RSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]
|
|
- Helen Grant
- 5 years ago
- Views:
Transcription
1 /2002/13( Journal of Software Vol13, No8 RSA 1,2 1, 1 (, ; 2 (, E-mal: yfhu@fudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA [1],,,, RSA [2], [3], [1,4] ; :,, RSA, RSA RSA RSA : RSA n r z Z * n, y Z * n, y r =z r : RSA RSA RSA 12 RSA Flexble RSA : RSA n z Z * n, r y, y r =z (r>1,y Z * n : ; : : ( : (1968,,,,, ; (1940,,,,,,
2 1730 Journal of Software 2002,13(8 r : flexble RSA RSA flexble RSA RSA :RSA, r z ; RSA, r z RSA [2], RSA, 13 RSA : (random self-reducton, n r, z Z * n, y=z 1/r, : z * Zn, y = 1 / z r, : z, s Z * n, z =s r z, y= y /s RSA, n z, RSA n z, RSA Flexble RSA, RSA, RSA 14 (adaptve chosen message attack :, ;,,,, ; ;,,, :, 15 (unversal one-way famly of ash functon, UOWFs [3] ( k, : x k, y(y x, k (x= k (y [5,6], k ; 2 l l,l+1<l l=160,l =512, 2 l SA-1 n, QR n n l p q, p=2p +1,q=2q +1,p q n=pq, : h,x QR n ;l+1 : (n,h,x, : (p,q m, l+1 e(e y (y QR n e xh ( x y =, y x ( ( m y = h, n y : (e,y,y m (e,y,y, :
3 : RSA 1731 (1 e l+1 ( m (2 ( e x = y h (x (3 y e x = h 21, e, h h 1, y a, x=h a mod p q, a, h QR n, d=e 1 mod p q, y=h b, b=da+d(x mod p q, y h b [7],, 22 1 RSA, 1, 1 x,y Z * n a,b Z, x a =y b,gcd(a,b=1, x [8] * Zn, x a =y, Eucldean, b k, bb =1+ak x =x b y k 1 1 t, 1 t, m ( m,(e,y,y, x = ( y h (e,y,y m ( m 1 t, ( m ( e x = y h 3 : 1 j t,e=e j,x =x j 1 j t,e=e j,x x j 1 t,e e e, e RSA RSA, [4], RSA,, RSA, n, z Z * n l+1 r, z 1/r 2Π l+1 e 1,,e t, h = z e ; w Z * 2Π n, x = w e ;, =r ( m e m, y QR n, x = ( y h ( x y = xh y x h e, m (e,y,y, 1 j t,e=e j x =x j, : ( y = x h ( m ( y = x h j ( m j, (m (m j, v Z n a0(mod, z 2 Π :v =h a = a e gcd(2a e,=1,=r 1, z r RSA, RSA : n,z Z * n r, z r : j ;
4 1732 Journal of Software 2002,13(8, : 2 Π e j 1 t( j, l+1 e, e j =r l+1, h = z w Z * n, y j = w u Z * n, x j =u 2 ( x j j x = y j h e 2Π je ( m, m j y QR n, x = ( y h x h e, y =j h x j, y j y j, m (e,y,y e=e j,x x j, y e (x = xh, e ( x j y j = xh, z r RSA, felxble RSA n,z Z * n, r(r>1 z r : l+1,e 1,,e t, h a {1,,n 2 }, x=h a e Π e = z 2 QR n p q h QR n, a=bp q +c, 0 c<p q a,c {0,,p q 1}, c,b {0,, n 2 /p q } c b c, x QR n x h, (e,y,y,m=2π e (a+(x y e =xh (x =z m d=gcd(e,m gcd(d,2p q =1 y e/d =z m/d, e³m( e m, 1 z (e/d, e³m r e, r³2π e, r³(a+(x : a=bp q +c( r c,c b r³p q, a+(x 0(mod r 1/r,r³(a+(x 1 z r, RSA 3 ( m m (e,y,y ( e e (x x = y h, y = xh (x, : g 1,g 2 s G (s l+1 m hash, α = ( ( m α, g t g 1 2,,t mod s hash α t g 2 g 1 m α;, m, t l p q, p=2p +1,q=2q +1,p q n=pq, : h,x QR n ; s G, s l+1, G g 1 g 2
5 : RSA 1733 : (n,h,x,g 1,g 2 G ( s : (p,q m, l+1 e t Z s t ( m ( g e g xh 1 2 y =, y :(e,y,t t ( m ( g g m (e,y,t, e l+1, x = y e h RSA G, 1 hash,,, s, m 4 RSA RSA :, ; RSA,,, :, RSA, SA-1 [6] : 1, Vsual C++ 60, Dell P, OptPlex GX1, Mcrosoft Wndows Bts Table 1 The tmes of basc arthmetc operatons (as a baselne Basc operatons 1 ( Modular multplcaton (µs Squarng operaton (µs Exponentaton (ms ,,,, Table 2 The tmes of the algorthms 2 Phase Modulus Key set-up phase (ms Man sgnng phase (ms Sgnature verfcaton (ms , References: [1] Goldwasser, S, Mcal, S, Rvest, RL A dgtal sgnature scheme secure aganst adaptve chosen-message attacks SIAM Journal on Computng, 1988,17(2:281308
6 1734 Journal of Software 2002,13(8 [2] Barc, N, Pftzmann, B Collson-Free accumulators and fal-stop sgnature schemes wthout trees In: Fumy, W, ed Proceedngs of the Conference on Advances n Cryptology (EUROCRYPT 97 Berln, New York: Sprnger-Verlag, [3] Naor, M, Yung, M Unversal one-way hash functons and ther cryptographc applcatons In: Johnson, DS, ed Proceedngs of the 21st Annual ACM Symposum on Theory of Computng (STOC 89 Seattle, WA, New York: ACM Press, [4] Cramer, R, Amgaard, I New generaton of secure and practcal RSA-based sgnatures In: Kobltz, N, ed Proceedngs of the 16th Annual Internatonal Conference on Advances n Cryptology (CRYPTO 96 Santa Barbara, CA, New York: Sprnger-Verlag, [5] Bellare, M, Rogaway, P Collson-resstant hashng: towards makng UOWFs practcal In: Proceedngs of the 17th Annual Internatonal Conference on Advances n Cryptology (CRYPTO 97 Santa Barbara, CA, New York: Sprnger-Verlag, 1997 [6] Shoup, V A composton theorem for unversal one-way hash functons In: Proceedngs of the Workshop on Advances n Cryptology (EUROCRYPT 