58 Hits in 9.1 sec

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme [chapter]

Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017 Lecture Notes in Computer Science  
This disparity is especially great for the cubic version of the Simple Matrix Encryption Scheme.  ...  This work therefore demonstrates that choosing a field of characteristic 2 for the Simple Matrix Encryption Scheme or its cubic variant will not provide any additional security value.  ...  In the next section, we present the structure of the Cubic ABC Simple Matrix encryption scheme.  ... 
doi:10.1007/978-3-319-59879-6_15 fatcat:m2sdxehkuvbxfav2xae3ii4uzy

Circulant UOV: a new UOV variant with shorter private key and faster signature generation

2018 KSII Transactions on Internet and Information Systems  
We estimate that the private key size of Circulant UOV is smaller by about 45% than that of the regular UOV and its signing speed is more than 14 times faster than that of the regular UOV.  ...  UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant.  ...  A lot of MPKC encryption and signature schemes have been proposed, e.g., TTS [6] , MQQ [7] , ABC [8] , HFE [9] , ZHFE [10] , EFC [50] etc.  ... 
doi:10.3837/tiis.2018.03.022 fatcat:2cxslubqb5c6jhtthhvae4jv4e

New First-Order Secure AES Performance Records

Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.  ...  gap by introducing first-order glitch-extended probing secure masked AES implementations highly optimized for FPGAs, which support both encryption and decryption.  ...  390781972 and through the project 406956718 SuCCESS.  ... 
doi:10.46586/tches.v2021.i2.304-327 fatcat:r2st3yhkbjga7ar347ahr4jsm4

Data Service Outsourcing and Privacy Protection in Mobile Internet [chapter]

Zhen Qin, Erqiang Zhou, Yi Ding, Yang Zhao, Fuhu Deng, Hu Xiong
2018 Data Service Outsourcing and Privacy Protection in Mobile Internet  
Preface The data of mobile Internet have the characteristics of large scale, variety of patterns, complex association and so on.  ...  control through effective user privacy protection mechanism, and the data sharing in the mobile Internet, which provide technical support for improving various service applications based on mobile Internet  ...  The only reason for describing the basic scheme is to improve the readability of the full scheme.  ... 
doi:10.5772/intechopen.79903 fatcat:kvdisoudirgdhd7tvscnhsb6gm

The Past, Evolving Present, and Future of the Discrete Logarithm [chapter]

Antoine Joux, Andrew Odlyzko, Cécile Pierrot
2014 Open Problems in Mathematics and Computational Science  
In particular, this is the case for the multiplicative groups of finite fields with medium to large characteristic and for the additive group of a general elliptic curve.  ...  This intractability hypothesis is also the foundation for the security of a large variety of other public key systems and protocols.  ...  The next two important applications were the identitybased encryption scheme of Boneh and Franklin [BF03] and the short signature scheme of Boneh, Lynn and Shacham [BLS04] .  ... 
doi:10.1007/978-3-319-10683-0_2 fatcat:ykp3rhh2lnhn5ml4otrrfszoii

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
Primarily, this is due to the explosion in the availability of data, significant improvements in ML techniques, and advancement in computing capabilities.  ...  Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management.  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs.  ...  Moreover, this paper discussed the processing of packets forwarding within DAIM model as well as the risk scenarios of the DAIM model.  ...  Based on R-RAPSE, we verify and improve E. J. Yoon's scheme [2] , J. S. Cho's scheme [3] and S. I. Ahamed's scheme [5] .  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

The Autodidactic Universe [article]

Stephon Alexander, William J. Cunningham, Jaron Lanier, Lee Smolin, Stefan Stanojevic, Michael W. Toomey, Dave Wecker
2021 arXiv   pre-print
This correspondence is not an equivalence, partly because gauge theories emerge from N →∞ limits of the matrix models, whereas the same limits of the neural networks used here are not well-defined.  ...  We propose that if the neural network model can be said to learn without supervision, the same can be said for the corresponding physical theory.  ...  The action is then S = T rM 3 = abc T r r A a A b A c , (92) and the equations of motion are [A a , A b ] = 0 , (93) We specify a solution to a cubic matrix model by the following parameters • Pick a gauge  ... 
arXiv:2104.03902v2 fatcat:zlq7swbxa5b6xhoruxai6xr5du

