HFEM. Breaking the HFEM public key scheme
|
|
- Basil Fox
- 5 years ago
- Views:
Transcription
1 4 Vol.4 No. 0 Joural o Commuicatios March 0 doi:0.969/j.iss x HFEM ( ,, MQ HFEM MQ MQ P09. A X(0) reaig the HFEM pulic ey scheme GU Chu-sheg,, (. chool of Computer Egieerig, Jiagsu Uiversity of hology, Chagzhou 00, Chia;. chool of Computer ciece ad echology, Uiversity of ciece ad echology of Chia, Hefei 007, Chia;. Key Laoratory of Cloud Computig & Itelliget Iformatio Processig of Chagzhou City, Chagzhou 00, Chia) Astract: o desig post-uatum pulic ey cryptography, Zhao, et al preseted a ovel pulic ey scheme ased o the MQ prolem. A euivalet secret ey could directly e solved from the pulic ey of their scheme y applyig the property of the ergodic matrix over fiite field. hus, the HFEM pulic ey scheme was roe. Key words: post-uatum cryptography; MQ-ased PKC; MQ prolem; cryptaalysis [,] [] [4~9] [4~6,8] GF( ) hamir [0~] [] [4] MQ (isectio multivariate uadratic euatio prolem) [4] MQ NP [4] HFEM(hidde field ergodic matrices) [4] (64007); (CJ000); (KYY07, KYY055) Foudatio Items: he Natioal Natural ciece Foudatio of Chia (64 07); he Applicatio Research Foudatio of Chagzhou (CJ000); he Research Foudatio of Jiagsu Uiversity of echology (KYY07, KYY055)
2 86 4 [4] W W W, E = E = E = ( W ) W = = E E [4] HFEM [4] m F F m GL ( F ) F I M M M M F E F [ E] = { E Z} m m A F F = { A A A } F x, y F x y = ( x y, L, x y, L, x y, L, x y ) F MQ- F m F i = j = ( x, L, x, y, L, y ) = {, L, } F V ( ) = { x x F } [4] HFEM ) ( A, ) A = { A, L, F = {, L, } F A E [ E] ) R GL ( F ) 0 ( ) ( ) i, j i j i, j 0 0 HFEM HFEM a x y =, ( a, F, =,, L, m) A } R = R[ ] F i j i j i = i i i F m ) R MQ [ r ( x, y), L, r ( x, y)] = RA ( x y) p = ( F, r = [ r ( x, y), L, r ( x, y)]) 4) s = ( A,, R) ) P = a ( a, F \ {0}) ) p P C = [ r ( a, ), L, r ( a, )] F \ {0} ) s C = ( R C) ( V ( A) V ( )) \ {0} ) s E( A,, ) ( x, y) ( F \{0}) ) ( x, y) ( a, ) P = x y = a [4] E ( A,, ).( x y) = Ra( ) = A,, A,, A,, A = L L L [4] A, ( A, ) E( A,, ) HFEM [4] MQ NP ( ) [4] HFEM MQ HFEM V ( ) f ( l ) E F [ E ] = f ( l ) f ( l ) = l I E f ( l ) f ( l ) f ( l ) ) f ( l ) f ( l ) = g ( l ) g ( l ) deg( g ( l )) = < deg( g ( l )) = gcd( g ( l ),
3 HFEM 87 g ( l )) = E f (0) = E 0 g (0) 0, g (0) 0 F deg( g ( l )) = g (0) 0 [ l ] /( g ) i r s { l i = 0, L, } l, l r s l l mod g( l ) 0 < e l l e e mod g ( l ) 0 < e mod g ( l ) ee gcd( g ( l ), g ( l )) = l mod f ( l ) 0 < e e < F [ E ] = f ( l ) E e l mod f ( l ) e = ( ) ( e e ) r ) f ( l ) f ( l ) = g( l ), r g( l ) g(0) 0 / r e e = l mod g( l ) f / r r r ( l ) = g( l ) ( l ) F F p F F p F F v v p ) r r ( l ) ( l v p v / r v / r p ( ) ( ) p = l l mod f ( l ) e e = l mod f ( l ) v / r ( ) ( p ( )) l F f ( l ) F [ l ] E F [ E ] = 0 f ( l ) E = { E, E, L, E } F [ E] p f ( l ) F [ l ] /( f ) r ( l ) F [ l ] /( f ) = E F r( l ) = l mod f ( l ) E r( E) F r( E) E F [ E] / / r r [ E] U{0} F f ( l ) E f ( E) E g( E ) = 0 [ E] = { E, E, L, E } F [ E] {,,, = I E L E } F [ E] V ( ) = V ( ) = F [ E] U{0} 0 F ( i =, L, ) I + E + L+ E = 0 E 0 ( E I + E + L+ E ) = E 0 E + E + + E = 0 = {, L, } F A = { A, L, } F R GL ( F ) R = R [ ] A F F [ E] = { I,, L, } R F [ E] HFEM R = R[ ] A A M A = R = = W W L W R R Q R = A = R R Q W R Q R Q + RA = = W R Q R Q + R GL ( F ) A [5] i ( L ) R R Q = L R R Q R Q R Q + R Q + R Q W W L W L ( L ) F ( )
4 88 4 ra( R) + ra( A) ra( RA) mi(ra( R), ra( A)) ra( RA) = W GL ( F ) F W GL ( F ) W = ( W ) W = Q = W W = { I,, L, } A = W [ E], A O( ) 4 i i =,, ( - ) O( ) = O( ) A O( ) = O( ) F C F R = R[ ] F \ {0}, A [ E] ) [4]HFEM ) ) E ( x, z) ( x, z) 4) (, z) = z j = j j ( i = i i)( j = j j) ( y j j j) = = j = z j j E( x, z) ( x A z ( C ) i i i) = = ( j = j j ) ( \ {0}) F F C a x A y = = F 5) = y j = j j y F \ {0} ( x, y) E( A,, C ) 6) ( x, y) E( A,, C ) ( ) {( d x, d y) d F \ {0}) 7) HFEM P = x y 4 HFEM ( = =5) HFEM HFEM A HFEM 4. HFEM E = 0 = { I, E, E } = ,, A 0 A = A = 0 A R = [ E] A A A R R = = R = R A A A A A A = A R F [ E] A ) R F W W W W W W = =
