通过对你硬盘上的多种数据......
网上冲浪感觉爽心无比,可是万一遇到IE标题栏被某些不友好网站修改的事惰,真会让人扫兴不已。虽然可以自己动手修复注册表,但是被......
考查文献[4]的结果在理论上的应用,给出Boolean代数族模素强滤子约化直积在无限性运算下的一个同构定理。
By examining the application of ......
A multiple-valued algebra for modeling MOS VLSI circuits at switch-level is proposed in this paper.Its structure and pr......
A Real-Time Interprocessor Synchronization Algorithm for Communication in Distributed Computer Syste
A real-time synchronization algorithm for interprncessor communication ispresented, which is based on the techniques of......
A new method,orthogonal algorithm,is presented to compute the logic probabilities(i.e.signal probabili-ties)accurately.......
本题的关键之处在于“列出所有可能的走步”,即对于棋盘上给定位置(Row,Colnmn),判断在该位置放入本方棋子后,是否能够夹住对方棋......
An embedded system is a system that computer is used as a componelit ina larger device. In this paper, we study hybridit......
A binary decision diagram(BDD) is a data structure that is used to represent a Boolean function.Converting fault tree in......
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized ......
We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mutation operato......
We present definitions of the correlation degree and correlation coefficient of multi-output functions. Two relationship......
Based on the relationship between nonlinearity and resiliency of a multi-output function, we present a method for constr......
给出一种构造具有高非线性度n-输入m-输出布尔函数的一般方法,还给出了存在非线性度是非0的n-输入m-输出布尔函数的一个充要条件.
......
In this paper, the definition of multi-output partially Bent functions is presented and some properties are discussed. T......
Walsh Spectral Characteristics and the Auto-Correlation Function Characteristics of Forming Orthomor
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relatio......
This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysi......
Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function ......
By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two B......
In this paper, we study Boolean functions of an odd number of variables with maximum algebraic immunity. We identify thr......
Carlet et al. recently introduced generalized nonlinearity to measure the ability to resist the improved correlation att......
Based on the weakly coupled-mode theory,the coupled-mode equations of the spatial multiwaveguide system are presented in......
对新提议的一种基于线性反馈移位寄存器、非线性反馈移位寄存器和过滤布尔函数的序列密码结构的安全性进行了研究,对这种结构给出......
A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman sums.T......
A restricted signed r-set is a pair(A,f),where A■[n]={1,2,…,n} is an r-set and f is a map from A to[n]with f(i)≠i for......
Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at
Boolean functions used in stream ciphers against algebraic attacks are required to have a necessary cryptographic proper......
Based on the properties of trace functions and quadratic forms,this paper presents value distributions of Walsh spectrum......
文章给出了布尔函数关于自变量对是拟线性的充分必要条件,同时研究了布尔函数关于自变量对是拟线性的谱特征.
The paper gives th......
Rotation symmetric Boolean functions (RSBFs) have been used as components of different cryptosystems. This class of func......
Differential cryptanalysis is a general cryptanalytic tool that makes use of diFFerentials over some rounds of a cipher,......
We present a systematic way to construct p-ary quantum error correcting codes using logic functions. As a consequence, f......
A new security test for the substitution boxes (S-boxes),high-order bit independence criterion (HOBIC) test,is presented......
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even numbe......
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its se......