510 resultados para RSA reticoli Coppersmith


Relevância:

10.00% 10.00%

Publicador:

Resumo:

将前向安全的思想与代理多重数字签名结合,提出一个前向安全的代理多重签名方案,该方案不仅满足一般代理多重签名方案的性质,而且具有前向安全性。在强RSA假定、计算式Diffie-Hellman问题及有限域上离散对数问题难解的假设下,该方案具有良好的安全性。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Considering the lacking of standard for the classification of Accumulative slopes so far, research working was conducted based on the results of geological investigation, data analysis and experiment carried out in Wanzhou. By mean of statistical method and grey system, the author studied in detail inflationary factors to Accumulative slopes. In order to study the mechanism of Rock-Soil Aggregate (RSA), numerical testing method was used. Coordinates in the two and three dimensional space and its corresponding rock fragments in the sample were generated randomly by VB and Particle flow code. After being built the models of RSA with different rock content, uniaxial and triaxial numerical simulation tests were carried out respectively. In order to study the effect of rainfall in Accumulative slopes, in situ infiltration testing had been conducted on site in Wanzhou, Three Gorges Area. Relationship between the infiltration rate and amount of precipitation has been obtained. Eleven factors are considered in the classification of Accumulative slopes in this paper.(1)On the basis of four basic factors and four inducing factors, sum-and-difference method for the classification system has been built. (2)After weight of factors being determined by analytic hierarchy process and membership function of Accumulative slopes stability being built in virtue of fuzzy mathematics, AHP-FM model of Accumulative slopes stability has been completed. In the end of this paper, having been applied on stability of Accumulative slopes in Three Gorge area and compared with result by limit equilibrium, classification system has good effect.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The development of a microcomputer-based device permits quick, simple, and noninvasive quantification of the respiratory sinus arrhythmia (RSA) during quiet breathing. METHODS AND RESULTS: We prospectively and serially measured the radionuclide left ventricular ejection fraction and the RSA amplitude in 34 cancer patients receiving up to nine monthly bolus treatments with doxorubicin hydrochloride (60 mg/m2). Of the eight patients who ultimately developed symptomatic doxorubicin-induced congestive heart failure, seven (87.5%) demonstrated a significant decline in RSA amplitude; five of 26 subjects without clinical symptoms of cardiotoxicity (19.2%) showed a similar RSA amplitude decline. On average, significant RSA amplitude decline occurred 3 months before the last planned doxorubicin dose in patients destined to develop clinical congestive heart failure. CONCLUSION: Overall, RSA amplitude abnormality proved to be a more specific predictor of clinically significant congestive heart failure than did serial resting radionuclide ejection fractions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article describes an approach for quantifying microsphere deposition onto iron-oxide-coated sand under the influence of adsorbed Suwannee River Humic Acid (SRHA). The experimental technique involved a triple pulse injection of model latex microspheres (microspheres) in pulses of (1) microspheres, followed by (2) SRHA, and then (3) microspheres, into a column filled with iron-coated quartz sand as a water-saturated porous medium. A random sequential adsorption model (RSA) simulated the gradual rise in the first (microsphere) breakthrough curve (BTC). Using the same model calibration parameters a dramatic increase in concentration at the start of the second particle BTC, generated after SRHA injection, could be simulated by matching microsphere concentrations to extrapolated RSA output. RSA results and microsphere/SRHA recoveries showed that 1 mg of SRHA could block 5.90 plus or minus 0.14 x 10^9 microsphere deposition sites. This figure was consistent between experiments injecting different SRHA masses, despite contrasting microsphere deposition/release regimes generating the second microsphere BTC.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Learning difficulties in preterm infants are thought to reflect impairment in arousal regulation. We examined relationships among gestational age, learning speed, and behavioral and physiological reactivity in 55 preterm and 49 full-term infants during baseline, contingency, and nonreinforcement phases of a conjugate mobile paradigm at 3 months corrected age. For all infants, negative affect, looking duration, and heart rate levels increased during contingency and nonreinforcement phases, whereas respiratory sinus arrhythmia (RSA, an index of parasympathetic activity) decreased and cortisol did not change. Learners showed greater RSA suppression and less negative affect than nonlearners. This pattern was particularly evident in the preterm group. Overall, preterm infants showed less learning, spent less time looking at the mobile, and had lower cortisol levels than full-term infants. Preterm infants also showed greater heart rate responses to contingency and dampened heart rate responses to nonreinforcement compared to full-term infants. Findings underscore differences in basal and reactivity measures in preterm compared to full-term infants and suggest that the capacity to regulate parasympathetic activity during a challenge enhances learning in preterm infants.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are an important primitive for building secure systems and are used in most real-world security protocols. However, almost all popular signature schemes are either based on the factoring assumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case of classical cryptanalytic advances or progress on the development of quantum computers, the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of signature schemes based on the hardness of certain lattice problems that are assumed to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this article, we focus on recent developments and the current state of the art in lattice-based digital signatures and provide a comprehensive survey discussing signature schemes with respect to practicality. Additionally, we discuss future research areas that are essential for the continued development of lattice-based cryptography.