共查询到20条相似文献,搜索用时 187 毫秒
1.
对环Zpl导出的多元Kerdock-code序列的部分周期性质进行了研究,这里p为任意奇素数,l为任意正整数.利用特征为pl的Galois环上不完全指数和的非平凡上界,对上述p元Kerdock-code序列的非周期自相关性及互相关性进行了估计,同时对序列的部分周期分布和部分周期独立r-样式分布也进行了刻画.结果表明,此类序列具有极低的非周期自相关性及互相关性,同时其部分周期分布和部分周期独立r-样式分布也是渐进均匀的,在密码学和通信领域具有潜在的应用价值. 相似文献
2.
3.
将有限域上GMW序列的概念推广到了一般的Galois环上.利用环上的置换,定义了一类新的一般Galois环上的GMW序列,并对其线性复杂度进行了估计.结果表明,这类GMW序列具有非常大的线性复杂度. 相似文献
4.
王锦玲 《信息安全与通信保密》1996,(2)
设f(x)是环Z/(p~d)上首一多项式,则f(x)可自然视为Z/(p)上多项式,其中i=1,2,…,d。本文刻划了在各层环Z/(p),2/(p~2),…,Z/(p~d)上f(x)的周期变化情况。 相似文献
5.
孙琦 《信息安全与通信保密》1991,(1)
1 置换多项式与密码体系设f(x)是一个整系数多项式,m>1是整数,当x过模m的一个完全剩余系,f(x)也过模m的一个完全剩余系,则称f(x)是模m的一个置换多项式。此时,f(x)正好导出{0,1,…,m-1}的一个置换,f(x)也叫模m剩余类环Z/(m)上的一个置换多项式。当m=p是一个素数时,则称f(x)是有限域F_p上的一个置换多项式。如果q=p~1,类似地可定义有限域F_q上的置换多项式。 相似文献
6.
环E+uF2是介于环Z4与域F4之间的一种四元素环,因此分享了环Z4与域F4的一些好的性质,此环上的编码理论研究成为一个新的热点。该文给出了环E+uF2的Galois扩张的相关理论,指出此Galois扩环的自同构群不同于Z4环上的Galois扩环的自同构群;定义了Galois扩环上的迹码的概念及子环子码的概念,证明了此Galois扩环上的一个码的对偶码的迹码是该环的子环子码的对偶码。 相似文献
7.
重模剩余类环的一一幂变换及其在保密通信中的应用 总被引:1,自引:1,他引:0
本文讨论在一类重模剩余类环上建立公钥密码体制的条件,主要结果是:设域F=GF(p),p为素数,f_1(x),f_2(x),…,f_3(x)是多项式环F[x]上两两互素的不可约多项式,deg f_i(x)=n_i,i=1,2,…,s。sum from i=1 to s(n_i)=n, 设f(x)=multiply from i=1 to s(f_i(x)),则deg f(x)=n。定义重模剩余类环F[x]/(f(x))的幂变换为σ_k:α→α~k(moddp,f(x)),α∈F[x]/(f(x)),k∈N,当且仅当k∈Z_q~*时,σ_k为F[x]/(f(x))的一一幂变换,这里q=[p~(n1)-1,p~(n2)-1,…,p~(ns)-1],Z_q~*表示整数模q的缩系。 相似文献
8.
9.
环F2+uF2是介于环Z4与域F4之间的一种四元素环,因此分享了环Z4与域F4 的一些好的性质,此环上的编码理论研究成为一个新的热点。该文给出了环F2+uF2 的Galois扩张的相关理论,指出此Galois扩环的自同构群不同于Z4环上的Galois扩环的自同构群;定义了Galois扩环上的迹码的概念及子环子码的概念,证明了此Galois扩环上的一个码的对偶码的迹码是该环的子环子码的对偶码。 相似文献
10.
11.