A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks

Vishal Sharma, Rajesh Kumar
2014 Journal of Intelligent and Robotic Systems  
schemes Additive in- crease and Binary search increase Cubic [Ha et al. 2008] [121] Long distance networks Enhances fairness property of BIC with Cubic window growth function Hybla [Caini and  ...  with Attackers Parameter Variation For 2% Attackers Variation For 5% Attackers Cognitive Delivery Rate during Intrusion 21.23% 21.6% Situational Classification Time 42.93% 37.57% Network Trigger  ...  Section 9.3 brings out the certain limitations of the work done. Finally, Section 9.4 presents the scope of future work for possible extension of the present work.  ... 
doi:10.1007/s10846-014-0091-0 fatcat:uvcsvijwa5egxl5bwh4adsxugu

The Complexity of Quantum States and Transformations: From Quantum Money to Black Holes [article]

Scott Aaronson
2016 arXiv   pre-print
Those topics include the power of quantum proofs and advice states; how to construct quantum money schemes secure against counterfeiting; and the role of complexity in the black-hole information paradox  ...  topics of recent interest in the field.  ...  While we explained these attacks for Wiesner's scheme, the same attacks work with only minor modifications for the BBBW scheme-or indeed, for any scheme where the banknotes consist of unentangled qubits  ... 
arXiv:1607.05256v1 fatcat:mnpmspgwlrdk5pm3fcsthl3lui

A Special issue on Multidisciplinary research to promote the applications in Biological sciences

Guest Editor Dr. M. Manikandan
2022 International Journal of Life Science and Pharma Research  
The articles in this issue are led by editors who are experts in the subject and oversee the editorial process for papers.  ...  This provides a platform for the researchers to publish their innovative research findings.  ...  Acknowledgement The authors express their gratitude towards the host institution and Biozone, Chennai.  ... 
doi:10.22376/ijpbs/ijlpr/sp22/2022.1-154 fatcat:rcydgammlzgodof3kw3fcdgpji

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
Qinlong etal presented a paper that uses broadcast encryption technique that are identity based, the encrypted health data of patients are outsourced on the cloud and are shared among the group of doctors  ...  Preventing various attacks are presented in the first scenario and the second scenario presents the analysis of communication and computational complexity of Easy SMS protocol [6].  ...  In the convolution matrix the RGB value of the each image value can be stored in the matrix format. Fig5. Discrete convolution matrix D.2 SVM classifier Support Vector Machine.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

An episodic history of mathematics: mathematical culture through problem solving

2010 ChoiceReviews  
If the encryption scheme is P → Q ≡ aP + b, then the decryption scheme must be the inverse function. In other words, we solve for P in terms of Q.  ...  The ciphertext AUACCEE results from applying the encryption scheme P −→ 3P 2 − P + 2 to a certain 7-letter text. The trouble with this encryption scheme is that it is not one-to-one.  ...  The result is LTFBFD . Thus the encryption of "GO AWAY" is "LTFBFD". Notice that we have no coding for a blank space, so we ignore it. This is a very simple example of a cryptosystem.  ... 
doi:10.5860/choice.48-1529 fatcat:r52umdi4vja6bfxb7kmudrn4ui

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
The Defense Advanced Research Projects Agency (DARPA) FY2016 amounted to $2.868 billion in the President's request to support high-risk, high-reward research.  ...  for the encryption of messages in the 1970's.  ...  -Identify optimal stimulation parameters for improving spatial memory.  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+115 others)
2017 International Journal of Network Security   unpublished
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications.  ...  Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer.  ...  This work is supported by the National Natural Science Acknowledgements The authors would like to thank the authorities of Bharathiar University, Coimbatore, India for providing the necessary laboratory  ... 
« Previous Showing results 1 — 15 out of 58 results