In this paper,we propose a new lightweight block cipher called *** main purpose of SCENERY design applies to hardware and software *** is a 64-bit block cipher supporting 80-bit keys,and its data processing consists o...
详细信息
In this paper,we propose a new lightweight block cipher called *** main purpose of SCENERY design applies to hardware and software *** is a 64-bit block cipher supporting 80-bit keys,and its data processing consists of 28 *** round function of SCENERY consists of 84×4 S-boxes in parallel and a 32× 32 binary matrix,and we can implement SCENERY with some basic logic *** hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology,and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles 0118-bit microcontrollers and 364 clock cycles on 64-bit *** with other encryption algorithms,the performance of SCENERY is well balanced for both hardware and *** the security analyses,SCENERY can achieve enough security margin against known attacks,such as differential cryptanalysis,linear cryptanalysis,impossible differential cryptanalysis and related-key attacks.
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different *** is anNP-hard combinatorial optimizat...
详细信息
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different *** is anNP-hard combinatorial optimization problem,which is widely applied in communication networks,multimodal transportation networks,and data *** approximation algorithms and heuristics algorithms have been proposed for the *** algorithm is a new meta-heuristic *** of its simplicity and easy implementation,it has been successfully applied in various ***,the basic firefly algorithm is not suitable for discrete *** this end,a novel discrete firefly algorithm for the MLST problem is proposed in this paper.A binary operation method to update firefly positions and a local feasible handling method are introduced,which correct unfeasible solutions,eliminate redundant labels,and make the algorithm more suitable for discrete *** results show that the algorithm has good *** algorithm can be extended to solve other discrete optimization problems.
This paper presents a new approach to selecting the initial seed set using stratified sampling strategy in bootstrapping-based semi-supervised learning for semantic relation classification. First, the training data is...
详细信息
We propose a new interpretation for a certain kind of ASO preference rules to handling prioritized symptoms. Our interpretation is based on the idea of dependence based priority propagation. Then, we present a fixpoin...
详细信息
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)*** DL network or model has been developed to improve the efficiency of ***,few studies have investigated the impact of...
详细信息
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)*** DL network or model has been developed to improve the efficiency of ***,few studies have investigated the impact of the different models on attack results and the exact relationship between power consumption traces and intermediate *** on the convolutional neural network and the autoencoder,this paper proposes a Template Analysis Pre-trained DL Classification model named TAPDC which contains three *** TAPDC model detects the periodicity of power trace,relating power to the intermediate values and mining the deeper features by the multi-layer convolutional *** implement the TAPDC model and compare it with two classical models in a fair *** evaluative results show that the TAPDC model with autoencoder and deep convolution feature extraction structure in SCA can more effectively extract information from power consumption ***,Using the classifier layer,this model links power information to the probability of intermediate *** completes the conversion from power trace to intermediate values and greatly improves the efficiency of the power attack.
Intensity modulation/direct detection(IM/DD) optical fiber communication system is an appropriate candidate for optical interconnect applications due to its low cost and low power consumption characteristics [1]. 4-le...
详细信息
Intensity modulation/direct detection(IM/DD) optical fiber communication system is an appropriate candidate for optical interconnect applications due to its low cost and low power consumption characteristics [1]. 4-level pulse amplitude modulation(PAM-4) is widely discussed in optical interconnects due to its simpler transceiver configuration and implementation [2].
Nonlinear multimode optical systems have attracted substantial attention due to their rich physical properties. Complex interplay between the nonlinear effects and mode couplings makes it difficult to understand the c...
详细信息
Nonlinear multimode optical systems have attracted substantial attention due to their rich physical properties. Complex interplay between the nonlinear effects and mode couplings makes it difficult to understand the collective dynamics of photons. Authors of recent studies have shown that such collective phenomena can be effectively described by Rayleigh-Jeans thermodynamics theory, which is a powerful tool for the study of nonlinear multimode photonic systems. These systems, in turn, offer a compelling platform for investigating fundamental issues in statistical physics, attributed to their tunability and the ability to access negative temperature regimes. However, to date, a theory for nonequilibrium transport and fluctuations is yet to be established. Here, we employ full counting statistics theory to study the nonequilibrium transport of particles and energy in nonlinear multimode photonic systems in both positive and negative temperature regimes. Furthermore, we discover that, in situations involving two reservoirs of opposite temperatures and chemical potentials, an intriguing phenomenon known as the loop current effect can arise, wherein the current in the positive energy sector runs counter to that in the negative energy sector. In addition, we numerically confirm that the fluctuation theorem remains applicable in optical thermodynamics systems across all regimes, from positive temperatures to negative ones. Our findings closely align with numerical simulations based on first-principles nonlinear wave equations. In this paper, we seek to deepen the understanding of irreversible nonequilibrium processes and statistical fluctuations in nonlinear many-body photonic systems which will enhance our grasp of collective phenomena of photons and foster a fruitful intersection between optics and statistical physics.
This paper addresses color filter array(CFA) color reproduction problem where the aim is to utilize an image captured by the CFA to produce an image with full color ***,conventional subband synthesis based color rep...
详细信息
This paper addresses color filter array(CFA) color reproduction problem where the aim is to utilize an image captured by the CFA to produce an image with full color ***,conventional subband synthesis based color reproduction techniques do not consider the noise during image acquisition and assume that the CFA data are *** tackle the noisy CFA data,a novel approach is proposed by inserting a subband denoising scheme into the conventional subband synthesis ***,conventional subband synthesis based techniques exploit the decimated wavelet transform that is not shift-invariant and could result in ringing artifacts in the *** alleviate these artifacts,the directional cycle-spinning(DCS) technique is ***,a new cycle-spinning pattern is proposed according to the sampling pattern of the Bayer CFA *** experiments are conducted to demonstrate that the proposed approach outperforms several approaches.
Multiple independent spanning trees have applications to fault tolerance and data broadcasting in distributed networks. There is a conjecture on independent spanning trees: any n-connected graph has n independent span...
详细信息
We study the problem of imitation learning in automated decision systems, in which a learner is trained to imitate an expert demonstrator. A widely used method is adversarial imitation learning that alternately optimi...
详细信息
暂无评论