At CRYPTO 2022, Abdalla et al. incorporate the ability to compute the quadratic twist of elliptic curves to extend the framework of group actions introduced by Alamati et al. (ASIACRYPT 2020), and proposed two passwor...
详细信息
ISBN:
(纸本)9789819790524;9789819790531
At CRYPTO 2022, Abdalla et al. incorporate the ability to compute the quadratic twist of elliptic curves to extend the framework of group actions introduced by Alamati et al. (ASIACRYPT 2020), and proposed two password-authenticated key exchange (PAKE) protocols. Their first protocol X-GA-PAKE(l) is a provably secure one-round isogeny-based scheme with a password length of l, which improves security by increasing computation and communication overhead. In X-GA-PAKE(l), each party needs to choose 2l elements and perform 5l group actions. In this paper, we present an isogeny-based PAKE protocol that is more efficient than X-GA-PAKE(l). In our scheme, we reduce the number of set elements to l, thus the overhead of communication between users and servers is significantly decreased. By using the shuffle algorithm, the number of group actions that each party needs to perform is reduced to 2l, but our protocol can still prevent trivial attacks using twists. Due to the use of Merkle root and password in the shuffle function, the attackers cannot select a message from the received message. Also, the length of the message used for key derivation is reduced from 3l to l. We prove the security based on the security assumption in the isogeny-based setting.
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal...
详细信息
ISBN:
(纸本)9781424439867
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal lossless algorithms to compress the resized data. Experiment has been shown that the new algorithm has an effect on lossless compression JPEG image, and has been obtained a preferable compression ratio with little time cost. The new algorithm has been protected by China patent.
Blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and sof...
详细信息
ISBN:
(纸本)9781450365536
Blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software;it satisfies the basic requirements in cryptography with high in attack immunity and relatively low in algorithm complexity. In spite of undeniable success in cryptography, Blowfish (BF) still has drawbacks in the substitution and permutation of values in the substitution box (Sbox) that can affect the encryption and decryption of the algorithm. This study adopted Fisher-Yates shuffle (FYS) also known as Knuth shuffle (KS) for the permutation of S-box, and a modified Function F was used to enhance the BF algorithm to address this issue. The results show that Modified approach in Blowfish algorithm outperformed the Original Blowfish in the encryption, decryption, and throughput of the algorithm.
Observers for descriptor electrical circuits by the use of the shuffle algorithm are proposed. Necessary and sufficient conditions for the existence of the observers are given. The effectiveness of the proposed method...
详细信息
ISBN:
(纸本)9783319606996
Observers for descriptor electrical circuits by the use of the shuffle algorithm are proposed. Necessary and sufficient conditions for the existence of the observers are given. The effectiveness of the proposed method is demonstrated on a numerical example.
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of...
详细信息
ISBN:
(纸本)9781538615010
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. In this study, it is proposed to use the least significant bit (LSB) change method with a shuffle algorithm to hide data in color images in 24-bit JPEG format
This paper proposes a systematic procedure for the determination of state-space models from an available descriptor representation of a linear dynamic system. The goal is to determine a state equation, a set of algebr...
详细信息
This paper proposes a systematic procedure for the determination of state-space models from an available descriptor representation of a linear dynamic system. The goal is to determine a state equation, a set of algebraic equations and an output equation in terms of the state and input variables. It is shown that standard methods may fail to convert the descriptor representation to state-space form, even for simple electrical circuit models obtained from Kirchoff's laws and constitutive element equations. A novel procedure to address this problem is then proposed as an extension of the classic shuffle algorithm combined with a singular value decomposition approach. In addition to an illustrative example involving a simple electrical circuit, the proposed method is employed in a case study involving the modelling of three-dimensional RLC networks with a large number of components.
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal...
详细信息
ISBN:
(纸本)9781424439874
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal lossless algorithms to compress the resized data. Experiment has been shown that the new algorithm has an effect on lossless compression JPEG image, and has been obtained a preferable compression ratio with little time cost. The new algorithm has been protected by China patent.
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor s...
详细信息
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor structure inherently involves a product state space but, inside this product state space, the actual reachable state space can be much smaller. For such cases, we propose an improvement of the standard numerical algorithm, the so-called "shuffle algorithm", which necessitates only vectors of the size of the actual state space. With this contribution, numerical algorithms based on tensor products can now handle larger models. (C) 2006 Elsevier B.V. All rights reserved.
In this paper, numerical methods for the solution of linear singular differential system are analysed. The numerical solution of initial value problems by means of a finite difference approach and a possible implement...
详细信息
In this paper, numerical methods for the solution of linear singular differential system are analysed. The numerical solution of initial value problems by means of a finite difference approach and a possible implementation of the Drazin inverse vector product is discussed. Examples of index 1 and index 2 differential algebraic equations have been studied numerically. (C) 2012 Civil-Comp Ltd and Elsevier Ltd. All rights reserved.
Physical unclonable functions (PUFs) provide a promising solution for enhancing security and device authentication. Strong PUFs can generate quantities of challenge-response pairs(CRPs) but are vulnerable to machine l...
详细信息
ISBN:
(纸本)9798331540340;9798331540333
Physical unclonable functions (PUFs) provide a promising solution for enhancing security and device authentication. Strong PUFs can generate quantities of challenge-response pairs(CRPs) but are vulnerable to machine learning (ML) attacks. Weak PUFs must restrict direct access to the original response because they have limited CRPs. In this article, we present a shuffled Chaotic-dual-PUF structure(SCD-PUF) to defeat against ML attacks. Its working procedure is divided into two main stages: In the first phase, the weak PUF is used to generate secret bits as parameters for the chaotic configuration and along with the secret bits generated by the chaotic process, serve as the obfuscation configuration for the second phase. The second stage involves the Knuth-Durstenfeld shuffle algorithm, concatenation and XOR operations to obfuscate the challenges and responses at the same time. To prove the effectiveness of our proposal, we implement an example of SCD-PUF using Static Random-Access Memory(SRAM) PUF and Arbiter PUF(APUF) on Xilinx ZedBoard FPGAs. Using Logistic Regression (LR), Support Vector Machine (SVM), and Artificial Neural Networks (ANN) as attacking methods, the learning accuracy is maintained at around 51% even when the training data increase to one million, which proves our proposal has enough resistance to ML attacks. Also, the area overhead of our proposal is appropriate and acceptable.
暂无评论