5 HFEM W ) ( W ) ) 0 = E( x, z) = W W = = 4 = W = 4 4 = = ) W = 4 4 W = ), A = A =, 4 4 A = R P = a = ( 4 ) ( ) C L R P = [ r ( a, ),, r ( a, )] = 4 0 = ( ) = a = i j Ai = i j j 4.4 ) [4] A E( A,, C ) ) i = i i j = j j C a ( x A )( y ) = = z j j j = = ( ( ) ) = x A = ( z C i i i j = j j ) ) E( x, z) x 4, z = ( 0 ) =( ) 4 4 4) (, z) = z = j= j j 4 4 = y 5) = = y j j j 4 ( x, y) E( A,, C ) = ( ) ( x, y) E( A,, C ) ( ) {( d x, d y) d F \ {0}) 5 6) P = x y P = P HFEM [4] HFEM HFEM [] HOR P W. Polyomial-time algorithms for prime factorizatio ad discrete logarithms o a uatum computer[j]. IAM Joural o Computig, 997, 6(5): [] PROO J, ZALKA C. hors discrete logarithm uatum algorithm for elliptic curves[j]. Quatum Iformatio ad Computatio, 00, (4):7-44. [] UCHMANN J, DING J. Post-uatum cryptography[a]. he ecod Iteratioal Worshop, PQCrypto 008[C]. Ciciati, UA, 7-9. [4],,. GF( ) [J]., 005, 6 ():5-9. ZHAO Y Z, HUANG L, JIANG Z H. Ergodic matrix over GF ( ) ad its properties[j]. Mii- micro ystems, 005, 6 ():5-9. [5] ZHAO Y Z, WANG L O, ZHANG W. Iformatio-exchage usig the ergodic matrices i GF()[A]. d Iteratioal Coferece, ACN 004[C]. Amsterdam: Icisa Press, [6],,. [J]., 007, 8 (): ZHAO Y Z, PEI H, WANG H J, et al. Usig the ergodic matrices over fiite field to costruct the dyamic ecryptor[j]. Mii-Micro ystems, 007, 8 (): [7] PEI H, ZHAO H W, ZHAO Y Z. Pulic ey cryptography ased o ergodic matrices over fiite field[j]. Wuha Uiversity Joural of Natural cieces, 006, (6): [8]. F hamir [J]., 006, 7(6): ZHAO Y Z, JIANG Z H, HUANG L. Implemetatio of hamir s three pass protocol ased o ergodic matrix over fiite field[j]. Mii- Micro ystems, 006, 7(6):
6 98 4 [] G Americas, MIMO ad smart ateas for G ad 4G wireless systems: practical aspects ad deploymet cosideratios[e/ol] [4] EDELMAN A. Eigevalues ad Coditio Numer of Radom Matrices[D]. Dept Mathematics, MI, Camridge, MA, 989. [5] OEGE C, CLERCKX. MIMO Wireless Commuicatios: From Real-World Propagatio to pace-ime Code Desig[M]. urligto: Academic Press, 007. [6] E D, VIWANAH P. Fudametals of Wireless Commuicatio[M]. Camridge, UK : Camridge Uiversity Press, 005. [7] ULINO A M, VERDU. Radom Matrix heory ad Wireless Commuicatios[M]. osto: Now Pulishers Ic, 004. [8] KYOI P, MEINILA J, HEUKA L. WINNER II chael mode : part II radio chael measuremet ad aalysis results[e/ol] [9],. ( ) [J]. :, 006, 4(5): UN Y X, ZHAO Y Z, YANG Y J, et al. cheme to costruct oe-way (trapdoor) fuctios ased o ergodic matrices[j]. Joural of Jili Uiversity: Iformatio ciece Editio, 006, 4(5): [0] MONICO C. emirigs ad emigroup Actios i Pulic-Key Cryptography[D]. Notre Dame: Uiversity of Notre Dame, 00. [] MAZE G. Algeraic Methods for Costructig Oe-Way rapdoor Fuctios[D]. Notre Dame: Uiversity of Notre Dame, 00. []. [D]. :, 008. HUANG H W. Cryptographic Applicatios of emigroup Actio Prolem[D]. Xi a: Xidia Uiversity, 008. [],,. [J]., 00, 8(8): PEI H, ZHAO Y Z, ZHAO H W. Pulic ey ecryptio scheme ased o the ergodic matrices[j]. Chiese Joural of Electroics, 00, 8(8): [4],,. HFEM [J].,0,(6):4-. ZHAO Y Z, ZHAO, PEI H, et al. Desig ad implemet o the HFEM pulic ey scheme[j]. Joural o Commuicatios, 0,(6): 4-. [5] HORN R A, JOHNON C R. Matrix Aalysis[M]. Camridge Uiversity Press, MIMO
Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication
Joural of Iformatio Hidig ad Multimedia Sigal Processig c 26 ISSN 273-422 Ubiquitous Iteratioal Volume 7, Number 4, July 26 Excellet Performaces of The Third-level Disturbed Chaos i The Cryptography Algorithm
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationIdentity-Based Cryptography on Hidden-Order Groups
vailable olie at www.sciecedirect.com Procedia Egieerig 9 (0) 067 07 0 Iteratioal Worshop o Iformatio ad Electroics Egieerig (IWIEE) Idetity-Based Cryptography o Hidde-Order Groups Chalgu Li a a Key Laboratory
More informationSPANNING SIMPLICIAL COMPLEXES OF n-cyclic GRAPHS WITH A COMMON EDGE. Guangjun Zhu, Feng Shi and Yuxian Geng
Iteratioal Electroic Joural of Algera Volume 15 2014 132-144 SPANNING SIMPLICIAL COMPLEXES OF -CYCLIC GRAPHS WITH A COMMON EDGE Guagju Zhu, Feg Shi ad Yuxia Geg Received: 1 August 2013; Revised: 5 Novemer
More informationA New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c
6 Iteratioal Coferece o Iformatio Egieerig ad Commuicatios Techology (IECT 6 ISB: 978--6595-375-5 A ew Simulatio Model of Ricia Fadig Chael Xixi Ji,,a, Yu Zhag,3,b, Chagyog Pa 4,c Tsighua atioal Laboratory
More informationFLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University
Iteratioal Joural of Pure ad Applied Mathematics Volume 95 No. 2 2014, 123-129 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v95i2.1
More informationPOWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS
Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity
More informationNEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS
Joural of Applied Aalysis ad Computatio Volume 5, Number 2, May 25, 22 23 Website:http://jaac-olie.com/ doi:.948/252 NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS Jie Su,2, Wei Qiao
More informationA Note on the Kolmogorov-Feller Weak Law of Large Numbers
Joural of Mathematical Research with Applicatios Mar., 015, Vol. 35, No., pp. 3 8 DOI:10.3770/j.iss:095-651.015.0.013 Http://jmre.dlut.edu.c A Note o the Kolmogorov-Feller Weak Law of Large Numbers Yachu
More informationNettree for maximum disjoint paths with length constraint in DAG
36 8 Vol.36 No.8 205 8 Joural o Commuicatios August 205 doi:0.959/j.iss.000-436x.20545 2. 30040 2. 30040 k (GP, greedy path) k+ k+ GP O(wk(p+q)) O(k(p+q)+ 2 ) GP GP TP30 A Nettree for maximum disjoit paths
More informationSolution of Differential Equation from the Transform Technique
Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from
More informationLinear Algebra Issues in Wireless Communications
Rome-Moscow school of Matrix Methods ad Applied Liear Algebra August 0 September 18, 016 Liear Algebra Issues i Wireless Commuicatios Russia Research Ceter [vladimir.lyashev@huawei.com] About me ead of
More informationInternal Information Representation and Processing
Iteral Iformatio Represetatio ad Processig CSCE 16 - Fudametals of Computer Sciece Dr. Awad Khalil Computer Sciece & Egieerig Departmet The America Uiversity i Cairo Decimal Number System We are used to
More informationOn the Connectivity of One-dimensional Vehicular Ad Hoc Networks
RESEARCH PAPER 论文集锦 O the Coectivity of Oe-dimesioal Vehicular Ad Hoc Networs Liao Jiaxi 1,2, Li Yuazhe 1,2, Li Toghog 3, Zhu Xiaomi 1,2, Zhag Lei 1,2 1 State Key Laboratory of Networig ad Switchig Techology,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim
More informationEnergy of a Hypercube and its Complement
Iteratioal Joural of Algebra, Vol. 6, 01, o. 16, 799-805 Eergy of a Hypercube ad its Complemet Xiaoge Che School of Iformatio Sciece ad Techology, Zhajiag Normal Uiversity Zhajiag Guagdog, 54048 P.R. Chia
More informationNon-negative Matrix Factorization for Filtering Chinese Document *
No-egative Matrix Factorizatio for Filterig Chiese Documet * Jiaiag Lu,,3, Baowe Xu,, Jixiag Jiag, ad Dazhou Kag Departmet of Computer Sciece ad Egieerig, Southeast Uiversity, Naig, 0096, Chia Jiagsu Istitute
More informationANTI-SYNCHRONIZING SLIDING CONTROLLER DESIGN FOR IDENTICAL PAN SYSTEMS
ANTI-SYNCHRONIZING SLIDING CONTROLLER DESIGN FOR IDENTICAL PAN SYSTEMS Sudarapadia Vaidyaatha Research ad Developmet Cetre, Vel Tech Dr. RR & Dr. SR Techical Uiversity Avadi, Cheai-600 062, Tamil Nadu,
More informationThe DOA Estimation of Multiple Signals based on Weighting MUSIC Algorithm
, pp.10-106 http://dx.doi.org/10.1457/astl.016.137.19 The DOA Estimatio of ultiple Sigals based o Weightig USIC Algorithm Chagga Shu a, Yumi Liu State Key Laboratory of IPOC, Beijig Uiversity of Posts
More informationResearch Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences
Discrete Dyamics i Nature ad Society Article ID 210761 4 pages http://dxdoiorg/101155/2014/210761 Research Article A Uified Weight Formula for Calculatig the Sample Variace from Weighted Successive Differeces
More informationUnsaturated Solutions of A Nonlinear Delay Partial Difference. Equation with Variable Coefficients
Europea Joural of Mathematics ad Computer Sciece Vol. 5 No. 1 18 ISSN 59-9951 Usaturated Solutios of A Noliear Delay Partial Differece Euatio with Variable Coefficiets Xiagyu Zhu Yuahog Tao* Departmet
More informationComplexity Analysis of Highly Improved Hybrid Turbo Codes
