Vectorial Boolean functions are used as the nonlinear components in stream *** security of the cipher system depends on the cryptographic properties of the *** widely accepted criteria are balancedness,high nonlineari...
详细信息
Vectorial Boolean functions are used as the nonlinear components in stream *** security of the cipher system depends on the cryptographic properties of the *** widely accepted criteria are balancedness,high nonlinearity,correlation immune and so *** this paper,we present a new construction method of balanced vectorial Boolean functions with strictly almost optimal *** the first time,the first-order correlation immune functions with currently best known nonlinearity 2n-1-2n/2-1-2[n/4」 are *** is also shown that our functions can have good algebraic degree.
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. ...
详细信息
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. In this paper, we consider the identification of 5 frequently used block ciphers, AES, DES, 3DES, RC5 and Blowfish. For multi-class identification, the identification rate of 5 block ciphers can reach above 90% as long as the size of ciphertext file is larger than 100 KB when same key and same IV for training and testing ciphertext files. For one to one identification, we identify AES from other 4 block ciphers on condition of different keys or different IVs for training and testing ciphertext files. We can obtain an identification rate of above 97% when the size of ciphertext file is equal to 100 KB. Besides, even if the size of ciphertext file is only 4 KB, the average identification rate is still higher than 80%.
We demonstrate a frequency-shifted self-heterodyne method for evaluating the characteristics of optical filters. The method enables simultaneously extracting the magnitude- and phase-frequency response within wide fre...
详细信息
ISBN:
(纸本)9781943580705
We demonstrate a frequency-shifted self-heterodyne method for evaluating the characteristics of optical filters. The method enables simultaneously extracting the magnitude- and phase-frequency response within wide frequency range based on harmonic heterodyne and Wiener-Lee transformation.
Power analysis attack is a powerful cryptanalytic technique aiming to extract the secret data from a cryptographic device by collecting and analyzing power consumption traces. In this paper, we present a practical pow...
详细信息
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol that eliminates all possible attacks on the detector side and the necessity of reference-frame alig...
详细信息
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol that eliminates all possible attacks on the detector side and the necessity of reference-frame alignment in source sides. However, its performance may degrade notably due to statistical fluctuations since more parameters, e.g., yields and error rates for mismatched-basis events, must be accumulated to monitor the security. In this work, we find that the original decoy states method estimates these yields overpessimistically since it ignores the potential relations between different bases. Through jointly processing parameters of different bases, the performance of RFI-MDI-QKD is greatly improved in terms of the secret key rate and achievable distance when statistical fluctuations are considered (the statistical fluctuation analysis is the first step to the final analysis of the finite key size effect). Our results pave an avenue towards practical RFI-MDI-QKD.
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M. Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, th...
详细信息
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M. Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, the TF-QKD without phase postselection proposed by Cui et al. [Phys. Rev. Appl. 11, 034053 (2019)] is an elegant TF-QKD that can provide high key rates since the postselection of global phases has been removed. However, the achievable distance of this variant is shorter than that of the original phase-matching QKD [X. Ma, P. Zeng, and H. Zhou, Phys. Rev. X 8, 031043 (2018)]. In this paper, we propose a method for improving its performance by introducing an additional decoy mode. The upper bound of the information leakage can be more tightly estimated; hence, both the key rate and the achievable distance are significantly improved. Interestingly, the operation of the proposed additional decoy mode is the same as that of the code mode; hence, it does not introduce difficulties into the experimental system. In addition, the improvement is substantial with finite decoy states, which is meaningful in practice.
Software testing is essential to ensure that the software Quality. On most software projects testing activities consume at least 30 percent of the project effort. On safety critical applications, software testing can ...
详细信息
Software testing is essential to ensure that the software Quality. On most software projects testing activities consume at least 30 percent of the project effort. On safety critical applications, software testing can consume between 50 to 80 percent of project effort. While the scale of software development and application expands dramatically, to guarantee the quality and reliability of software is becoming a huge challenge. For the ever-expanding software to reach the standard of Software Engineering, the best possible testing should be applied. During the testing, automatic generation of test data is especially important for improving testing efficiency. This paper presents the results of the author's study on problems and algorithms related to the automatic generation of software testing data. Results indicated that the method designed by the author can be used to perform iterative computation on needed data more efficiently, and then reach an essentially feasible solution. Although the exploratory study presented here proved rather demanding because few had adopted the approach, it has achieved positive results in improving the validity and the temporal and spatial complexity of the existent iterative algorithm.
In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hie...
详细信息
In wireless sensor networks (WSNs) environment, since the battery limitation of the node energy, energy efficiency is an key factor should be considered as the communication methods are designing. As classical and hierarchical routing protocols, Leach Protocol plays an important role. In response to the uneven energy distribution that is caused by the randomness of cluster heads forming, this paper presents a increased method of Leach protocol which is intended to trade off the energy consumption of the entire network and extend the life of the network. The new algorithm is verified by simulation platform, the simulation results show that the energy consumption and the lifetime of the network are both well improved than that of original Protocol.
Let f(x) ∈ Z[x] be a nonconstant polynomial. Let n, k and c be integers such that n ≥ 1 and k ≥ 2. An integer a is called an f-exunit in the ring Zn of residue classes modulo n if gcd(f(a), n) = 1. In this paper, w...
详细信息
Let p be a prime, k a positive integer and let Fqbe the finite field of q = pkelements. Let f(x) be a polynomial over Fq and a ∈ Fq. We denote by Ns(f, a) the number of zeros of f(x1)+⋯+f(xs) = a. In this paper, we s...
详细信息
暂无评论