In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc...In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.展开更多
The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in ...The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.展开更多
The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algori...The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput.展开更多
This paper examines the theory of AES key scheduling and its potential problems.We propose a novel key scheduling scheme.The scheme improves the speed of key expansion without increasing computational complexity,reduc...This paper examines the theory of AES key scheduling and its potential problems.We propose a novel key scheduling scheme.The scheme improves the speed of key expansion without increasing computational complexity,reduces the dependency of output key on input key during key expansion,and improves the avalanche effect of key expansion.展开更多
基金Supported by the National Fundamental Research Program under Grant No.2010CB923202Specialized Research Fund for the Doctoral Program of Education Ministry of China under Grant No.20090005120008+1 种基金 the Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0710 China National Natural Science Foundation under Grant Nos.60871082,60937003 and 10947151
文摘In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.
基金the National Basic Research Programs of China (No. 2011CB201204)the National Natural Science Foundation of China (Nos. 51074160)+1 种基金the Fundamental Research Funds for the Central Universities (No. 2010QNA03)Project Funded by the Priority Academic Program Development of Jiangsu Higher Education institutions for their support for this project
文摘The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.
文摘The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput.
基金Supported by the Natural Science Foundation of Hubei Province(2013CFB473,14Y064,20152906)
文摘This paper examines the theory of AES key scheduling and its potential problems.We propose a novel key scheduling scheme.The scheme improves the speed of key expansion without increasing computational complexity,reduces the dependency of output key on input key during key expansion,and improves the avalanche effect of key expansion.