-
681
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01“…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
Get full text
Article -
682
A New Combination of RAKE Receiver and Adaptive Antenna Array Beamformer for Multiuser Detection in WCDMA Systems
Published 2011-01-01“…We illustrate the comparison of bit error rate (BER) of the proposed receiver with simple correlator and also 1D-RAKE receiver in multiuser detection (MUD) WCDMA. …”
Get full text
Article -
683
The CFS Choux Questionnaire
Published 2024-12-01“…(And yes, some questions have a bit more craquelin than others.) Straightforward on their own, the queries combined start to form a celebratory pyramid of extravagance. …”
Get full text
Article -
684
Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture
Published 2015-01-01“…Compared with HM13.0, experimental results reveal that the proposed algorithm can save about 20% computational complexity on average whereas the average bit rate increment is 0.84% and the decrement of PSNR is 0.04 dB.…”
Get full text
Article -
685
Vibration and Deflection Behavior of a Coal Auger Working Mechanism
Published 2016-01-01“…Because coal auger working mechanism faces problems such as excessive vibration, serious deflection, and low drilling efficiency, a new five-bit coal auger working mechanism test model was established to explore the influence factor on vibration and deflection under different conditions. …”
Get full text
Article -
686
A massive MIMO-OTFS robust transmission scheme for vehicular networks using sensing-assisted communication
Published 2023-12-01“…For a multi-user integrated sensing and communication system in the network of vehicles, a robust sensing-assisted communication massive multiple-input multiple-output (MIMO) orthogonal time frequency space (OTFS) transmission scheme was proposed.Due to the limited sensing accuracy of the radar, errors existed in the channel state information (CSI) reconstructed based on sensing parameters.The transmission performance decreased as a result.To address this issue, the CSI in the delay doppler domain was reconstructed based on the sensing parameters by the transmitter firstly.And a robust beam forming scheme was designed considering the CSI error.Secondly, the channel estimation error and inter user interference were perceived by receivers based on sensing parameters.Then the robust receiver was designed by incorporating the perceived interference errors into the signal detector in an analytical way.Finally, numerical simulation results show that the proposed method effectively reduces the system bit error rate and increases the data reception rate of users.The proposed method improves the overall system performance in this situation.…”
Get full text
Article -
687
Basis expansion model-based improved regularized orthogonal matching pursuit channel estimation for V2X fast time-varying SC-FDMA
Published 2021-04-01“…In order to further improve the vehicle-to-everything (V2X) communication performance of the Internet of vehicles, a basis expansion model (BEM) was adopted and suitable for high-speed mobile scenarios to transform the channel estimation into a sparse signal reconstruction.Furthermore, it was proved that the BEM coefficients were sparse, and an improved regularized orthogonal matching pursuit (iROMP) channel estimation algorithm based on BEM (BEM-iROMP) was proposed.BEM coefficients were acquired by the iROMP, and finally the feedback results were iterated to achieve the optimal channel estimation.Simulation results show that in comparison with the least square (LS), linear minimum mean squared error (LMMSE), and BEM-LS channel estimation algorithms, the proposed algorithm can effectively improve the normalized mean square error (NMSE) and bit error rate (BER) performance.…”
Get full text
Article -
688
-
689
Fourier Rotman Lens Enabled Directional Modulation Transmitter
Published 2015-01-01“…A 10 GHz Fourier Rotman lens enabled dynamic directional modulation (DM) transmitter is experimentally evaluated. Bit error rate (BER) performance is obtained via real-time data transmission. …”
Get full text
Article -
690
HEVC information hiding approach based on intra prediction modes modulation
Published 2016-09-01“…For further improving the embedding efficiency in the processing of HEVC information hiding,a method for HEVC information hiding based on intra prediction models modulation was proposed.The space lattice dimen-sion N(N = 2,3,4)of each CTU was generated according to the key.The selection rule of intra prediction mode was utilized to select N modes which were located at vertex angle.The N modes were mapped to the value F through the space lattice mapping algorithm.Then N bits secret information were read from the bit file and converted to a deci-mal number D.In this way,N secret information bits were embedded in N intra prediction modes by modifying at most one mode.The experimental results approve that the proposed method has high embedding efficiency,small rate increase and minimal influence on the video quality and the anti-steganalysis experiment confirms that the pro-posed method has high concealment.…”
Get full text
Article -
691
Application of BO-BiGRU based post equalizer in high-speed underwater visible light communication system