2000 New York: Sprnger-Verlag, 2000 [7] Lm, C, Lee, PJ More flexble exponentaton wth precomputaton In: Desmedt, YG, ed Proceedngs of the Conference on Advances n Cryptology (CRYPTO 94 Santa Barbara, CA, New York: Sprnger-Verlag, [8] Gullou, LC, Qusquater, JJ A practcal zero-knowledge protocol ftted to securty mcroprocessor mnmzng both transmsson and memory In: Günther, CG ed Proceedngs of the Conference on Advances n Cryptology (EUROCRYPT 88 Davos, Swtzerland, New York: Sprnger-Verlag, A Sgnature Scheme Based on the Strong RSA Assumpton WANG Bao-you 1,2, U Yun-fa 1 1 (Department of Computer Scence and Engneerng, Fudan Unversty, Shangha , Chna; 2 (Chna UnCmm Lmted Shangha Branch, Shangha , Chna E-mal: yfhu@fudaneducn Abstract: For resstng the adaptve chosen message attack and mprovng the sgn generaton effcency, a sgnature scheme based on the strong RSA assumpton s descrbed n ths paper The scheme uses a fxed base rather than by rasng them to a fxed power, whch s dfferent from the RSA algorthm Moreover, one can use pre-computaton technques n order to get a better effcency In addton, a hash functon can be ncorporated nto the scheme n such a way that t offers a trapdoor to the sgn algorthm The merts of ths amendatory scheme are that f one makes a dstncton between the off lne and the on lne cost of sgnng, the sgner can reduce on lne cost sgnfcantly by usng hash trapdoor It s proved that the scheme s secure aganst the adaptve chosen message attack under the strong RSA assumpton The expermental results show that the scheme has hgh effcency Key words: dgtal sgnature; strong RSA assumpton (SRA; hash functon; RSA; securty Receved May 15, 2001; accepted October 23, 2001 Supported by the Natonal Natural Scence Foundaton of Chna under Grant No
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationProvable Security Signatures
Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationThe Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li
nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence
More informationCryptanalysis of Threshold Proxy Signature Schemes 1)
MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute
More informationHash functions : MAC / HMAC
Hash functons : MAC / HMAC Outlne Message Authentcaton Codes Keyed hash famly Uncondtonally Secure MACs Ref: D Stnson: Cryprography Theory and Practce (3 rd ed), Chap 4. Unversal hash famly Notatons: X
More informationUse of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Use of Sparse and/or Complex Exponents n Batch Verfcaton of Exponentatons Jung Hee Cheon 1 and Dong Hoon Lee 2 1 Department of Mathematcs, Seoul Natonal Unversty jhcheon@math.snu.ac.kr, 2 Natonal Securty
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationCryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce
More informationPerformance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method
P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman
More informationA Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme*
A Model of Blnear-Parngs Based Desgnated-Verfer Proxy Sgnatue Scheme Fengyng L,, Qngshu Xue, Jpng Zhang, Zhenfu Cao Department of Educaton Informaton Technology, East Chna Normal Unversty, 0006, Shangha,
More informationFast Variants of RSA
Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey four varants of RSA desgned to speed up RSA decrypton and sgnng. We only consder varants that are
More informationAugmented Broadcaster Identity-based Broadcast Encryption
Augmented Broadcaster Identty-based Broadcast Encrypton Janhong Zhang Yuwe Xu Zhpeng Chen Insttuton of Image Processng and Pattern Recognton North Chna Unversty of Technology Bejng Chna 100144 ywxupaper@163com
More informationImproved Integral Cryptanalysis of FOX Block Cipher 1
Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,
More informationBit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi
Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers
More informationQuantum secure circuit evaluation
Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence
More informationComment on An arbitrated quantum signature scheme. with fast signing and verifying
Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of
More informationFinding Malleability in NTRUSign
