随机置换 meaning in Chinese
random permutation
Examples
- Random group and random permutation of idea
的随机群和随机置换 - Subdivide multi fractal - as above , but new vertices are randomly displaced within a user - defined range
不规则多次细分-与上一样,但它是在用户定制的范围内随机置换细分。 - Hcbc is proven secure against chosen - plaintext attacks assuming that e is a prp secure against chosen - plaintext attacks , while hpcbc is proven secure against choen - ciphertext attacks assuming that e is a prp secure against chosen _ ciphertext attacks
但是如果假设是一个抗选择密文攻击的安全伪随机置换,则可以证明hpcbc对选择密文攻击是安全的。 - 1 luby m , rackoff c . how to construct pseudorandom permutations from pseudorandom functions . siam journal on computing , 1988 , 17 : 373 - 386 . a preliminary version including other results appeared in proceedings of the 18th acm symposium on theory of computing , 1986 , pp . 356 - 363
可证明安全理论在分组密码中的研究始于luby和rackoff对des的工作,他们形式化地描述了分组密码的密码特性,依据不同的攻击,定义了伪随机置换和超伪随机置换的概念。