54 research outputs found
Families of sequences with good family complexity and cross-correlation measure
In this paper we study pseudorandomness of a family of sequences in terms of
two measures, the family complexity (-complexity) and the cross-correlation
measure of order . We consider sequences not only on binary alphabet but
also on -symbols (-ary) alphabet. We first generalize some known methods
on construction of the family of binary pseudorandom sequences. We prove a
bound on the -complexity of a large family of binary sequences of
Legendre-symbols of certain irreducible polynomials. We show that this family
as well as its dual family have both a large family complexity and a small
cross-correlation measure up to a rather large order. Next, we present another
family of binary sequences having high -complexity and low cross-correlation
measure. Then we extend the results to the family of sequences on -symbols
alphabet.Comment: 13 pages. Comments are welcome
Comparison of Randomized Solutions for Constrained Vehicle Routing Problem
In this short paper, we study the capacity-constrained vehicle routing
problem (CVRP) and its solution by randomized Monte Carlo methods. For solving
CVRP we use some pseudorandom number generators commonly used in practice. We
use linear, multiple-recursive, inversive, and explicit inversive congruential
generators and obtain random numbers from each to provide a route for CVRP.
Then we compare the performance of pseudorandom number generators with respect
to the total time the random route takes. We also constructed an open-source
library github.com/iedmrc/binary-cws-mcs on solving CVRP by Monte-Carlo based
heuristic methods.Comment: 6 pages, 2nd International Conference on Electrical, Communication
and Computer Engineering (ICECCE), 12-13 June 2020, Istanbul, Turke
Codes on Subgroups of Weighted Projective Tori
We obtain certain algebraic invariants relevant to study codes on subgroups
of weighted projective tori inside an -dimensional weighted projective
space. As application, we compute all the main parameters of generalized toric
codes on these subgroups of tori lying inside a weighted projective plane of
the form \Pp(1,1,a).Comment: supported by TUBITAK Project No:119F17
Verifiable Timed Proxy Signatures and Multi-signatures
Verifiable timed commitments serve as cryptographic tools that enable the binding of information to specific time intervals. By integrating these commitments into signature schemes, secure and tamper-evident digital signatures can be generated, ensuring the integrity of time-sensitive mechanisms. This article delves into the concept of verifiable timed commitments and explores their efficient applications in digital signature constructions. Specifically, it focuses on two important signature schemes: proxy signatures and multi-signatures. The idea of the timed proxy signature is to enable the delegation of signing rights for a specified period, allowing designated entities to sign messages on behalf of the original signer. On the other hand, multi-signatures allow multiple parties to collectively generate a single signature, ensuring enhanced security and accountability. The article presents an in-depth analysis of the underlying mechanisms, discussing their properties, strengths, and computational complexity. Through this exploration, the article aims to shed light on the potential of verifiable timed commitments and inspire further research in this evolving field of cryptography
- …