Fndng Malleablty n TRUSgn SungJun Mn, Go Yamamoto, and Kwangjo Km Auto-ID Labs Whte Paper WP-HARDWARE-33 Sungjun Mn Senor Researcher, atonal Computerzaton Agency Go Yamamoto Senor Researcher, Informaton
More informationCHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00
CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).
More information, RCL2000, 2002 Journal of Software. Vol.13, No /2002/13(08)
000-985/00/3085-07 00 Journal of Software Vol3 No8 00080 E-mal dgy@ercstscasaccn; l_kelong@snacom http//wwwercstaccn/ CLTrole-based constrants language wth tme-character CLT CLT LCT ; ; ; T309 A role-based
More informationSecurity Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Internatonal Journal of Informaton and Educaton Technology Vol No 4 August 0 Securty Vulnerablty n Identty-Based ublc Key Cryptosystems from arngs Jyh-aw Yeh Abstract Many dentty-based lc key cryptosystems
More informationRotation Invariant Shape Contexts based on Feature-space Fourier Transformation
Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,
More informationAdvanced Algebraic Algorithms on Integers and Polynomials
Advanced Algebrac Algorthms on Integers and Polynomals Analyss of Algorthms Prepared by John Ref, Ph.D. Integer and Polynomal Computatons a) Newton Iteraton: applcaton to dvson b) Evaluaton and Interpolaton
More informationSemantic Security of RSA. Semantic Security
Semantic Security of RSA Murat Kantarcioglu Semantic Security As before our goal is to come up with a public key system that protects against more than total break We want our system to be secure against
More informationA New Biometric Identity Based Encryption Scheme
NEYIRE DENIZ SARIER (2008). A New Bometrc Identty Based Encrypton Scheme. In Techncal Sessons for 2008 Internatonal Symposum on Trusted Computng (TrustCom 2008) n Proceedngs of the 9th Internatonal Conference
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/18.401J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) What data structures
More informationCOMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD
COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,
More informationA Threshold Digital Signature Issuing Scheme without Secret Communication
A Threshold Dgtal Sgnature Issung Scheme wthout Secret Communcaton Kazuo Takarag, Kunhko Myazak, Masash Takahash Systems Development Laboratory, Htach, Ltd e-mal: {takara, kunhko, takahas}@sdlhtachcop
More informationCryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key
Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes
More informationForward-Secure Signatures with Optimal Signing and Verifying
Forward-Secure Sgnatures wth Optmal Sgnng and Verfyng Gene Itks Leond Reyzn Boston Unversty Computer Scence Dept. 111 Cummngton St. Boston, MA 02215, USA {tks,reyzn}@bu.edu Abstract Ordnary dgtal sgnatures
More informationSeparable Linkable Threshold Ring Signatures
Separable Lnkable Threshold Rng Sgnatures Patrck P. Tsang 1, Vctor K. We 1, Tony K. Chan 1, Man Ho Au 1, Joseph K. Lu 1, and Duncan S. Wong 2 1 Department of Informaton Engneerng The Chnese Unversty of
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationLine Drawing and Clipping Week 1, Lecture 2
CS 43 Computer Graphcs I Lne Drawng and Clppng Week, Lecture 2 Davd Breen, Wllam Regl and Maxm Peysakhov Geometrc and Intellgent Computng Laboratory Department of Computer Scence Drexel Unversty http://gcl.mcs.drexel.edu
More informationEfficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding
Effcent Fxed Base Exponentaton and Scalar Multplcaton based on a Multplcatve Splttng Exponent Recodng Jean-Marc Robert, Chrstophe Negre, Thomas Plantard To cte ths verson: Jean-Marc Robert, Chrstophe Negre,
More informationFast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract
Fast Signature Generation with a Fiat Shamir { Like Scheme H. Ong Deutsche Bank AG Stuttgarter Str. 16{24 D { 6236 Eschborn C.P. Schnorr Fachbereich Mathematik / Informatik Universitat Frankfurt Postfach
More informationTransitive Signatures Based on Non-adaptive Standard Signatures
Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing Nanyang Technological University, Singapore, zhousujing@pmail.ntu.edu.sg Abstract. Transitive signature, motivated by signing
More informationThe Cramer-Shoup Strong-RSA Signature Scheme Revisited
