完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Park, Sangwoo | |
dc.contributor.author | Chee, Seongtaek | |
dc.contributor.author | Lee, Sangjin | |
dc.contributor.author | Kim, Yongdae | |
dc.contributor.author | Kim, Kwangjo | |
dc.date.accessioned | 2009-08-23T04:39:05Z | |
dc.date.accessioned | 2020-05-25T06:24:05Z | - |
dc.date.available | 2009-08-23T04:39:05Z | |
dc.date.available | 2020-05-25T06:24:05Z | - |
dc.date.issued | 2006-10-31T09:14:37Z | |
dc.date.submitted | 1996-12-19 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2951 | - |
dc.description.abstract | In this paper, we define an equivalence relation on the group of all permutations over the finite field GF(2n) and show each equivalence class has common cryptographic properties. And, we classify all exponent permutations over GF(27) and GF(28). Then, three applications of our results are described. We suggest a method for designing n × 2n S(ubstitution)-boxes by the concatenation of two exponent permutations over GF(2n) and study the differential and linear resistance of them. And we can easily indicate that the conjecture of Beth in Eurocrypt’93 is wrong, and discuss the security of S-box in LOKI encryption algorithm. | |
dc.description.sponsorship | 中山大學,高雄市 | |
dc.format.extent | 6p. | |
dc.format.extent | 526623 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 1996 ICS會議 | |
dc.subject.other | S-box Design & Others | |
dc.title | How to use Exponent Permutations in Cryptography Classifications and Applications | |
分類: | 1996年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics001996000252.pdf | 514.28 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。