27 research outputs found

    New construction of Boolean functions with maximun algebraic immunity

    Get PDF
    Because of the algebraic attacks, a high algebraic immunity is now an important criteria for Boolean functions used in stream ciphers. In this paper, by using the relationship between some flats and support of a n variables Boolean function f, we introduce a general method to determine the algebraic immunity of a Boolean function and finally construct some balanced functions with optimum algebraic immunity

    Certificateless generalized signcryption

    Get PDF
    Generalized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provives encryption or signature alone when needed. This paper gives a formal definition of certificateless generalized signcryption and its security model is present. A concrete certificateless generalized signcryption scheme is also proposed in this paper

    A Single E627K Mutation in the PB2 Protein of H9N2 Avian Influenza Virus Increases Virulence by Inducing Higher Glucocorticoids (GCs) Level

    Get PDF
    While repeated infection of humans and enhanced replication and transmission in mice has attracted more attention to it, the pathogenesis of H9N2 virus was less known in mice. PB2 residue 627 as the virulent determinant of H5N1 virus is associated with systemic infection and impaired TCR activation, but the impact of this position in H9N2 virus on the host immune response has not been evaluated. In this study, we quantified the cellular immune response to infection in the mouse lung and demonstrate that VK627 and rTsE627K infection caused a significant reduction in the numbers of T cells and inflammatory cells (Macrophage, Neutrophils, Dendritic cells) compared to mice infected with rVK627E and TsE627. Further, we discovered (i) a high level of thymocyte apoptosis resulted in impaired T cell development, which led to the reduced amount of mature T cells into lung, and (ii) the reduced inflammatory cells entering into lung was attributed to the diminished levels in pro-inflammatory cytokines and chemokines. Thereafter, we recognized that higher GCs level in plasma induced by VK627 and rTsE627K infection was associated with the increased apoptosis in thymus and the reduced pro-inflammatory cytokines and chemokines levels in lung. These data demonstrated that VK627 and rTsE627K infection contributing to higher GCs level would decrease the magnitude of antiviral response in lung, which may be offered as a novel mechanism of enhanced pathogenicity for H9N2 AIV

    A Secure Communication Method Based on Message Hash Chain

    No full text
    Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery. This paper proposes a secure communication method based on the message hash chain, referred to as the chain communication method or MHC method. We use the message hash chain to ensure that the transmission process is immutable, non-repudiation, reliability, and the integrity and synchronization of the message. At the same time, we can sign and authenticate data streams in batches through chain signature and authentication technology, which can significantly reduce the overhead of signature and authentication, thereby improving the efficiency of secure message transmission. This paper formally proves the security of the message hash chain, conducts an in-depth analysis of the reliability of the MHC method, and conducts relevant experimental tests. The results show that the average transmission efficiency of the MHC method applied at the network layer is about 70% lower than that of the IP protocol communication method without a security mechanism. However, it is about 5% higher than the average transmission efficiency of the non-repudiation IPSec protocol communication method. The average transmission efficiency of the MHC method is about 23.5 times higher than that of the IP protocol communication method with the packet-by-packet signature. It is easier to ensure the non-repudiation of the data stream

    High Efficiency Feedback Shift Register: σ−LFSR ⋆

    No full text
    Abstract. We introduce a new kind of word-oriented linear feedback shift register called σ−LFSR which is constructed with the instructions of the modern processor and have fast software implementation. We offer an algorithm to search for good primitive σ−LFSR. In particular, we give two examples HHZ-1 and HHZ-2 and compare their efficiency and security with those of the LFSRs appearing in stream ciphers such as SNOW, SOBER and Turing. Our results show that replacing the LFSRs in SNOW, SOBER and Turing with HHZ-1 will improve security and the efficiency of fast software implementation

    calculation components analysis of the lattice sieve

    No full text
    Currently, the best known algorithm for factoring RSA modulus is the General Number Field Sieve. Through the software optimized implementation of GNFS with RSA-768, we extracted nine main calculation components from the lattice sieve. Detail descriptions and comprehensive analysis of the properties about calculation, memory and communication to the nine components were given in this paper, which makes it possible to use of a variety of computing platforms, such as CPU, FPGA, CELL, and GPU etc, to accelerate the realization of GNFS. © (2012) Trans Tech Publications.Currently, the best known algorithm for factoring RSA modulus is the General Number Field Sieve. Through the software optimized implementation of GNFS with RSA-768, we extracted nine main calculation components from the lattice sieve. Detail descriptions and comprehensive analysis of the properties about calculation, memory and communication to the nine components were given in this paper, which makes it possible to use of a variety of computing platforms, such as CPU, FPGA, CELL, and GPU etc, to accelerate the realization of GNFS. © (2012) Trans Tech Publications

    On counting absolute trace of powers inGF(p m )

    No full text
    corecore