The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient identity based signature/signcryption in the standard model with full security has been pursued for a long time. At ISDPE'07, Ren and Gu claimed to construct efficient identity based signature/signcryption schemes with full security in the standard model. They claimed their schemes have short public parameters, high efficiency and a tight reduction. But in this paper we give attacks to their...
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically changed during the verification which can...
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption in a logical single step,at lower computational costs and communication overheads than the traditional signature-then-encryption approach. In this paper,an ID-based proxy multi-signcryption scheme from pairings,which combines a proxy multi-signature scheme with a signcryptin,is...
Random number generation methods are subjected to numerous researches in various fields such as cryptography. In this research, statistical quality of a few million digits of binary expansion of some irrational numbers has been tested through dozen of standard tests developed for random and pseudorandom number generators. The results indicate that digits of binary expansion of these numbers can be...
This paper presents an originally encryption system implemented on a structure of hybrid additive programmable cellular automata (HAPCA). As the development of cellular automata (CA) applications is generally an experimental effort, the research implies the exploration through simulation of the huge space of cellular automata local rules and global states. The encryption and decryption modules are...
Stream ciphers are widely used for information security. The keystream produced by a cipher must be unpredictable. Attacks on stream ciphers typically exploit some underlying patterns existing in the keystream. The objective of this paper is to develop such an attack with the help of machine learning algorithms. The Linear Feedback Shift Register (LFSR) has been solved for several test cases using...
A novel pseudorandom sequence generator is presented in this paper. The genesis of this new generator is evolved from the concept of lagged Fibonacci generator by Geroge Marsagalia (1992) applied to points on elliptic curves over a finite field. It is observed that the generator has a long period. Also a successful statistical testing of the randomness attributes of the given generator, in accordance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.