The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin Johann Wolfgang Goethe-University Frankfurt am Main, Germany marc @ mi.informatik.uni-frankfurt.de http://www.mi.informatik.uni-frankfurt.de/
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationMessage modification, neutral bits and boomerangs
Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental
More informationConstruction and Traversal of Hash Chain with Public Links
Constructon and Traversal of Hash Chan wth Publc Lnks Vpul Goyal OSP Global Mumba, Inda vgoyal@ospglobal.com Abstract Current hash chan traversal technques requre that the ntermedate lnks of the hash chan
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationImproving the Round Complexity of VSS in Point-to-Point Networks
Improvng the Round Complexty of VSS n Pont-to-Pont Networks Jonathan Katz Chu-Yuen Koo Rant Kumaresan Abstract We revst the followng queston: what s the optmal round complexty of verfable secret sharng
More informationMath Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures
More informationDecision Diagrams Derivatives
Decson Dagrams Dervatves Logc Crcuts Desgn Semnars WS2010/2011, Lecture 3 Ing. Petr Fšer, Ph.D. Department of Dgtal Desgn Faculty of Informaton Technology Czech Techncal Unversty n Prague Evropský socální
More informationLecture 3 January 31, 2017
CS 224: Advanced Algorthms Sprng 207 Prof. Jelan Nelson Lecture 3 January 3, 207 Scrbe: Saketh Rama Overvew In the last lecture we covered Y-fast tres and Fuson Trees. In ths lecture we start our dscusson
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationAn adaptive SMC scheme for ABC. Bayesian Computation (ABC)
An adaptve SMC scheme for Approxmate Bayesan Computaton (ABC) (ont work wth Prof. Mke West) Department of Statstcal Scence - Duke Unversty Aprl/2011 Approxmate Bayesan Computaton (ABC) Problems n whch
More informationInternational Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN
Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY
More informationStrongly Unforgeable Signatures Based on Computational Diffie-Hellman
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman Dan Boneh 1, Emily Shen 1, and Brent Waters 2 1 Computer Science Department, Stanford University, Stanford, CA {dabo,emily}@cs.stanford.edu
More informationHardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
54 The Internatonal Arab Journal of Informaton Technology, Vol., o. 5, September 204 Hardenng the ElGamal Cryptosystem n the Settng of the Second Group of Unts Ramz Haraty, Abdulasser ElKassar, and Suzan
More informationEfficient Ring Signatures Without Random Oracles
Effcent Rng Sgnatures Wthout Random Oracles Hovav Shacham hovav.shacham@wezmann.ac.l Brent Waters bwaters@csl.sr.com Abstract We descrbe the frst effcent rng sgnature scheme secure, wthout random oracles,
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationA Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack Huafei Zhu InfoComm Security Department, Institute for InfoComm Research. 21 Heng Mui Keng
More informationA New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationLogarithm Cartesian authentication codes
Informaton and Computaton 184 23 93 18 www.elsever.com/locate/c Logarthm Cartesan authentcaton codes T.W. Sze, a S. Chanson, a C. Dng, a T. Helleseth, b and M.G. Parker b, a Department of Computer Scence,
More informationThreshold Undeniable RSA Signature Scheme
Threshold Undeniable RSA Signature Scheme Guilin Wang 1, Sihan Qing 1, Mingsheng Wang 1, and Zhanfei Zhou 2 1 Engineering Research Center for Information Security Technology; State Key Laboratory of Information
More informationSequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
Sequental Aggregate Sgnatures wth Lazy Verfcaton from Trapdoor Permutatons Kyle Brogle Sharon Goldberg Leond Reyzn June 9, 2014 Abstract Sequental aggregate sgnature schemes allow n sgners, n order, to
More informationPolynomial Arithmetic
Polynomal Arthmetc Stefan Jerg jerg@n.tum.de Zentrum Mathematk Technsche Unverstät München (TUM) 1 Overvew Polynomal Arthmetc Polynomal Arthmetc Generaltes Polynomal Addton Polynomal Multplcaton Fast Polynomal
More informationA Novel Fuzzy logic Based Impulse Noise Filtering Technique
Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.