Published 2023-05-01“…Signals are susceptible to nonlinear effects in the process of underwater visible light communication (UVLC) channel transmission.In order to improve the communication performance of the system, it is very important to recover the received signals.A bidirectional gated recurrent unit model based on Bayesian optimization algorithm (BO-BiGRU) was proposed as post equalizer in UVLC system, which could automatically find the optimal hyperparameters.BO-BiGRU model was applied to the 1.2 m underwater experimental platform.64 quadrature amplitude modulation (QAM)-carrierless amplitude-and-phase modulation (CAPM) was adopted, and 3.10 Gbit/s rate of data transfer was achieved under the condition that the bit error ratio (BER) of the system was less than 3.8×10<sup>-3</sup>7% forward error correction (FEC), which is 128 Mbit/s higher than the traditional post equalization method.…”
Get full text
Article -
692
Pseudo 4D projective coordinate-based multi-base scalar multiplication
Published 2018-05-01“…In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks,a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer,which aimed at increasing the performance of ECC and resisting common power analysis attacks.Experimental results show that compared with the state-of-the-art algorithms,the proposed algorithm decreases 5.71% of point doubling cost,3.17% of point tripling cost,and 8.74% of point quintupling cost under discrete group operations.When the key length is 160 bit,the proposed algorithm decreases 36.32% of point tripling cost,17.42% of point quintupling cost,and 8.70% of the system cost under continuous group operations.The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack.…”
Get full text
Article -
693
Trellis orthogonal reconstruction algorithm based on orthogonal space-time block code for wireless communication system in high-speed railway
Published 2014-07-01“…When the train moves at a fantastic speed, the fast time-varying channel destroys the orthogonality of OSTBC reducing the diversity gain which would severely degrade the bit error rate (BER) perform-ance. The trellis orthogonal reconstruction algorithm (TORA), in which the intra-code orthogonality is reconstructed through givens transformation and the transmit beamforming direction can be changed as well is proposed. …”
Get full text
Article -
694
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01“…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
Get full text
Article -
695
Asymptotic characterisation of regularised zero‐forcing receiver for imperfect and correlated massive multiple‐input multiple‐output systems
Published 2022-06-01“…Abstract In this work, the authors present an asymptotic high‐dimensional analysis of the regularised zero‐forcing receiver in terms of its mean‐squared error (MSE) and bit error rate (BER) when used for the recovery of binary phase‐shift keying (BPSK) modulated signals in a massive multiple‐input multiple‐output communication system. …”
Get full text
Article -
696
Analysis of MSK jamming effectiveness based on effective jamming coefficient
Published 2022-11-01“…For the problem of communication jamming effectiveness, an effective jamming coefficient was proposed as an evaluation metric based on the correlation between jamming and communication signals, and the impact of orthogonal receivers was analyzed.Specially, minimum shift keying (MSK) and several typical binary modulation signals were chosen as the target communication and jamming signals, respectively.Jamming effectiveness evaluation was performed for the above mentioned scenario by deriving its theoretical bit error rate (BER) formulas.Moreover, for coherent jamming scenario with MSK being the jamming signal, the impact of its phase difference, frequency difference and delay on the jamming effectiveness were also systematically analyzed.The analysis suggests that to achieve better jamming effectiveness, different jamming modulation scheme should be chosen according to the signal-to-noise (SNR) of the jamming communication signal.Simulation has also shown that there is a good match between the derived theoretical analysis and numerical simulation of the proposed method effectiveness, which has proven its accuracy and validity.…”
Get full text
Article -
697
High spectral efficiency SSB-PAM-DD scheme with high linewidth tolerance
Published 2022-05-01“…For low-cost and high chromatic dispersion (CD) robustness single sideband (SSB) with direct detection (DD), three schemes of SSB with pulse amplitude modulation (PAM) were investigated.Among that, the highest spectral efficiency was achieved by the scheme of adding the frequency down-conversion at the transmitter.However, that scheme reduces the tolerance for laser linewidth.Hence, based on the character of the SSB-PAM signal, a DSP scheme was proposed, including a modified equalization algorithm with phase distortion immunity and blind phase search algorithm.The simulation results show that the modified scheme can tolerate 1 MHz linewidth for 112 Gbit/s SSB-PAM-DD, while the original scheme for SSB-PAM was only 100 kHz at the same bit error rate (BER) threshold.Therefore, the proposed scheme can achieve a high frequency efficiency, high linewidth tolerance, and low-cost SSB-PAM signaling transmission.…”
Get full text
Article -
698
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…The progress on universal quantum computer devices is show, so that attacking the 1 024 bit RSA by Shor algorithm is impractical currently. …”
Get full text
Article -
699
Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET
Published 2015-03-01“…In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.…”
Get full text
Article -
700