I J C T A, 8(5, 015, pp. 433-439 Iteratioal Sciece Press Complexity Aalysis of Highly Improved Hybrid Turbo Codes M. Jose Ra* ad Sharmii Eoch** Abstract: Moder digital commuicatio systems eed efficiet
More informationQuantum Simulation: Solving Schrödinger Equation on a Quantum Computer
Purdue Uiversity Purdue e-pubs Birc Poster Sessios Birc Naotechology Ceter 4-14-008 Quatum Simulatio: Solvig Schrödiger Equatio o a Quatum Computer Hefeg Wag Purdue Uiversity, wag10@purdue.edu Sabre Kais
More informationGenerating Functions for Laguerre Type Polynomials. Group Theoretic method
It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet
More informationSome Results on Certain Symmetric Circulant Matrices
Joural of Iformatics ad Mathematical Scieces Vol 7, No, pp 81 86, 015 ISSN 0975-5748 olie; 0974-875X prit Pulished y RGN Pulicatios http://wwwrgpulicatioscom Some Results o Certai Symmetric Circulat Matrices
More informationA Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More informationOn Some Inverse Singular Value Problems with Toeplitz-Related Structure
O Some Iverse Sigular Value Problems with Toeplitz-Related Structure Zheg-Jia Bai Xiao-Qig Ji Seak-Weg Vog Abstract I this paper, we cosider some iverse sigular value problems for Toeplitz-related matrices
More informationModified Logistic Maps for Cryptographic Application
Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi
More informationInformation Hiding Problems: Hiding Capacity and Key Design
Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems
More informationEfficient Reverse Converter Design for Five Moduli
Joural of Computatios & Modellig, vol., o., 0, 93-08 ISSN: 79-765 (prit), 79-8850 (olie) Iteratioal Scietific ress, 0 Efficiet Reverse Coverter Desig for Five Moduli Set,,,, MohammadReza Taheri, Elham
More informationDECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan
Mathematical ad Computatioal Applicatios, Vol. 9, No. 3, pp. 30-40, 04 DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS Muhammad Aslam Noor, Khalida Iayat Noor ad Asif Waheed
More informationgcd(n, k) = 1 Kwang Ho Kim 1 and Sihem Mesnager 2 Pyongyang, Democratic People s Republic of Korea
Solvig x 2k + + x + a = 0 i F 2 gcd, k = with Kwag Ho Kim ad Sihem Mesager 2 Istitute of Mathematics, State Academy of Scieces ad PGItech Corp., Pyogyag, Democratic People s Republic of Korea khk.cryptech@gmail.com
More informationChandrasekhar Type Algorithms. for the Riccati Equation of Lainiotis Filter
Cotemporary Egieerig Scieces, Vol. 3, 00, o. 4, 9-00 Chadrasekhar ype Algorithms for the Riccati Equatio of Laiiotis Filter Nicholas Assimakis Departmet of Electroics echological Educatioal Istitute of
More informationPAijpam.eu ON TENSOR PRODUCT DECOMPOSITION
Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314
More informationAN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC MAPS
http://www.paper.edu.c Iteratioal Joural of Bifurcatio ad Chaos, Vol. 1, No. 5 () 119 15 c World Scietific Publishig Compay AN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC
More informationA q-analogue of some binomial coefficient identities of Y. Sun
A -aalogue of some biomial coefficiet idetities of Y. Su arxiv:008.469v2 [math.co] 5 Apr 20 Victor J. W. Guo ad Da-Mei Yag 2 Departmet of Mathematics, East Chia Normal Uiversity Shaghai 200062, People
More informationA New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets
IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio
More informationThe fundamental mappings over group E a,b
157 The fudametal mappigs over group E Abdelhakim Chillali M hammed Boulgouaz ICM 2012, 11-14 March, Al Ai Abstract I this work we study the fudametal mappigs of group E [5], group of a elliptic curve
More informationInternational Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:
Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February 216 www.ijesird.com eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2,
More informationEstimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem Cheglia Liu 1 ad Ziwei Ye 2 1 Departmet of Electrical Egieerig, Natioal Tsig-Hua Uiversity, Taiwa cheglia.liu@gmail.com 2 Departmet of Computer
More informationEstimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable
Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya
More informationVolume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh
More informationROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction
t m Mathematical Publicatios DOI: 10.1515/tmmp-2016-0033 Tatra Mt. Math. Publ. 67 (2016, 93 98 ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS Otokar Grošek Viliam Hromada ABSTRACT. I this paper we study
More informationFour-dimensional Vector Matrix Determinant and Inverse
I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat
More informationMANEUVERING TARGET TRACK PREDICTION MODEL
Iteratioal Joural o Cyberetics & Iformatics (IJCI) Vol. 4 No. February 05 MANEUVERING ARGE RACK PREDICION MODEL igpig Yu Xiaomig You ad Sheg Liu 3 College of Electroic ad Electrical Egieerig Shaghai Uiversity
More informationModified Ratio Estimators Using Known Median and Co-Efficent of Kurtosis
America Joural of Mathematics ad Statistics 01, (4): 95-100 DOI: 10.593/j.ajms.01004.05 Modified Ratio s Usig Kow Media ad Co-Efficet of Kurtosis J.Subramai *, G.Kumarapadiya Departmet of Statistics, Podicherry
More informationSOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt
Mathematical ad Computatioal Applicatios, Vol. 18, No. 3, pp. 33-39, 013 SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS Levet Kargi ad Veli Kurt Departmet of Mathematics, Faculty Sciece, Uiversity of Adeiz
More informationA NOISY COMMUNICATION CHANNEL APPROACH FOR QUANTUM COMPUTING
SDPS-3 Prited i the Uited States of America, October, 3 3 Society for Desig ad Process Sciece A OISY COMMUICATIO CHAEL APPROACH FOR QUATUM COMPUTIG Fa Xiog, Murat M. Taik Departmet of Electrical ad Computer
More informationCalderbank-Shor-Steane
ISSN -985, CODEN RUXUEW E-mail: os@iscas.ac.c Joural of Software, Vol.7, No.3, March 6, pp.59 55 http://www.os.org.c DOI:.36/os759 Tel/Fax: +86--656563 6 by Joural of Software. All rights reserved. Calderbak-Shor-Steae,+,
More informationSeed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i
More informationLainiotis filter implementation. via Chandrasekhar type algorithm
Joural of Computatios & Modellig, vol.1, o.1, 2011, 115-130 ISSN: 1792-7625 prit, 1792-8850 olie Iteratioal Scietific Press, 2011 Laiiotis filter implemetatio via Chadrasehar type algorithm Nicholas Assimais
More informationDesign of Finite-Time Synchronization Controller and Its Application to Security Communication System
Appl. Math. If. Sci. 8, No., 87-9 (4) 87 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/.785/amis/848 Desig of Fiite-Time Sychroizatio Cotroller ad Its Applicatio to Security
More informationImproving Middle Square Method RNG Using Chaotic Map
Applied Mathematics, 20, 2, 482-486 doi:0.4236/am.20.24062 Published Olie April 20 (http://www.scirp.org/joural/am) Improvig Middle Square Method RNG Usig Chaotic Map Abstract Hamed Rahimov, Majid Babaie,
More informationA meta-converse for private communication over quantum channels
A meta-coverse for private commuicatio over quatum chaels Mario Berta with Mark M. Wilde ad Marco Tomamichel IEEE Trasactios o Iformatio Theory, 63(3), 1792 1817 (2017) Beyod IID Sigapore - July 17, 2017
More informationDistOpt and Distributed Optimization Cassino, Italy
DistOpt: A Ptolemy-based Tool to Model ad Evaluate the Solutios of Optimizatio Problems i Distributed Eviromets Arturo Losi Uiversità degli Studi di Cassio, Italy losi@uicas.it UC Berkeley Ptolemy Miicoferece
More informationOn Lower Bounds for the Communication Complexity of Private Information Retrieval
IEICE TRANS FUNDAMENTALS, VOLE84 A, NO JANUARY 200 57 PAPER Special Sectio o Cryptography ad Iformatio Security O Lower Bouds for the Commuicatio Complexity of Private Iformatio Retrieval Toshiya ITOH,
More informationA New Sifting function J ( ) n+ 1. prime distribution. Chun-Xuan Jiang P. O. Box 3924, Beijing , P. R. China
A New Siftig fuctio J ( ) + ω i prime distributio Chu-Xua Jiag. O. Box 94, Beijig 00854,. R. Chia jiagchuxua@vip.sohu.com Abstract We defie that prime equatios f (, L, ), L, f (, L ) (5) are polyomials
More informationLecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Theoretical Foudatios of Wireless Commuicatios 1 Thursday, May 19, 2016 12:30-15:30, Coferece Room SIP 1 Textbook: D. Tse ad P. Viswaath, Fudametals of Wireless Commuicatio 1 / 1 Overview Lecture 6:
More informationON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n
TWMS J App Eg Math V5, N, 015, pp 01-07 ON THE HADAMARD PRODUCT OF ALANCING Q AND ALANCING Q MATRIX MATRIX PRASANTA KUMAR RAY 1, SUJATA SWAIN, Abstract I this paper, the matrix Q Q which is the Hadamard
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationIntermittent demand forecasting by using Neural Network with simulated data
Proceedigs of the 011 Iteratioal Coferece o Idustrial Egieerig ad Operatios Maagemet Kuala Lumpur, Malaysia, Jauary 4, 011 Itermittet demad forecastig by usig Neural Network with simulated data Nguye Khoa
More informationChaos-Based Image Encryption Using an Improved Quadratic Chaotic Map
America Joural of Sigal Processig 26, 6(): -3 DOI:.5923/j.ajsp.266. Chaos-Based Image Ecryptio Usig a Improved Quadratic Chaotic Map Noha Ramada,*, Hossam Eldi H. Ahmed, Said E. Elkhamy 2, Fathi E. Abd
More informationComplex Algorithms for Lattice Adaptive IIR Notch Filter
4th Iteratioal Coferece o Sigal Processig Systems (ICSPS ) IPCSIT vol. 58 () () IACSIT Press, Sigapore DOI:.7763/IPCSIT..V58. Complex Algorithms for Lattice Adaptive IIR Notch Filter Hog Liag +, Nig Jia
More informationMerkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum
Merkle-Hellma Kapsack Cryptosystem i Udergraduate Computer Sciece Curriculum Y. Kortsarts, Y. Kemper 2 Computer Sciece Departmet, Wideer Uiversity, Chester, PA, USA 2 Computer Sciece Departmet, Holo Istitute
More informationWeak Laws of Large Numbers for Sequences or Arrays of Correlated Random Variables
Iteratioal Mathematical Forum, Vol., 5, o. 4, 65-73 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.988/imf.5.5 Weak Laws of Large Numers for Sequeces or Arrays of Correlated Radom Variales Yutig Lu School
More informationThe Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs
Mathematical Computatio March 015, Volume, Issue 1, PP.1 6 The Adomia Polyomials ad the New Modified Decompositio Method for BVPs of oliear ODEs Jusheg Dua # School of Scieces, Shaghai Istitute of Techology,
More informationTRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction
Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard
More informationResearch Article Approximate Riesz Algebra-Valued Derivations
Abstract ad Applied Aalysis Volume 2012, Article ID 240258, 5 pages doi:10.1155/2012/240258 Research Article Approximate Riesz Algebra-Valued Derivatios Faruk Polat Departmet of Mathematics, Faculty of
More informationFuzzy Shortest Path with α- Cuts
Iteratioal Joural of Mathematics Treds ad Techology (IJMTT) Volume 58 Issue 3 Jue 2018 Fuzzy Shortest Path with α- Cuts P. Sadhya Assistat Professor, Deptt. Of Mathematics, AIMAN College of Arts ad Sciece
More informationProc. Amer. Math. Soc. 139(2011), no. 5, BINOMIAL COEFFICIENTS AND THE RING OF p-adic INTEGERS
Proc. Amer. Math. Soc. 139(2011, o. 5, 1569 1577. BINOMIAL COEFFICIENTS AND THE RING OF p-adic INTEGERS Zhi-Wei Su* ad Wei Zhag Departmet of Mathematics, Naig Uiversity Naig 210093, People s Republic of
More informationParticle Swarm Optimization Algorithm for the Shortest Confidence Interval Problem
JOURNAL OF COMPUTER, VOL. 7, NO. 8, AUGUT 0 809 Particle warm Optimizatio Algorithm for the hortest Cofece Iterval Problem hag Gao ad Zaiyue Zhag chool of Computer ciece ad Egieerig, Jiagsu Uiversity of
More informationA VERHULST MODEL ON TIME SERIES ERROR CORRECTED FOR PORT THROUGHPUT FORECASTING
Joural of the Easter Asia Society for rasportatio Studies, Vol. 6, pp. 88-89, 005 A VERHUS MODE ON IME SERIES ERROR CORRECED FOR POR HROUGHPU FORECASING Zijia GUO Associate Professor School of Civil ad
More informationControl chart for number of customers in the system of M [X] / M / 1 Queueing system
Iteratioal Joural of Iovative Research i Sciece, Egieerig ad Techology (A ISO 3297: 07 Certified Orgaiatio) Cotrol chart for umber of customers i the system of M [X] / M / Queueig system T.Poogodi, Dr.