More informationA Novel, Low-Power Array Multiplier Architecture
A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -
More informationSequential Aggregate Signatures and Multisignatures Without Random Oracles
Sequental Aggregate Sgnatures and Multsgnatures Wthout Random Oracles Steve Lu stevelu@math.ucla.edu Hovav Shacham hovav.shacham@wezmann.ac.l Rafal Ostrovsky rafal@cs.ucla.edu May 16, 2006 Amt Saha saha@cs.ucla.edu
More informationSketching Sampled Data Streams
Sketchng Sampled Data Streams Florn Rusu and Aln Dobra CISE Department Unversty of Florda March 31, 2009 Motvaton & Goal Motvaton Multcore processors How to use all the processng power? Parallel algorthms
More informationParameter Estimation for Dynamic System using Unscented Kalman filter
Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationWavelet chaotic neural networks and their application to continuous function optimization
Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,
More informationCSE4210 Architecture and Hardware for DSP
4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.
More informationA New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1
A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton
More informationSemi-supervised Classification with Active Query Selection
Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples
More informationCryptography System for Information Security Using Chaos Arnold's Cat Map Function
4 th ICRIEMS Proceedngs Publshed by The Faculty Of Mathematcs And Natural Scences Yogyakarta State Unversty, ISBN 978-602-74529-2-3 Cryptography System for Informaton Securty Usng Chaos Arnold's Cat Map
More informationMining Data Streams-Estimating Frequency Moment
Mnng Data Streams-Estmatng Frequency Moment Barna Saha October 26, 2017 Frequency Moment Computng moments nvolves dstrbuton of frequences of dfferent elements n the stream. Frequency Moment Computng moments
More informationCramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring Dario Catalano 1 and Rosario Gennaro 2 1 CNRS - École normale supérieure, Laboratoire d informatique 45 rue d Ulm,
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationCryptography based on number fields with large regulator
Journal de Théore des Nombres de Bordeaux 12 (2000), 293 307 Cryptography based on number felds wth large regulator par Johannes BUCHMANN, Markus MAURER et Bodo MÖLLER Résumé. Nous ntrodusons une varante
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More information5199/IOC5063 Theory of Cryptology, 2014 Fall
5199/IOC5063 Theory of Cryptology, 2014 Fall Homework 2 Reference Solution 1. This is about the RSA common modulus problem. Consider that two users A and B use the same modulus n = 146171 for the RSA encryption.
