Single cycle T-functions have received considerable attention recent years. The autocorrelation properties and the 2-adic complexity of the truncated sequence are investigated based on the special properties of single...
详细信息
Single cycle T-functions have received considerable attention recent years. The autocorrelation properties and the 2-adic complexity of the truncated sequence are investigated based on the special properties of single cycle T-function. The truncated sequence has better autocorrelation spectrum than that of the state output sequence, and has quiet high 2-adic complexity. The result shows that the truncated sequence of the single cycle T-function has rather good cryptographic properties. 2013 Binary Information Press.
Two pseudorandom number generators are devised based on the projective linear group over, outputting balanced sequences on meeting some statistical randomness properties. Sequences generated by the first generator hav...
详细信息
At CDCIEM 2012, Yang et al. proposed a new construction of somewhat homomorphic encryption scheme over integers, which is quite efficient in the perspective of the key size. In this paper, we present an effective latt...
详细信息
Wired equivalent privacy (WEP) is a security protocol in the IEEE 802.11 wireless standard. At present, three attacks are frequently exploited: chopchop attack, Korek attack, and PTW attack. The first can decrypt a pa...
详细信息
Quality of Service is an inevitable issue needing to be deal with in task scheduling of cloud computing. This paper proposes a task scheduling algorithm based on QoS-driven for cloud computing. Firstly, in order to re...
详细信息
Quality of Service is an inevitable issue needing to be deal with in task scheduling of cloud computing. This paper proposes a task scheduling algorithm based on QoS-driven for cloud computing. Firstly, in order to reflect the precedence relation of tasks, the proposed algorithm computes the priority of tasks according to the special attributes of tasks, and then sorts tasks by priority. Secondly, the algorithm evaluates the completion time of each task on different services, and schedules each task onto a service which can complete the task as soon as possible according to the sorted task queue. The experimental results based on CloudSim show that the algorithm can achieve good performance and load balancing by QoS driving from both priority and completion time.
Trust has attracted extensive attention in social science and computer science as a solution to enhance the security of the system. This paper proposes a trust evaluation model based on D-S evidence theory and sliding...
详细信息
Trust has attracted extensive attention in social science and computer science as a solution to enhance the security of the system. This paper proposes a trust evaluation model based on D-S evidence theory and sliding windows for cloud computing. The timeliness of the interaction evidence as the first-hand evidence is reflected by introducing sliding windows. The direct trust of entities is computed based on the interaction evidence by D-S evidence theory. The conflict of the recommendation trust as the second-hand evidence is eliminated with a help of an improved fusion approach as far as possible. Finally, the combination of the recommendation trust exposes the credibility of entities. Experimental results show that the proposed model is effective and extensible.
We generalize Boneh-Rubin-Silverberg method [3] to construct ordinary elliptic curves with embedding degree one, which provides composite order groups for cryptographic protocols based on such bilinear groups. Our con...
详细信息
As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two po...
详细信息
As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two points, then there are no exceptional cases to be described particularly. This feature is especially preferable for elegant codes of elliptic crypto-algorithms. Therefore, the unified and also complete point addition formula can provide the advantage for good security and convenient implementation. In this paper, we exploit sufficient and necessary condition for the existence of unified and complete point addition formula on several known elliptic curve models such as Weierstrass cu- bics, Jacobi quartics, Edwards curves, etc.. Moreover, we study another form of elliptic curves called Selmer curves. For practical application, we finally give some numerical examples of cryptographic secure Selmer curves.
The two indicators the sum-of-squares indicator and the absoluate indicator between two different Boolean functions f and g are introduced by Yu Zhou, Min Xie, Guozhen Xiao, On the global avalanche characteristics of ...
详细信息
Finding a recurrence of a shift register gives its equivalent shift register in Fibonacci configuration and hence helps to decide whether different nonlinear shift registers are equivalent, i.e., whether they generate...
详细信息
暂无评论