-
301
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01“…Based on the weakness in the key schedule of TWIS:its ac-tual key size was only 62-bit and the confusion speed of the initial key was rather slow, the time complexity to recover the whole 62-bit key of 10-round TWIS was 2<sup>45</sup>, and the data complexity was low enough with only one known plain-text-ciphertext pair. …”
Get full text
Article -
302
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01“…And exploits such methods as separating 128bit calculation into four 32bit calculations, module reuse and optimization of calculation order was exploited to reduce hardware cost. …”
Get full text
Article -
303
Content authentication of H.264/AVC video stream based on semi-fragile watermarking
Published 2009-01-01“…For the low bit-rate H.264/AVC video stream,a content authentication scheme was proposed by using semi-fragile watermarking.The energy relationship between two groups of DCT blocks in I frame was utilized to generate content based feature code,which was embedded into low-magnitude DCT coefficients by modifying their signs according to their distribution.An error norm function was introduced to keep the bit-rate relatively stable.Moreover,the frame numbers of P frames were embedded into AC coefficients by utilizing the statistical properties of positive and negative signs.Tamper detection was realized by comparing the extracted watermark and reconstructed authentication code.Experimental results demonstrate the effectiveness of the proposed approach.…”
Get full text
Article -
304
Ferroelectric Transistor-Based Synaptic Crossbar Arrays: The Impact of Ferroelectric Thickness and Device-Circuit Interactions
Published 2024-01-01“…While the CiM robustness for bit slice 2 is less than bit slice 1, its robustness can be brought to a target level via additional design techniques, such as partial wordline activation and optimization of FeFETs width.…”
Get full text
Article -
305
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…In this paper, a modified 5-bit Dynamic Airy Chaotic (DAC) substitution box is proposed, which uses tent-logistic mapping for obtaining confusion property. …”
Get full text
Article -
306
Nondata-aided error vector magnitude based adaptive modulation over rapidly time-varying channels
Published 2017-03-01“…A novel nondata-aided error vector magnitude based adaptive modulation(NDA-EVM-AM) was proposed to solve the problem of lower spectral efficiency over rapidly time-varying wireless channels.Namely,NDA-EVM was considered as a metric to reflect the rapid change of time-varying channels.The unified model to calculate different modulation order of NDA-EVM was analytically derived,with which the relationship between NDA-EVM and bit error rate (BER) for each modulation order was presented.Thereafter,the mechanism to adaptively select the modulation orders of multilevel quadrature amplitude modulation (MQAM) signals was designed to guarantee the predefined BER.Taking the two rapidly time-varying channels proposed for high-speed railway scenarios as examples,numerical results are conducted to verify the effectiveness of the proposed algorithm.It shows that NDA-EVM estimation has the lest root mean square error than data-aided error vector magnitude (DA-EVM) estimation and signal to noise ratio estimation.The proposed algorithm has better accuracy in aspects of channel quality estimation and modulation orders adjustment,Compared with conventional data-aided error vector magnitude based-adaptive modulation (DA-EVM-AM),the accuracy improves by 7.9%,spectral efficiency improves by 0.53 bit·s<sup>−1</sup>·Hz<sup>−1</sup>,and compared with signal to noise ratio based-adaptive modulation (SNR-AM),the accuracy improves by 15.7%,spectral efficiency improves by 0.82 bit·s<sup>−1</sup>·Hz<sup>−1</sup>.…”
Get full text
Article -
307
A Smart Electronic Tagging System Based on Context Awareness and Machine-to-Machine Interworking
Published 2013-10-01Get full text
Article -
308
Research and experiment of open quantum cryptography communication system architecture and co-fiber transmission technology
Published 2018-09-01“…Based on the study of the mechanism of quantum encryption system,the system architecture of open quantum cryptographic communication was proposed.In order to better integrate with the existing communication system,a quantum key distribution (QKD) system and a large capacity optical communication co-fiber transmission scheme were proposed,and the QKD system and 80×100 Gbit/s DWDM were verified through experiments.The feasibility of the system common fiber transmission was realized under the condition of ultra 100 km common fiber transmission,the QKD bit rate &gt;1.0 kbit/s and 8 Tbit/s DWDM system without error bit and the practical threshold of the commercial encryption device key rate&gt;1.0 kbit/s was achieved.…”
Get full text
Article -
309
Efficient PAPR reduction algorithm in OFDM based on nonlinear piecewise companding
Published 2021-12-01“…Focusing on the high peak-to-average power ratio (PAPR) problem in orthogonal frequency division multiplexing (OFDM) systems, a generalized hybrid of rayleigh and sine distribution based nonlinear companding algorithm for PAPR reduction in OFDM systems was provided.For the proposed algorithm, signal samples with small amplitudes remain unchanged.For the signal samples with large amplitudes, their probability density function were changed from rayleigh distribution to sine-based distribution.The proposed algorithm can effectively reduce the PAPR, and at the same time, maintain the bit error rate performance and power spectral density performance.Simulation results indicate that with the same PAPR performance, compared with referred companding schemes, the proposed algorithm has lower bit error rate and out of band radiation.…”
