中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
linear approximations of addition modulo 2n-1
作者: Zhou Chunfang ; Feng Xiutao ; Wu Chuankun
会议文集: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议名称: 18th International Workshop on Fast Software Encryption, FSE 2011
会议日期: 1-Feb
出版日期: 2011
会议地点: Lyngby, Denmark
关键词: Security of data
出版地: Germany
ISSN: 3029743
ISBN: 9783642217012
部门归属: (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, China; (2) Graduate University, Chinese Academy of Science, Beijing, 100049, China
英文摘要: Addition modulo 231 - 1 is a basic arithmetic operation in the stream cipher ZUC. For evaluating ZUC's resistance against linear cryptanalysis, it is necessary to study properties of linear approximations of the addition modulo 231 - 1. In this paper we discuss linear approximations of the addition of k inputs modulo 2n - 1 for n ≥ 2. As a result, an explicit expression of the correlations of linear approximations of the addition modulo 2n - 1 is given when k = 2, and an iterative expression when k > 2. For a class of special linear approximations with all masks being equal to 1, we further discuss the limit of their correlations when n goes to infinity. It is shown that when k is even, the limit is equal to zero, and when k is odd, the limit is bounded by a constant depending on k. © 2011 Springer-Verlag.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14271
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
linear approximations of addition modulo 2n-1.pdf(297KB)----限制开放-- 联系获取全文

Recommended Citation:
Zhou Chunfang,Feng Xiutao,Wu Chuankun. linear approximations of addition modulo 2n-1[C]. 见:18th International Workshop on Fast Software Encryption, FSE 2011. Lyngby, Denmark. 1-Feb.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhou Chunfang]'s Articles
[Feng Xiutao]'s Articles
[Wu Chuankun]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhou Chunfang]‘s Articles
[Feng Xiutao]‘s Articles
[Wu Chuankun]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace