At CRYPTO 2022, Abdalla et al. incorporate the ability to compute the quadratic twist of elliptic curves to extend the framework of group actions introduced by Alamati et al. (ASIACRYPT 2020), and proposed two passwor...
详细信息
ISBN:
(纸本)9789819790524;9789819790531
At CRYPTO 2022, Abdalla et al. incorporate the ability to compute the quadratic twist of elliptic curves to extend the framework of group actions introduced by Alamati et al. (ASIACRYPT 2020), and proposed two password-authenticated key exchange (PAKE) protocols. Their first protocol X-GA-PAKE(l) is a provably secure one-round isogeny-based scheme with a password length of l, which improves security by increasing computation and communication overhead. In X-GA-PAKE(l), each party needs to choose 2l elements and perform 5l group actions. In this paper, we present an isogeny-based PAKE protocol that is more efficient than X-GA-PAKE(l). In our scheme, we reduce the number of set elements to l, thus the overhead of communication between users and servers is significantly decreased. By using the shuffle algorithm, the number of group actions that each party needs to perform is reduced to 2l, but our protocol can still prevent trivial attacks using twists. Due to the use of Merkle root and password in the shuffle function, the attackers cannot select a message from the received message. Also, the length of the message used for key derivation is reduced from 3l to l. We prove the security based on the security assumption in the isogeny-based setting.
This paper proposes a systematic procedure for the determination of state-space models from an available descriptor representation of a linear dynamic system. The goal is to determine a state equation, a set of algebr...
详细信息
This paper proposes a systematic procedure for the determination of state-space models from an available descriptor representation of a linear dynamic system. The goal is to determine a state equation, a set of algebraic equations and an output equation in terms of the state and input variables. It is shown that standard methods may fail to convert the descriptor representation to state-space form, even for simple electrical circuit models obtained from Kirchoff's laws and constitutive element equations. A novel procedure to address this problem is then proposed as an extension of the classic shuffle algorithm combined with a singular value decomposition approach. In addition to an illustrative example involving a simple electrical circuit, the proposed method is employed in a case study involving the modelling of three-dimensional RLC networks with a large number of components.
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal...
详细信息
ISBN:
(纸本)9781424439867
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal lossless algorithms to compress the resized data. Experiment has been shown that the new algorithm has an effect on lossless compression JPEG image, and has been obtained a preferable compression ratio with little time cost. The new algorithm has been protected by China patent.
Observers for descriptor electrical circuits by the use of the shuffle algorithm are proposed. Necessary and sufficient conditions for the existence of the observers are given. The effectiveness of the proposed method...
详细信息
ISBN:
(纸本)9783319606996
Observers for descriptor electrical circuits by the use of the shuffle algorithm are proposed. Necessary and sufficient conditions for the existence of the observers are given. The effectiveness of the proposed method is demonstrated on a numerical example.
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of...
详细信息
ISBN:
(纸本)9781538615010
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. In this study, it is proposed to use the least significant bit (LSB) change method with a shuffle algorithm to hide data in color images in 24-bit JPEG format
Blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and sof...
详细信息
ISBN:
(纸本)9781450365536
Blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software;it satisfies the basic requirements in cryptography with high in attack immunity and relatively low in algorithm complexity. In spite of undeniable success in cryptography, Blowfish (BF) still has drawbacks in the substitution and permutation of values in the substitution box (Sbox) that can affect the encryption and decryption of the algorithm. This study adopted Fisher-Yates shuffle (FYS) also known as Knuth shuffle (KS) for the permutation of S-box, and a modified Function F was used to enhance the BF algorithm to address this issue. The results show that Modified approach in Blowfish algorithm outperformed the Original Blowfish in the encryption, decryption, and throughput of the algorithm.
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal...
详细信息
ISBN:
(纸本)9781424439874
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal lossless algorithms to compress the resized data. Experiment has been shown that the new algorithm has an effect on lossless compression JPEG image, and has been obtained a preferable compression ratio with little time cost. The new algorithm has been protected by China patent.
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor s...
详细信息
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor structure inherently involves a product state space but, inside this product state space, the actual reachable state space can be much smaller. For such cases, we propose an improvement of the standard numerical algorithm, the so-called "shuffle algorithm", which necessitates only vectors of the size of the actual state space. With this contribution, numerical algorithms based on tensor products can now handle larger models. (C) 2006 Elsevier B.V. All rights reserved.
The infinitesimal generator matrix underlying a multidimensional Markov chain can be represented compactly by using sums of Kronecker products of small rectangular matrices. For such compact representations, analysis ...
详细信息
The infinitesimal generator matrix underlying a multidimensional Markov chain can be represented compactly by using sums of Kronecker products of small rectangular matrices. For such compact representations, analysis methods based on vector-Kronecker product multiplication need to be employed. When the factors in the Kronecker product terms are relatively dense, vector-Kronecker product multiplication can be performed efficiently by the shuffle algorithm. When the factors are relatively sparse, it may be more efficient to obtain nonzero elements of the generator matrix in Kronecker form on the fly and multiply them with corresponding elements of the vector. This work proposes a modification to the shuffle algorithm that multiplies relevant elements of the vector with submatrices of factors in which zero rows and columns are omitted. This approach avoids unnecessary floating-point operations that evaluate to zero during the course of the multiplication and possibly reduces the amount of memory used. Numerical experiments on a large number of models indicate that in many cases the modified shuffle algorithm performs a smaller number of floating-point operations than the shuffle algorithm and the algorithm that generates nonzeros on the fly, sometimes with a minimum number of floating-point operations and as little of memory possible.
In this paper, numerical methods for the solution of linear singular differential system are analysed. The numerical solution of initial value problems by means of a finite difference approach and a possible implement...
详细信息
In this paper, numerical methods for the solution of linear singular differential system are analysed. The numerical solution of initial value problems by means of a finite difference approach and a possible implementation of the Drazin inverse vector product is discussed. Examples of index 1 and index 2 differential algebraic equations have been studied numerically. (C) 2012 Civil-Comp Ltd and Elsevier Ltd. All rights reserved.
暂无评论