共查询到20条相似文献,搜索用时 609 毫秒
1.
2.
3.
4.
5.
6.
CPLD在图像采集卡中的应用 总被引:3,自引:0,他引:3
文章用VerilogHDL语言在Altera公司的MAXPLUS-II集成软件环境下设计了一种基于CPLD(复杂可编程逻辑器件)的图像采集卡中的地址发生器和总线切换逻辑,实现了CPLD芯片EPM9320RC208地址发生器和总线切换的功能。 相似文献
7.
流密码的设计与分析在现代密码学中占有重要地位。简要介绍了流密码分析的基本原理和模型,主要包括:折中攻击、猜测和决定攻击、相关攻击、最佳仿射攻击、代数攻击和边信道攻击。然后基于Mathematica平台,使用简易密钥流发生器为测试对象,对其中的折中攻击、猜测和决定攻击及相关攻击进行了仿真实现。通过实验,揭示了流密码算法的一个重要设计原则:避免内部状态演变的线性性以及输出序列统计性质的偏向性。最后对流密码分析方法给予了总结和展望。 相似文献
8.
NSPK协议的Spin模型检测 总被引:2,自引:0,他引:2
NSPK协议是一个经典的认证密码协议.通过建立该协议的Promela模型,采用线性时序逻辑描述模型性质,并用模型检测工具Spin进行验证,进而生成入侵者的攻击序列. 相似文献
9.
基于QDI异步逻辑与四相双轨协议相结合时数据路径平衡的特性,能够实现双轨编码输入点的随机切换,从而达到各数据路径的平均功耗平衡,消除数据与功耗之间关联的目的.然而,现有的利用多路复用器实现数据路径随机切换的方法存在抗攻击弱点,削弱了系统的抗能量分析攻击能力.为此,我们提出了基于亚稳态的QDI随机路径切换方法:采用两级切换结构,利用亚稳态发生器和亚稳态滤波器,实现数据路径组和数据路径的随机切换.仿真结果表明,基于亚稳态的QDI随机路径切换方法具有良好的功耗平衡特性,能够很好的抵消由于寄生电容和负载电容差异造成的旁路信息泄露,从而极大地提高系统的安全性. 相似文献
10.
朱容葛 《微电子学与计算机》2007,24(1):113-115
论述基于FPGA技术兼有数字信号发生器和逻辑分析仪功能的虚拟仪器的设计方案及具体实现方法。FPGA集成了串口通信、分频、RAM读写、数据采集、信号发生器等功能模块,具有成本低,频率高,修改扩充方便、抗干扰性好等特点。利用VBWindows编程技术实现友好的虚拟仪器面板。 相似文献
11.
In this paper, a new class of almost binary sequence pair with a single zero element is presented. The almost binary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 2, 4, and 6. Most of them have good correlation and balance property, whose maximum nontrivial correlation magnitudes are 2 and the difference between the numbers of occurrence of +1’s and ′-1’s are 0 or 1. In addition, the corresponding binary sequence pairs are investigated as well and we can also get some kinds of binary sequence pairs with optimum balance and good correlation. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(6):732-736
A method of analysis is presented for the class of binary sequence generators employing linear feedback shift registers with nonlinear feed-forward operations. This class is of special interest because the generators are capable of producing very long "unpredictable" sequences. The period of the sequence is determined by the linear feedback connections, and the portion of the total period needed to predict the remainder is determined by the nonlinear feed-forward operations. The linear feedback shift registers are represented in terms of the roots of their characteristic equations in a finite field, and it is shown that nonlinear operations inject additional roots into the representation. The number of roots required to represent a generator is a measure of its complexity, and is equal to the length (number of stages) of the shortest linear feedback shift register that produces the same sequence. The analysis procedure can be applied to any arbitrary combination of binary shift register generators, and is also applicable to the synthesis of complex generators having desired properties. Although the discussion in this paper is limited to binary sequences, the analysis is easily extended to similar devices that generate sequences with members in any finite field. 相似文献
13.