More informationA new iterative algorithm for reconstructing a signal from its dyadic wavelet transform modulus maxima
ol 46 No 6 SCIENCE IN CHINA (Series F) December 3 A ew iterative algorithm for recostructig a sigal from its dyadic wavelet trasform modulus maxima ZHANG Zhuosheg ( u ), LIU Guizhog ( q) & LIU Feg ( )
More informationReliability model of organization management chain of South-to-North Water Diversion Project during construction period
Water Sciece ad Egieerig, Dec. 2008, Vol. 1, No. 4, 107-113 ISSN 1674-2370, http://kkb.hhu.edu.c, e-mail: wse@hhu.edu.c Reliability model of orgaizatio maagemet chai of South-to-North Water Diversio Project
More informationDiophantine Equation. Has Infinitely Many Prime Solutions
Diophatie Equatio + L+ λ + λ λ + L+ Has Ifiitely May rime Solutios Chu-Xua iag. O. Box 9, Beijig 0085,. R. Chia liukxi @ public. bta. et. c Abstract By usig the arithmetic fuctio we prove that Diophatie
More informationCryptographic Secrecy Analysis of Matrix Embedding
010 Iteratioal Coferece o Multimedia Iformatio etworkig ad Security Cryptographic Secrecy Aalysis of Matrix Embeddig Jiufe Liu Jiayog Che Weimig Zhag Tao Ha Departmet of Iformatio Research Zhegzhou Iformatio
More informationAnalysis of Deutsch-Jozsa Quantum Algorithm
Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.
More informationComprehensive Bridge Health Evaluation Method Based on Information Fusion
MATEC Web of Cofereces 82, 03003 (2016) DOI: 10.1051/ mateccof/20168203003 Comprehesive Bridge Health Evaluatio Method Based o Iformatio Fusio Li-pig Li 1,a, We-xia Dig 2 ad Xiao-li Lu 3 1 Faculty of Egieerig,
More informationA new error bound for linear complementarity problems for B-matrices
Electroic Joural of Liear Algebra Volume 3 Volume 3: (206) Article 33 206 A ew error boud for liear complemetarity problems for B-matrices Chaoqia Li Yua Uiversity, lichaoqia@yueduc Megtig Ga Shaorog Yag
More informationStudy on Coal Consumption Curve Fitting of the Thermal Power Based on Genetic Algorithm
Joural of ad Eergy Egieerig, 05, 3, 43-437 Published Olie April 05 i SciRes. http://www.scirp.org/joural/jpee http://dx.doi.org/0.436/jpee.05.34058 Study o Coal Cosumptio Curve Fittig of the Thermal Based
More informationNUMERICAL METHOD FOR SINGULARLY PERTURBED DELAY PARABOLIC PARTIAL DIFFERENTIAL EQUATIONS
THERMAL SCIENCE, Year 07, Vol., No. 4, pp. 595-599 595 NUMERICAL METHOD FOR SINGULARLY PERTURBED DELAY PARABOLIC PARTIAL DIFFERENTIAL EQUATIONS by Yula WANG *, Da TIAN, ad Zhiyua LI Departmet of Mathematics,
More informationResearch Article Global Exponential Stability of Discrete-Time Multidirectional Associative Memory Neural Network with Variable Delays
Iteratioal Scholarly Research Network ISRN Discrete Mathematics Volume 202, Article ID 8375, 0 pages doi:0.5402/202/8375 Research Article Global Expoetial Stability of Discrete-Time Multidirectioal Associative
More informationComputation of lower derivatives of rational triangular Bézier surfaces and their bounds estimation *
8 Zhag et al. / J Zheiag Uiv SCI 5 6A(Suppl. I):8-5 Joural of Zheiag Uiversity SCIENCE ISSN 9-95 http://www.zu.edu.c/zus E-mail: zus@zu.edu.c Computatio of lower derivatives of ratioal triagular ézier
More informationAn Account of Congruences Mod p k Using Halley s Method
World Applied Scieces Joural 16 (11): 166-160, 01 ISSN 1818-49 IDOSI Pulicatios, 01 A Accout of Cogrueces Mod p Usig Halley s Method M. Khalid Mahmood ad M. Aslam Mali Departmet of Mathematics, Uiversity
More informationLarge Deviations Performance Analysis for Biometrics Recognition
J.A. O Sulliva, 2002 Allerto Coferece Large Deviatios erformace Aalysis for Biometrics Recogitio Joseph A. O Sulliva ad Natalia Schmid Electroic Systems ad Sigals Research Laboratory Departmet of Electrical
More informationA Simple Secure Quantum Authorization Scheme
A Simple Secure Quatum Authorizatio Scheme Xiaowe Zhag *, Xiaowei Xu, Ke Tag, Adis C. Kwa, Pig Ji 2, Li Leug 3, Xiagdog Li 4, Michael Ashel 5* CS Dept., Graduate Ceter, CUNY, 365 5 th Ave, NY, NY 6 2 Math
More informationWarped, Chirp Z-Transform: Radar Signal Processing
arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z
More informationMatrix inversion algorithm: applications in high speed MIMO LTE receiver
merica Joural of Networks ad Commuicatios 0; () : -6 Published olie December 30, 0 (http://www.sciecepublishiggroup.com/j/ajc) doi: 0.648/j.ajc.000. Matrix iversio algorithm: applicatios i high speed MIMO
More informationResearch on real time compensation of thermal errors of CNC lathe based on linear regression theory Qiu Yongliang
d Iteratioal Coferece o Machiery, Materials Egieerig, Chemical Egieerig ad Biotechology (MMECEB 015) Research o real time compesatio of thermal errors of CNC lathe based o liear regressio theory Qiu Yogliag
More informationBounds for the Extreme Eigenvalues Using the Trace and Determinant
ISSN 746-7659, Eglad, UK Joural of Iformatio ad Computig Sciece Vol 4, No, 9, pp 49-55 Bouds for the Etreme Eigevalues Usig the Trace ad Determiat Qi Zhog, +, Tig-Zhu Huag School of pplied Mathematics,
More informationProof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients
Proof of a cojecture of Amdeberha ad Moll o a divisibility property of biomial coefficiets Qua-Hui Yag School of Mathematics ad Statistics Najig Uiversity of Iformatio Sciece ad Techology Najig, PR Chia
More informationSimon Blackburn. Sean Murphy. Jacques Stern. Laboratoire d'informatique, Ecole Normale Superieure, Abstract
The Cryptaalysis of a Public Key Implemetatio of Fiite Group Mappigs Simo Blackbur Sea Murphy Iformatio Security Group, Royal Holloway ad Bedford New College, Uiversity of Lodo, Egham, Surrey TW20 0EX,
More informationEigenvalues of Ikeda Lifts
Eigevalues of Ikeda Lifts Rodey Keato Abstract I this paper we compute explicit formulas for the Hecke eigevalues of Ikeda lifts These formulas, though complicated, are obtaied by purely elemetary techiques
More informationA Numerical Method for Delayed Fractional-Order Differential Equations: Based on G-L Definition
Appl. Math. If. Sci. 7, No. 2L, 525-529 (213) 525 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/1.12785/amis/72l22 A Numerical Method for Delayed Fractioal-Order Differetial
More informationelliptic curve cryptosystems using efficient exponentiation
See discussios, stats, ad author profiles for this publicatio at: https://www.researchgate.et/publicatio/665870 elliptic curve cryptosystems usig efficiet expoetiatio Article Jauary 007 CITATIONS 0 READS
More informationInformation Theory and Statistics Lecture 4: Lempel-Ziv code
Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)
More informationThe Perturbation Bound for the Perron Vector of a Transition Probability Tensor
NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS Numer. Liear Algebra Appl. ; : 6 Published olie i Wiley IterSciece www.itersciece.wiley.com. DOI:./la The Perturbatio Boud for the Perro Vector of a Trasitio
More informationFactoring Algorithms and Other Attacks on the RSA 1/12
Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger
More informationThe average-shadowing property and topological ergodicity
Joural of Computatioal ad Applied Mathematics 206 (2007) 796 800 www.elsevier.com/locate/cam The average-shadowig property ad topological ergodicity Rogbao Gu School of Fiace, Najig Uiversity of Fiace
More information