›› 2012, Vol. 42 ›› Issue (05): 1257-1261.
Previous Articles Next Articles
LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing
CLC Number:
| [1] National Bureau of Standards. FIPS PUB 74. Guidelines for Implementing and Using the NBS Data Encryption Standard[S]. 1981. [2] Spies T. Format preserving encryption[Z]. Unpublished White Paper. http://www.voltage.com, 2008. [3] Black J, Rogaway P. Ciphers with arbitrary finite domains//Topics in Cryptology-CT-RSA'02, Springer, 2002:114-130. [4] Spies T. Feistel finite set encryption mode. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffsem/ffsem-spec.pdf,2008. [5] Bellare M, Ristenpart T, Rogaway P, et al. Format-preserving encryption//Selected Areas in Cryptography (SAC 2009). Berlin:Springer, 2009. [6] Bellare M, Rogaway P, Spies T. The FFX mode of operation for format-preserving encryption. http://www.csrc.nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/ffx/ffx-spec.pdf,2011. [7] Brier E, Peyrin T, Stern J. BPS: a format-preserving encryption proposal. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/bps/bps-spec.pdf,2010. [8] 刘哲理,贾春福,李经纬. 保留格式加密模型研究[J]. 通信学报, 2011,32(6): 184-190. Liu Zhe-li, Jia Chun-fu, Li Jing-wei. Research on the format-preserving encryption modes[J]. Journal on Communications, 2011,32(6) :184-190. [9] Radhakrishnan R, Kharrazi M, Memon N. Data masking: A new approach for steganography[J]. The Journal of VLSI Signal Processing, 2005,41(3):293-303. [10] Stütz T, Uhl A. Efficient format-compliant encryption of regular languages: block-based cycle-walking//11th IFIP TC 6/TC 11 International Conference. Springer, 2010:81-92. [11] Liu Zhe-li, Jia Chun-fu, Li Jing-wei, et al. Format-preserving encryption for datetime//Proceedings of the 2th International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). Xiamen China, 2010:201-205. [12] Luby M,Rackoff C.How to construct pseudorandom permutations and pseudorandom functions[J].SIAM Journal on Computing,1988,17(2):373-386. [13] Patarin J. Security of random Feistel schemes with 5 or more rounds//Cryptology-CRYPTO'04. Berlin:Springer, 2004: 135-158. [14] Ulf Mattsson. Format controlling encryption using datatype preserving encryption. http://eprint.iacr.org/2009/257,2009. [15] Morris B, Rogaway P, Stegers T. How to encipher messages on a small domain//Advances in Cryptology-CRYPTO'09, 2009. |
| [1] | DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604. |
| [2] | LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267. |
| [3] | DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272. |
| [4] | DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600. |
| [5] | QIN Min, GUO Yu-kun, LI Jin-ping. Ojectionable video detecting based on multiple color space [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 283-286. |
| [6] | ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340. |
| [7] | WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363. |
| [8] | WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367. |
| [9] | LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242. |
| [10] | LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250. |
| [11] | CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256. |
| [12] | LIU Yan-heng, FU Feng, ZHU Jian-qi, SUN Xin. DoS detection model base on alive entropy [J]. 吉林大学学报(工学版), 2011, 41(4): 1059-1064. |
| [13] | LI Rui-Xue, FANG Zhi-Yi, YI Ting-Ting. Improved DVHop localization algorithm based on regularly moving anchor(RMAN) and received signal strength indicator(RSSI) and its performance analysis [J]. 吉林大学学报(工学版), 2011, 41(02): 435-0441. |
| [14] | QU Liang-Dong, LIU Yan-Hang, WEI Da. System of vertical handoff for heterogeneous wireless network based on VPN on invehicle gateway [J]. 吉林大学学报(工学版), 2010, 40(05): 1292-1297. |
| [15] | SUN Zhi-Xin, ZHANG Yu-Feng. P2P network traffic identification model based on MSVM [J]. 吉林大学学报(工学版), 2010, 40(05): 1298-1302. |
|
||