最佳屏蔽二进序列偶在低/零相关区中的应用研究 总被引:1,自引:0,他引:1
将最佳屏蔽二进序列偶应用于低/零相关区中,提出最佳屏蔽低/零相关序列偶集的概念,给出了3种构造低/零相关序列偶集的方法,即奇数长最佳屏蔽二进序列偶与Hadamard矩阵相结合组成ZCZ(零相关区)序列集,偶数长最佳屏蔽二进序列偶与改造后的Hadamard矩阵组成LCZ(低相关区)序列集,以及任意长度最佳屏蔽二进序列偶与正交矩阵构成ZCZ序列集。利用这些构造方法,扩展了原有低/零低相关区存在的长度范围,扩大了序列集的容量,可以更好地满足工程应用的需要。 相似文献
14.
15.
Fast Correlation Attacks on the Summation Generator 总被引:2,自引:0,他引:2
The linear sequential circuit approximation method for combiners with memory is used to find mutually correlated linear transforms
of the input and output sequences in the well-known summation generator with any number of inputs. It is shown that the determined
correlation coefficient is large enough for applying a fast correlation attack to the output sequence to reconstruct the initial
states of the input linear feedback shift registers. The proposed attack is based on iterative probabilistic decoding and
appropriately generated low-weight parity-checks. The required output sequence length and the computational complexity are
both derived. Successful experimental results for the summation generators with three and five inputs are obtained.
Received 13 December 1996 and revised 7 October 1998 相似文献
16.
可分差集偶与几乎最佳二元序列偶的研究 总被引:4,自引:1,他引:3
在雷达、声纳等工程领域中具有良好相关性的序列得到广泛应用.几乎最佳二元序列偶具有良好的自相关性,它的异相自相关函数只有一点不为零.为了进一步研究几乎最佳二元序列偶,提出了一类新的区组设计——可分差集偶,研究了可分差集偶的性质,给出了可分差集偶与几乎最佳二元序列偶的对应关系,应用可分差集偶的性质得到了几乎最佳二元序列偶存在的必要条件.为应用可分差集偶这种区组设计的方法研究几乎最佳二元序列偶提供了理论依据. 相似文献
17.
Linear models for a time-variant permutation generator 总被引:2,自引:0,他引:2
Golic J.D. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1999,45(7):2374-2382
A keystream generator, known as RC4, consisting of a permutation table that slowly varies in time under the control of itself, is analyzed by the linear model approach. The objective is to find linear relations among the keystream bits that hold with probability different from one half by using the linear sequential circuit approximation method. To estimate the corresponding correlation coefficients, some interesting correlation properties of random Boolean functions are derived. It is thus shown that the second binary derivative of the least significant hit output sequence is correlated to 1 with the correlation coefficient close to 15·2-3n where n is the variable word size of RC4. The output sequence length required for the linear statistical weakness detection is then around 64n/225. The result can be used to distinguish RC4 from other keystream generators and to determine the unknown parameter n, as well as for the plaintext uncertainty reduction if n is small 相似文献
18.
19.
Bent-function sequences 总被引:12,自引:0,他引:12
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(6):858-864
In this paper we construct a new family of nonlinear binary signal sets which achieve Welch's lower bound on simultaneous cross correlation and autocorrelation magnitudes. Given a parametern withn=0 pmod{4} , the period of the sequences is2^{n}-1 , the number of sequences in the set is2^{n/2} , and the cross/auto correlation function has three values with magnitudesleq 2^{n/2}+1 . The equivalent linear span of the codes is bound above bysum_{i=1}^{n/4}left(stackrel{n}{i} right) . These new signal sets have the same size and correlation properties as the small set of Kasami codes, but they have important advantages for use in spread spectrum multiple access communications systems. First, the sequences are "balances," which represents only a slight advantage. Second, the sequence generators are easy to randomly initialize into any assigned code and hence can be rapidly "hopped" from sequence to sequence for code division multiple access operation. Most importantly, the codes are nonlinear in that the order of the linear difference equation satisfied by the sequence can be orders of magnitude larger than the number of memory elements in the generator that produced it. This high equivalent linear span assures that the code sequence cannot be readily analyzed by a sophisticated enemy and then used to neutralize the advantages of the spread spectrum processing. 相似文献