The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos ...The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.展开更多
Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication i...Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed,in which AS authenticates the main entities -STAs in the foremost time.Properties of the proposed scheme are discussed,including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI,the proposed scheme not only improves efficiency by reducing cost on computation and communication,but also promotes security property -availability by mitigating DoS attacks to AP and AS.At the same time,a self-updating hash chain technique is presented that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.展开更多
The conventional Continuously Variable Transmission (CVT) has been classified as belt-type or toroidal CVTs. Each CVT is fundamentally composed of several components to transmit the frictional force or torque genera...The conventional Continuously Variable Transmission (CVT) has been classified as belt-type or toroidal CVTs. Each CVT is fundamentally composed of several components to transmit the frictional force or torque generated by the driving force. Since the conventional CVTs use friction force, their energy (force or torque) transfer efficiency might be inferior due to slippage and pressure between the transmission components. Consequently, we propose a new type of structural CVT. The CVT we proposed in this paper means a combined-type transmission with quadric crank chains and one-way clutches.展开更多
基金supported by Key Program of Natural Science Fund of Tianjin of China (Grant No 07JCZDJC06600)
文摘The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.
基金supported by the NNSF of China(No.90204015, 60473021)the Key Technologies Research and Development Program of Henan Province of China(No.0524220044,062426001)the Research Found of HAUT of China(No.0401009, 050211,050215,050216)
文摘Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed,in which AS authenticates the main entities -STAs in the foremost time.Properties of the proposed scheme are discussed,including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI,the proposed scheme not only improves efficiency by reducing cost on computation and communication,but also promotes security property -availability by mitigating DoS attacks to AP and AS.At the same time,a self-updating hash chain technique is presented that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.
文摘The conventional Continuously Variable Transmission (CVT) has been classified as belt-type or toroidal CVTs. Each CVT is fundamentally composed of several components to transmit the frictional force or torque generated by the driving force. Since the conventional CVTs use friction force, their energy (force or torque) transfer efficiency might be inferior due to slippage and pressure between the transmission components. Consequently, we propose a new type of structural CVT. The CVT we proposed in this paper means a combined-type transmission with quadric crank chains and one-way clutches.