The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length linear recurrence (or minimal polynomials) for the given multiple sequences over R. Its computational complexity is O(N2) multiplications in R where N is the length of each...
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDoS attack defense are discussed. Theoretical analysis proves the feasibility and effectiveness of the service hopping strategy. This paper draws a conclusion that adding service hopping...
To solve the problem that it is difficult to detect the failure-type hardware Trojan, this paper selects the failure-type hardware Trojan as the research subjects, putting forward the detection principles of failure-type hardware Trojan based on state transition diagram. It also designs and realizes the detection algorithm as well as provides the relative demonstrations of its correctness. The experiment...
In this paper we present a new framework for automatically proving the security of public-key cryptographic schemes in computational model. The framework uses the sequence-of-games approach to construct security proof. A probabilistic polynomial-time process calculus is designed to describe the attack games and the game transformations are executed with the help of observational equivalence. The framework...
RSA is one of the most popular and widely used public key cryptosystems. In this paper, an application of low private exponent attack on it is presented. More precisely, let (N, e) be an RSA public key with corresponding private key d, then N can be factored provided that there exists a proper integer k such that ek is relatively small and dk mod phi(N) is small (or large) enough. Experiment shows...
TA4SP is a state-of-art tool of AVISPA that can automatically verify security protocol with unbounded number of parallel sessions. But it still has some limitations and can't verify hierarchy of authentication automatically. In this paper, we use an approximation-based model to define security protocol and design an algorithm close to the real implementation to calculate the fix-point tree automata...
Fair exchange protocols have been studied intensively in recent years. But a lot of methods are still performed manually. In this paper an automatic method is proposed for analyzing fair exchange protocols. In this method we formalize security properties of fairness and non-repudiation in TLA (temporal logic of action) and define common predicates to make the analysis automatic. An "end"...
Aiming at the technique crux of system failure testing and function reconstruction, we carry on a research to the distilling method of the Boolean relation data. First, start with the analysis to the working wave character of target chip in the waveform confined space of system, and then on this foundation, the corresponding logic relation expression between signals of different logic types is given...
Near Term Digital Radio (NTDR) networks, which follow the cluster based design principles, are developed specifically to use in ad hoc settings. A major challenge in the design of these networks is their vulnerability to security attacks, due to unreliable wireless media, host mobility and lack of infrastructure. In this paper, we propose an elliptic curve secure communication scheme for NTDR networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.