4 resultados para Attribute-based encryption schemes

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo


Relevância:

40.00% 40.00%

Publicador:

Resumo:

A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which acts as a pseudo-random generator (PRNG). The paper main focus is to use chaos theory to cryptography. Thus, CA was explored to look for this "chaos" property. This way, the manuscript is more concerning on tests like: Lyapunov exponent, Entropy and Hamming distance to measure the chaos in CA, as well as statistic analysis like DIEHARD and ENT suites. Our results achieved higher randomness quality than others ciphers in literature. These results reinforce the supposition of a strong relationship between chaos and the randomness quality. Thus, the "chaos" property of CA is a good reason to be employed in cryptography, furthermore, for its simplicity, low cost of implementation and respectable encryption power. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

; High-resolution grain size analyses of three AMS (14)C-dated cores from the Southeastern Brazilian shelf provide a detailed record of mid- to late-Holocene environmental changes in the Southwestern Atlantic Margin. The cores exhibit millennial variability that we associate with the previously described southward shift of the Inter Tropical Convergence Zone (ITCZ) average latitudinal position over the South American continent during the Holocene climatic maximum. This generated changes in the wind-driven current system of the SW Atlantic margin and modified the grain size characteristics of the sediments deposited there. Centennial variations in the grain size are associated with a previously described late-Holocene enhancement of the El Nino-Southern Oscillation (ENSO) amplitude, which led to stronger NNE trade winds off eastern Brazil, favouring SW transport of sediments from the Paraiba do Sul River. This is recorded in a core from off Cabo Frio as a coarsening trend from 3000 cal. BP onwards. The ENSO enhancement also caused changes in precipitation and wind pattern in southern Brazil, allowing high discharge events and northward extensions of the low-saline water plume from Rio de la Plata. We propose that this resulted in a net increase in northward alongshore transport of fine sediments, seen as a prominent fine-shift at 2000 cal. BP in a core from similar to 24 degrees S on the Brazilian shelf. Wavelet-and spectral analysis of the sortable silt records show a significant similar to 1000-yr periodicity, which we attribute to solar forcing. If correct, this is one of the first indications of solar forcing of this timescale on the Southwestern Atlantic margin.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, a new family of survival distributions is presented. It is derived by considering that the latent number of failure causes follows a Poisson distribution and the time for these causes to be activated follows an exponential distribution. Three different activation schemes are also considered. Moreover, we propose the inclusion of covariates in the model formulation in order to study their effect on the expected value of the number of causes and on the failure rate function. Inferential procedure based on the maximum likelihood method is discussed and evaluated via simulation. The developed methodology is illustrated on a real data set on ovarian cancer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.