The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum...
The paper expounds the progress made in the block cipher analysis techniques and summarizes the current situation of the block cipher analysis at home and abroad. Furthermore, the paper introduces and compares several common analysis techniques such as differential cryptanalysis, linear cryptanalysis, integral analysis, interpolation attacks, related key attacks, algebraic attacks, side channel attacks,...
The batch experiments were investigated to optimize chlorine disinfection for Copepod of zooplankton using response surface methodology. The independent variables were chlorine dosage, exposure time and organic matter concentrations. The experimental results showed that the body surface structure provided Copepod with strong protection against disinfection. The variables of dosage, exposure time and...
For the requirement of real time quality monitoring during the process industry, this paper presents a data exchange and analysis system based on real-time data stream integration. The system is consisted of information integration, data exchange, data synchronization, and etc, which is able to integrate read-time data stream of production process for industry and provide different kinds of information...
Since KASUMI algorithm is forbidden to use commercially in China, a new f8 keystream generator is presented by using SMS4 as core algorithm in this paper. Then the new f8 is implemented in software to produce 100 groups 20000-bit keystreams with different cipher keys. Later, FIPS 140-2 is applied to these keystreams to test randomness. Based on the data obtained, six figures are drawn to specify the...
In this paper, a new image encryption algorithm is presented based on Henon chaotic system in order to meet the requirements of secure image transfer. Shuffling the positions and changing the grey values of image pixels are combined to shuffle the relationship between the cipher-image and the original-image. First, the Arnold cat map is used to shuffle the positions of the image pixels. Second, the...
It is the well-known visual secret sharing (VSS) technique that encrypts a secret image into several share images and, later, decrypts the secret by stacking the share images and recognizing by the human visual system. Due to the perfect secrecy, VSS is one of well-candidate for achieving secure e-commerce. Furthermore, the other visual secret sharing technique is constructed by random grids. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.