Goresky M. Klapper A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(4):1649-1662
Over the past half century, various statistical properties of pseudorandom sequences have played important roles in a variety of applications. Among these properties are Golomb's randomness conditions: (R1) balance, (R2) run property, and (R3) ideal autocorrelations, as well as the closely related properties (R4) shift and add, and (R5) de Bruin (uniform distribution of subblocks). The purpose of this paper is to describe the relationships among these conditions, and to introduce a new method for generating sequences with all these properties, using algebraic feedback shift registers. 相似文献
12.
Xuan Yong Zhu Wen Feng Qi 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(10):2442-2448
Let Z/(p/sup e/) be the integer residue ring with odd prime p/spl ges/5 and integer e/spl ges/2. For a sequence a_ over Z/(p/sup e/), there is a unique p-adic expansion a_=a_/sub 0/+a_/spl middot/p+...+a_/sub e-1//spl middot/p/sup e-1/, where each a_/sub i/ is a sequence over {0,1,...,p-1}, and can be regarded as a sequence over the finite field GF(p) naturally. Let f(x) be a primitive polynomial over Z/(p/sup e/), and G'(f(x),p/sup e/) the set of all primitive sequences generated by f(x) over Z/(p/sup e/). Set /spl phi//sub e-1/ (x/sub 0/,...,x/sub e-1/) = x/sub e-1//sup k/ + /spl eta//sub e-2,1/(x/sub 0/, x/sub 1/,...,x/sub e-2/) /spl psi//sub e-1/(x/sub 0/,...,x/sub e-1/) = x/sub e-1//sup k/ + /spl eta//sub e-2,2/(x/sub 0/,x/sub 1/,...,x/sub e-2/) where /spl eta//sub e-2,1/ and /spl eta//sub e-2,2/ are arbitrary functions of e-1 variables over GF(p) and 2/spl les/k/spl les/p-1. Then the compression mapping /spl phi//sub e-1/:{G'(f(x),p/sup e/) /spl rarr/ GF(p)/sup /spl infin// a_ /spl rarr/ /spl phi//sub e-1/(a_/sub 0/,...,a_/sub e-1/) is injective, that is, a_ = b_ if and only if /spl phi//sub e-1/(a_/sub 0/,...,a_/sub e-1/) = /spl phi//sub e-1/(b_/sub 0/,...,b_/sub e-1/) for a_,b_ /spl isin/ G'(f(x),p/sup e/). Furthermore, if f(x) is a strongly primitive polynomial over Z/(p/sup e/), then /spl phi//sub e-1/(a_/sub 0/,...,a_/sub e-1/) = /spl psi//sub e-1/(b_/sub 0/,...,b_/sub e-1/) if and only if a_ = b_ and /spl phi//sub e-1/(x/sub 0/,...,x/sub e-1/) = /spl psi//sub e-1/(x/sub 0/,...,x/sub e-1/) for a_,b_ /spl isin/ G'(f(x),p/sup e/). 相似文献
13.
A segmented loop antenna is presented for ultra-high frequency (UHF) near-field radio frequency identification (RFID) applications. The proposed segmented configuration makes the current along the loop remain in-phase even though the perimeter of the loop is comparable to the operating wavelength, so that a strong and uniform magnetic field is generated in the region surrounding the antenna. The antenna printed on a FR4 printed circuit board (PCB) with an overall size of 160 x 180 x 0.5 mm achieves good impedance matching and uniform magnetic field distribution over an operating bandwidth of 800?1040 MHz, which is desirable for UHF near-field RFID reader applications. 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(3):339-342
Constructions are given of sets of orthogonal multilevel pseudorandom sequences with binomial and uniform amplitude distributions. The sequences are based on binary maximal-length sequences and have similar correlation properties to those sequences. Pseudorandom impulse sequences suitable for nerve impulse simulation are constructed from the uniform-amplitude distribution sequences, and empirical bounds are established on their correlation performance. 相似文献
15.
