Linear Complexity Problem of Binary Jacobi Sequence

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:tsao8883
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequence is unstable,namely,by changing its few bits in one-period length,the linear complexity of the modified sequences will become far less than the required value.
其他文献
与电炉工艺相比,转炉→LF精炼→CCM连铸工艺,具有比较成本优势.转炉工艺生产合结圆钢表面裂纹时有发生.分析了转炉冶炼40Cr热轧圆钢表面裂纹的形貌,并对生产过程进行了调查.结果表明,连铸拉速不稳定是造成裂纹的主要原因.对此制定了预防措施,控制了表面裂纹.
无穷尽焊接技术钢包内衬材料是基于实现钢包内衬不定形化过程中,不拆除用后钢包的反应烧结层,利用钢渣与新材料的反应焊接而进行续衬的一种全新理念.其成本低、寿命长、无环境污染、低排放、对钢水无污染.对于这种先进类型衬的替代,其在精炼钢包上的成功实施,从寿命、绿色炼钢和其他使用优点方面都值得提倡.尤其是复合型钢包衬体的使用,大大降低了钢水中夹杂物,同时提高了钢包寿命,实现了低成本运行.莱钢永锋炼钢厂120
射线管分裂是SBR方法中的一个关键问题,传统的射线管分裂方法存在与目标模型不匹配,计算精度差等缺点,而近年来出现的自适应射线管分裂技术,利用目标模型的三角面片对射线管进行动态剖分,可以有效解决上述问题。本文研究了该技术中的几个关键步骤,通过将Weiler-Atherton算法的内、外裁剪方法相嵌套,给出了射线管孔径面与物体三角片的裁剪算法,并设计了简单有效的凹多边形的凸划分方法,将生成的射线管孔径
利用电磁仿真软件CST对静电放电器现有构型进行仿真计算,探讨静电放电器构型各参数对静电放电噪声的影响,对静电放电器进行构型改进,新型放电器在相同激励下降低了静电放电所产生的噪声强度,降低静电放电器雷达散射截面,提高静电放电器的隐身特性。
针对加性水印中嵌入强度因子的自适应问题进行了研究,提出了一个基于信噪比的自适应音频水印算法.该算法在保证听觉质量的同时,利用信噪比自适应地调节嵌入强度因子,并将水印信号嵌入到音频数据经沃尔什-哈达玛变换后的低频系数中,水印检测时不需要原始音频信号参与.仿真实验结果表明该算法对诸如加噪、滤波、重量化、重采样和MP3压缩等常规信号处理具有较强的鲁棒性,可用于音频数据的版权保护。
To protect against algebraic attacks,a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers.In this paper,a new method based on a univariate polynomial re
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode,wherein insider attacks are the most challenging issue.To addres
Although there exist a few good schemes to protect the kernel hooks of operating systems,attackers are still able to circumvent existing defense mechanisms with spurious context information.To address
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized