SEED is a 128-bit block cipher supporting 128, 192 and 256-bit secret keys. It has been adopted as a national industrial association standard (TTAS KO-12.0004) at 1999 and ISO/IEC 18033-3 and IETF RFC 4269 at 2005. Th...
详细信息
SEED is a 128-bit block cipher supporting 128, 192 and 256-bit secret keys. It has been adopted as a national industrial association standard (TTAS KO-12.0004) at 1999 and ISO/IEC 18033-3 and IETF RFC 4269 at 2005. The first cryptanalytic result on DFA is proposed in 2004. After that Jeong et al. proposed DFAs on SEED-128/192/256. In these attacks, an attacker can induce 1-bit random fault to input registers of the last G function in the target round. In this assumption, he can recover the secret key by using 48, 72 and 96 fault injections for SEED-128/192/256, respectively. In this paper, we propose improved differential fault attack on SEED-128. In our attack, it is assume that an attacker can induce 1-byte random fault to input registers of the second G function in the target round. By using only 4 fault injections, the proposed attack can recover the secret key of SEED-128 on average 1 minute.
This paper discusses the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). It first overviews the evolution of the new field to its predecessors: searching in the mobile computing, u...
详细信息
In this paper, we apply two-stage fuzzy comprehensive evaluation of fuzzy theory to evaluate the recommendation trust vector of P2P network nodes, which fully reflects the effect of various factors on trust evaluation...
详细信息
In modern society, there exist many different types of authentication processes that we are unaware of not only in IT fields but also in our daily lives. Many recent issues of cyber crimes target weak passwords or car...
详细信息
ISBN:
(纸本)9781424492220
In modern society, there exist many different types of authentication processes that we are unaware of not only in IT fields but also in our daily lives. Many recent issues of cyber crimes target weak passwords or careless management of passwords. This fact proves the importance of user authentication. In this paper, a secure user authentication scheme using smart cards in IPTV and also offer, by using smart cards and bio information to ensure strong security and a secure user authentication scheme is proposed. We propose extended model of "Fingerprint-based access control using smart card in IPTV" suggested in the previous work. We can extend our scheme to provide contents to subscribers according to an attribute of a subscriber instead of an age by modifying the function in the registration phase. And we analyzed the security of our proposed scheme about caused by malicious attacks.
Summary form only given. In the recent past the abstraction in system-level design has been significantly increased to manage the increasing complexity of modern embedded systems. To establish such higher abstraction ...
Summary form only given. In the recent past the abstraction in system-level design has been significantly increased to manage the increasing complexity of modern embedded systems. To establish such higher abstraction levels, Models of Computation (MoC) were introduced to the design flow. In this talk the advantages and benefits of a MoC based workflow are advocated. We illustrate this process by exploiting the Discrete Event Specified System (DEVS) MoC. Because of embodying an event-based specification, this model is highly applicable for codesign purposes. In addition, reconfigurable hardware architectures have emerged as a promising technique to increase the flexibility of hardware design. While this new technology is still in its infancy, especially the support of dynamic reconfiguration will clearly expand the present limitations of both hardware and embedded systems design. Currently, the development of dynamically reconfigurable systems is still lacking an established design methodology. Most research in this area tries to extend classical hardware design flows. We see the main disadvantage of these approaches in their lack of an underlying formal model of computation. Therefore, a formal MoC named RecDEVS is introduced and exploited as a computational foundation for the development of a comprehensive reconfigurable embedded systems design methodology. The resulting workflow for reconfigurable embedded systems consisting of formal verification, validation, SW/HW-codesign, and HW synthesis is then detailed and demonstrated for real-life application examples.
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we have developed a new technology called "PAIH" (Public Address information Hiding) which is a technology to overlay information such as position or destination on siren sound of urgent vehicles. Siren sound is allowed to degrade of sound quality, but PAIH is required to decode correct information from siren sound with pitch shift (Doppler effect) or under noisy environment.
In this paper we argue for a word-sense based formalization for collocation, and proposes a seed-based approach for collocation extraction for specific purposes. The approach uses RFR-SUM model to iteratively classify...
详细信息
With the development of Internet, Email has become an important interaction manner. At the same time, spam becomes a boring thing in our life, and people pay more and more attention to spam filter. In this paper, we p...
详细信息
With the development of Internet, Email has become an important interaction manner. At the same time, spam becomes a boring thing in our life, and people pay more and more attention to spam filter. In this paper, we p...
详细信息
With the development of Internet, Email has become an important interaction manner. At the same time, spam becomes a boring thing in our life, and people pay more and more attention to spam filter. In this paper, we propose a method that uses N-Gram to calculate characters and uses X statistical method to extract characters, and then uses incremental Native Bayes arithmetic to hold up spam. In order to arise accuracy we use the filter method over and over again. The experiments show that our method is very effective, which greatly raises the accurarcy while keeping a minor error ratio.
In this paper, the problems of secure multi-party ranking and secure selection were studied. Two protocols were proposed. They were both based on Secure Sum protocol. Secure multi-party ranking problem is an extended ...
详细信息
暂无评论