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The photonic efficiencies of films of Evonik (formerly Degussa) P25 TiO2 and carbon-modified TiO2 Kronos VLP 7000 samples are reported as a function of excitation wavelength (300–430 nm; FWHM ∼ 7.5 nm), i.e. the action spectra, for the degradation of stearic acid, a model organic for the photocatalytic destruction of solid surface organic pollutants. For each of these semiconductor photocatalysts, at 365 nm (FWHM = 18 nm), the dependence of the rate of degradation of stearic acid, upon the irradiance, I, is determined and the rate is found to be proportional to I0.65 and I0.82 for P25 and Kronos titania, respectively. Assuming this relationship holds at all wavelengths, the action spectra for two different semiconductor photocatalysts is modified by plotting, (RSA (rate of stearic acid destruction, units: molecules cm−2 s−1)/Iθ) vs. wavelength of excitation (λexcit), and both differ noticeably from those of the original (unmodified) action spectra, which are plots of (RSA/I = photonic efficiency, ξ) vs. λexcit. The shape of the modified action spectrum for P25 TiO2 is consistent with that reported by others for other organic mineralisation reactions and correlates well with diffuse reflectance data for P25 TiO2 (Kubelka–Munk plot), although there is some evidence that the active phase, in the photodegradation of stearic acid, is the anatase form present in P25. The unmodified and modified action spectra of the beige Kronos VLP 7000 TiO2 compound exhibits little or no activity in the visible i.e. (λexcit > 400 nm) and a peak at 350 nm. The Kronos powder contains a yellow/brown conjugated, extractable, organic sensitiser which has been identified by others as the species responsible for its reported photocatalytic visible light activity. But, irradiation of the Kronos powder film, with and without a stearic acid coating, in air, using UVA or visible light, bleaches rapidly (<60 min) most, if not all, of the little colour exhibited by the original Kronos powder. The photobleached form of the Kronos has a similar action spectrum to that of the unbleached form, which, in turn, appears very similar to that of P25 titania, at wavelengths >350 nm. It is proposed that the difference between the Kronos and P25 powder films at wavelengths <350 nm is due to a photodegradation-resistant, previously unidentified (but extractable using MeCN) UV-absorbing organic species in the former which screens the titania particles at these lower wavelengths. The implications of these observations are discussed briefly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A total of 107 putative ericoid mycorrhizal endophytes were isolated from hair roots of Calluna vulgaris from two abandoned arsenic/copper mine sites and a natural heathland site in southwest England. The endophytes were initially grouped as 14 RFLP types, based on the results of ITS-RFLP analysis using the restriction endonucleases Hinf I, Rsa I and Hae III. ITS sequences were obtained for representative isolates from each RFLP type and compared phylogenetically with sequences for known ericoid mycorrhizal endophytes and selected ascomycetes. The majority of endophyte isolates (62-92%) from each site were identified as Hymenoscyphus ericae, but a number of other less common mycorrhizal RFLP types were also identified, all of which appear to have strong affinities with the order Leotiales. None of the less common RFLP types was isolated from C. vulgaris at more than one field site. Neighbour-joining analysis indicated similarities between the endophytes from C. vulgaris and mycorrhizal endophytes isolated from other Ericaceae and Epacridaceae hosts in North America and Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, the proliferation of discoveries has enabled studies of stone tools used in metal working to develop. The increasing number of tools, made mostly from Neolithic polished axes, reveals a typological and functional diversity that remained largely unsuspected. This diversity is an opportunity to understand the tools and address the technical issues relating to the plastic deformation of metals. The operations that are represented here demonstrate the techniques used by coppersmiths with specialised tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to produce packaging films with a broad spectrum of action on microorganisms, the effect of two antimicrobial (AM) to be included in the films, carvacrol and GSE were studied separately on different microorganisms. Carvacrol was more effective against the grampositive bacteria than against the gram-negative bacterium. GSE was not effective against yeast. Subsequently, a search for optimal combinations of carvacrol, GSE and the addition of chitosan (as a third component with film forming properties) was carried out. Response surface analysis showed several synergetic effects and three optimal AM combinations (OAMC) were obtained for each microorganism. The experimental validation confirmed that the optimal solutions found can successfully predict the response for each microorganism. The optimization of mixtures of the three components, but this time, using the same concentration for all microorganisms, was also studied to obtain an OAMC with wide spectrum of activity. The results of the response surface analysis showed several synergistic effects for all microorganisms. Three OAMC, OAMC-1, OAMC-2, OAMC-3, were found to be the optimal mixtures for all microorganisms. The radical scavenging activity (RSA) of the different agents was then compared with a standard antioxidant (AOX) BHT, at different concentrations; as also at the OAMC. The RSA increased in the following order: chitosan