Get full text
Article -
310
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
Get full text
Article -
311
Joint source-channel coding for image transmission based on best wavelet packet
Published 2012-10-01“…A novel joint source/channel image coding algorithm was proposed based on the best wavelet packet in a rate-distortion sense.Different from other wavelet packet image coding,the channel and the channel code information were introduced to the source coding,so the proposed algorithm was a joint source-channel coding.The coding of wavelet packet sub-band was bit plane,accorolingly,the bit streams could be good match to UEP.And a WICP-LDPC code was using as a channel code.The simulation results in BSC channel show that,the proposed algorithm is better than the EEP image transmission system.And the proposed algorithm is also better than several other image transmission algorithms,which proposed recently.…”
Get full text
Article -
312
Time hopping short reference carrier index differential chaos shift keying communication scheme
Published 2022-03-01“…In order to effectively utilize the transmission power of the reference signals in carrier index differential chaos shift keying (CI-DCSK), a novel time hopping short reference carrier index differential chaos shift keying communication system was proposed.Firstly, the symbol time was divided into multiple time slots, one of which was selected to send short reference signals according to the reference index bits.Then, analytical bit error rate expressions over additive white Gaussian noise and multipath Rayleigh fading channels were derived.Simulation results verify that the proposed scheme has a significant improvement in spectral efficiency, system energy efficiency and bit error rate performance.…”
Get full text
Article -
313
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01“…Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.…”
Get full text
Article -
314
Asymmetric clipped optical OFDM adaptive indexing modulation scheme under turbulent channels
Published 2024-11-01“…After a detailed introduction to the mapping principle of the signal, the optimal threshold and theoretical bit error rate under different turbulence intensities were derived. …”
Get full text
Article -
315
8~64kbit/s super-wideband embedded speech and audio coding algorithm
Published 2009-01-01“…Based on the international telecommunication union telecommunication standardization sector (ITU-T) recommendation G.729.1 and modified modulated lapped transform (MLT) coding, a super-wideband embedded variable bit-rate speech and audio coding algorithm was proposed, the bit-rates of this codec was from 8kbit/s to 64kbit/s. …”
Get full text
Article -
316
Relay-based resource allocation in cognitive networks
Published 2011-11-01“…Based on the optimal pairing the subcarriers of uplink and downlink,a spectrum resource allocation algorithm was proposed according to the subcarrier characteristics of the uplink and downlink in cognitive relay networks.The algorithm allocated the subcarriers in downlink according to the difference of subchannel gains.It assigned the subcarriere in uplink to minimize the power of every source nodes and relay nodes,and distributed the bits and powers of all subcarriers to satisfy the immediate request.It could decrease the power transmitted and increase the throughput of the system.The simulation results show that the algorithm proposed reduces the per bit power by 1.5~3 dBμW and improve the performance by one order of magnitude in bit error rate compared with the heuristic centralized scheme and distributed feedback-assisted-transmit power allocation algorithm.…”
Get full text
Article -
317
-
318
Research on deep differential fault analysis against MIBS
Published 2010-01-01“…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
Get full text
Article -
319
Retina-imitation sampling based binary descriptor
Published 2019-01-01“…The existing binary descriptors,generated from random or uniform point pairs sampling,suffer from low robustness and high computation.A novel sampling method,named RBS (retina-imitation based sampling),was proposed, which combines different densities sampling,multi-scale smoothing and reception field overlapping to imitate the converting from light signal to vision of ganglion cells of human retina cells,and further selects most discriminative comparison pairs based on learning on training data.Finally,compact binary descriptor was generated based on comparisons between the neighbor mean instead of singe sampled point.The experimental results show the RBS-128 with 128 bit outperforms FREAK and BRSIK with 512 bit about 16.4% and 5.3% in precision on the dataset provided by Mikolajczyk.…”
Get full text
Article -
320
Joint Noniterative Beamforming Schemes for BER Minimization in Next-Generation Wireless Sensor Networks
Published 2025-01-01“…This research paper proposes three joint transmit and receive (TX/RX) beamforming schemes for minimizing the bit error rates of next-generation wireless sensor networks. …”
Get full text
Article