More informationResearch on State Collisions of Authenticated Cipher ACORN
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Research on State Collsons of Authentcated Cpher ACORN Pe Zhanga*, Je Guanb, Junzh Lc and Tarong Shd Informaton
More informationPost-quantum Key Exchange Protocol Using High Dimensional Matrix
Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com
More informationSequential Aggregate Signatures and Multisignatures Without Random Oracles
Sequental Aggregate Sgnatures and Multsgnatures Wthout Random Oracles Steve Lu 1,, Rafal Ostrovsky 2,, Amt Saha 3,, Hovav Shacham 4, and Brent Waters 5, 1 UCLA stevelu@math.ucla.edu 2 UCLA rafal@cs.ucla.edu
More informationA Composition Theorem for Universal One-Way Hash Functions
A Composition Theorem for Universal One-Way Hash Functions Victor Shoup IBM Zurich Research Lab, Säumerstr. 4, 8803 Rüschlikon, Switzerland sho@zurich.ibm.com Abstract. In this paper we present a new scheme
More informationFrom Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited Julien Cathalo 1, Jean-Sébastien Coron 2, and David Naccache 2,3 1 UCL Crypto Group Place du Levant 3, Louvain-la-Neuve, B-1348, Belgium
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationDiscretization of Continuous Attributes in Rough Set Theory and Its Application*
Dscretzaton of Contnuous Attrbutes n Rough Set Theory and Its Applcaton* Gexang Zhang 1,2, Lazhao Hu 1, and Wedong Jn 2 1 Natonal EW Laboratory, Chengdu 610036 Schuan, Chna dylan7237@sna.com 2 School of
More informationSecurity Proofs for Signature Schemes. Ecole Normale Superieure. 45, rue d'ulm Paris Cedex 05
Security Proofs for Signature Schemes David Pointcheval David.Pointcheval@ens.fr Jacques Stern Jacques.Stern@ens.fr Ecole Normale Superieure Laboratoire d'informatique 45, rue d'ulm 75230 Paris Cedex 05
More informationPulse Coded Modulation
Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal
More informationConstructing Verifiable Random Number in Finite Field
Jun Ye 1, Xiaofeng Chen 2, and Jianfeng Ma 2 1 School of Science, Sichuan University of Science and Engineering Zigong, Sichuan, China yejun@suseeducn 2 School of Telecommunication Engineering, Xidian
More informationMULTIDIMENSIONAL LINEAR DISTINGUISHING ATTACKS AND BOOLEAN FUNCTIONS
Boolean Functons: Cryptography and Applcatons Fonctons Booléennes : Cryptographe & Applcatons BFCA 08 MULTIDIMENSIONAL LINEAR DISTINGUISHING ATTACKS AND BOOLEAN FUNCTIONS Ma Hermeln 1 and Kasa Nyberg 1
More informationPRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM
PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM Alexandros Papankolaou and Song Y. Yan Department of Computer Scence, Aston Unversty, Brmngham B4 7ET, UK 24 October 2000, Receved 26 June 2001 Abstract
More information[ ] T Journal of Software. Vol.13, No /2002/13(05)
-985//(5)957-9 Journal of Software Vol, No5, (, 8) E-al: xqeng@csuclaedu; huz@nlpraaccn http://wwwaaccn/nlpr/ : ( ),,,,,,, : ; ; : P9 : A [,],,,Zhang [] ( ), ( ),, (hoograph), Zhang, (DVS) Zhang,,,, (
More informationSecure and practical identity-based encryption
Secure and practcal dentty-based encrypton D. Naccache Abstract: A varant of Waters dentty-based encrypton scheme wth a much smaller system parameters sze (only a few klobytes) s presented. It s shown
More informationCryptographic Protocols
Cryptographc Protocols Entty Authentcaton Key Agreement Fat-Shamr Identfcaton Schemes Zero-Knowledge Proof Systems Shnorr s Identfcaton/Sgnature Scheme Commtment Schemes Secret Sharng Electronc Electon
More informationA New Evolutionary Computation Based Approach for Learning Bayesian Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang
More informationComputing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring
Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,
More informationHow (Not) to Design Strong-RSA Signatures
Published in Designs, Codes and Cryptography, 59(1/3):169 182, 2011. How (Not) to Design Strong-RSA Signatures Marc Joye Abstract This paper considers strong-rsa signature schemes built from the scheme
More informationA Pseudo-Random Encryption Mode
A Pseudo-Random Encryption Mode Moni Naor Omer Reingold Block ciphers are length-preserving private-key encryption schemes. I.e., the private key of a block-cipher determines a permutation on strings of
More informationShort Term Load Forecasting using an Artificial Neural Network
Short Term Load Forecastng usng an Artfcal Neural Network D. Kown 1, M. Km 1, C. Hong 1,, S. Cho 2 1 Department of Computer Scence, Sangmyung Unversty, Seoul, Korea 2 Department of Energy Grd, Sangmyung
More informationOn the Instantiability of Hash-and-Sign RSA Signatures
On the Instantablty of Hash-and-Sgn RSA Sgnatures Yevgeny Dods Iftach Hatner Ars Tentes December 29, 2011 Abstract The hash-and-sgn RSA sgnature s one of the most elegant and well known sgnatures schemes,
More informationAerosols, Dust and High Spectral Resolution Remote Sensing
Aerosols, Dust and Hgh Spectral Resoluton Remote Sensng Irna N. Sokolk Program n Atmospherc and Oceanc Scences (PAOS) Unversty of Colorado at Boulder rna.sokolk@colorado.edu Goals and challenges MAIN GOALS:
More information