Hao Che San-Qi Li 《Selected Areas in Communications, IEEE Journal on》1998,16(5):612-625
This paper develops fast algorithms for the construction of a circulant modulated rate process to match with the two primary traffic statistical functions: rate distribution f(x) and autocorrelation R(τ). Using existing modeling techniques, f(x) has to be limited to certain forms such as Gaussian or binomial; R(τ) can only consist of one or two exponential terms which are often real exponentials rather than complex. In reality, these two functions are collected from real traffic traces and generally expressed in a very complicated form. We only consider the traffic whose correlation function can be approximated by the sum of complex exponentials. Our emphasis is placed on the algorithm design for matching complicated R(τ) in traffic modeling. The typical CPU time for traffic modeling with R(τ) consisting of five or six complex exponential terms is found to be in the range of a few minutes by the proposed algorithms. Our study further shows an excellent agreement between the original traffic traces and the sequences generated by the matched analytical model. The selection of the measurement-window in traffic statistics collection for queueing performance analysis is also discussed 相似文献
16.
Solomon W. Golomb Pey-Feng Lee 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(2):768-774
The simplest linear shift registers to generate binary sequences involve only two taps, which corresponds to a trinomial over GF(2). It is therefore of interest to know which irreducible polynomials f(x) divide trinomials over GF(2), since the output sequences corresponding to f(x) can be obtained from a two-tap linear feedback shift register (with a suitable initial state) if and only if f(x) divides some trinomial t(x)=xm+xa+1 over GF(2). In this paper, we develop the theory of which irreducible polynomials do, or do not, divide trinomials over GF(2). Then some related problems such as Artin's conjecture about primitive roots, and the conjectures of Blake, Gao, and Lambert, as well as of Tromp, Zhang, and Zhao are discussed 相似文献
17.
Chaotic frequency hopping sequences 总被引:1,自引:0,他引:1
Ling Cong Sun Songgeng 《Communications, IEEE Transactions on》1998,46(11):1433-1437
This letter describes a novel family of frequency hopping sequences generated by chaotic systems. The sequences give a uniform spread over the entire frequency bandwidth. In addition to having good Hamming correlation properties, they possess ideal linear span. The sequences produce almost as good performance as random hopping patterns when used in frequency hopping code-division multiple-access (FH/CDMA) systems. Many numerical examples based on a digital chaos generator are presented 相似文献
18.
On ternary complementary sequences 总被引:1,自引:0,他引:1
Gavish A. Lempel A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1994,40(2):522-526
A pair of real-valued sequences A=(a1,a2,...,aN) and B=(b1,b 2,...,bN) is called complementary if the sum R(·) of their autocorrelation functions RA(·) and RB(·) satisfies R(τ)=RA(τ)+R B(τ)=Σi=1N$ -τaiai+τ+Σj=1 N-τbjbj+τ=0, ∀τ≠0. In this paper we introduce a new family of complementary pairs of sequences over the alphabet α3=+{1,-1,0}. The inclusion of zero in the alphabet, which may correspond to a pause in transmission, leads both to a better understanding of the conventional binary case, where the alphabet is α2={+1,-1}, and to new nontrivial constructions over the ternary alphabet α3. For every length N, we derive restrictions on the location of the zero elements and on the form of the member sequences of the pair. We also derive a bound on the minimum number of zeros necessary for the existence of a complementary pair of length N over α3. The bound is tight, as it is met by some of the proposed constructions, for infinitely many lengths 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1977,23(5):620-623
The question of whether uniform Huffman (impulse equivalent) sequences exist is discussed, and some necessary conditions for a Huffman sequence to be uniform are mentioned. A comprehensive search revealed that no uniform Huffman sequences exist from lengths 4 to 17, inclusive. A procedure is described for synthesizing pairs of Huffman sequences whose cross-correlations are approximately uniform and, incidentally, are also themselves Huffman sequences. 相似文献
20.
By using m-sequence over the finite field GF(2m) of degree L to control m-sequence over GF(2m) of degree L, a class of periodic sequences with large linear complexity is constructed. The lower bounds of the linear complexity of these sequences are L((L +1)m-Lm). 相似文献