An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the...An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs.展开更多
The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the f...The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the focus of our study are the FO (first-order) queries that are invariant under order-preserving permutations-such queries are called order-generic. It was discovered that for some domains order-generic FO queries fail to express more than pure order queries. The collapse result theorem was proved for locally genetic queries over a linearly ordered domain with the Pseudo finite Homogeneity Property (or / and the Isolation Property) by Belegradek et al.. Here the authors consider a circularly ordered domain and prove the collapse result theorem over a quasi circularly minimal domain.展开更多
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat...Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.展开更多
Computer simulation is a good guide and reference for development and research on petroleum refining processes. Traditionally, pseudo-components are used in the simulation, in which their physical properties are estim...Computer simulation is a good guide and reference for development and research on petroleum refining processes. Traditionally, pseudo-components are used in the simulation, in which their physical properties are estimated by empirical relations and cannot be associated with actual chemical reactions, as no molecular structure is available for pseudo-components. This limitation can be overcome if real components are used. In this paper, a real component based method is proposed for the simulation of a diesel hydrotreating process by using the software of Unisim Design. This process includes reaction units and distillation units. The chemical reaction network is established by analyzing the feedstock. The feedstock is characterized by real components, which are obtained based on true boiling point curve. Simulation results are consistent with actual data.展开更多
The study on seepage flow passing through single fractures is essential and critical for understanding of the law of seepage flow passing through fracture networks and the coupling mechanisms of seepage field and stre...The study on seepage flow passing through single fractures is essential and critical for understanding of the law of seepage flow passing through fracture networks and the coupling mechanisms of seepage field and stress field in rock masses.By using the fractal interpolation to reconstruct a natural coarse fracture,as well as taking into account the microstructure of the fracture,the numerical simulation of seepage flow passing through the coarse fractures with two distinct vertical scaling factors is conducted based on the MRT-LBM model of the lattice Boltzmann method.Then,after obtaining the length of the preferential flow pathway,the permeability of the two kinds of fractures is estimated respectively.In view of difficulties in locating the preferential flow pathway of natural fracture networks,by numerical tests a transect permeability weighted algorithm for estimating the fracture network permeability is proposed.The algorithm is not specific to one or more particular preferential flow pathways,but considers the contribution of each section to hinder the fluid passing through the medium.In order to apply the new algorithm,by capturing the structure of fracture networks based on the image-processing technique,the numerical simulations of seepage flow passing through two groups of natural fracture networks is carried out,the permeability is forecasted and the partial flows are reproduced for both cases.It is found that the preferential flow pathway emerges at the beginning of evolution,then is strengthened subsequently,and finally reaches a steady status.Furthermore,by using the proposed method some details on local flow can be clearly observed such as backflows and vortices at local branches can exist simultaneously and so forth,suggesting the validness of the proposed method for multiscale simulations of seepage flow.展开更多
According to the anti-phase sine current superposition theorem, the orientation, the magnetic flux density, the angular speed and the rotational direction of the spatial universal rotating magnetic field (SURMF) can...According to the anti-phase sine current superposition theorem, the orientation, the magnetic flux density, the angular speed and the rotational direction of the spatial universal rotating magnetic field (SURMF) can be controlled within the tri-axial orthogonal square Helmholtz coils (TOSHC). Nevertheless, three coupling direction angles of the normal vector of the SURMF in the Descartes coordinate system cannot be separately controlled, thus the adjustment of the orientation of the SURMF is difficult and the flexibility of the robotic posture control is restricted. For the dimension reduction and the decoupling of control variables, the orthogonal transformation operation theorem of the SURMF is proposed based on two independent rotation angular variables, which employs azimuth and altitude angles as two variables of the three-phase sine current superposition formula derived by the orthogonal rotation inverse transformation. Then the unique control rules of the orientation and the rotational direction of the SURMF are generalized in each spatial quadrant, thus the scanning of the normal vector of the SURMF along the horizontal or vertical direction can be achieved through changing only one variable, which simplifies the control process of the orientation of the SURMF greatly. To validate its feasibility and maneuverability, experiments were conducted in the animal intestine utilizing the innovative dual hemisphere capsule robot (DHCR) with active and passive modes. It was demonstrated that the posture adjustment and the steering rolling locomotion of the DHCR can be realized through single variable control, thus the orthogonal transformation operation theorem makes the control of the orientation of the SURMF convenient and flexible significantly. This breakthrough will lay a foundation for the human-machine interaction control of the SURMF.展开更多
基金supported by National Natural Science Foundation of China with granted No.61404175
文摘An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs.
文摘The authors consider relational databases organized over an ordered domain with some additional relations - a typical example is the ordered domain of rational numbers together with the operation of addition. In the focus of our study are the FO (first-order) queries that are invariant under order-preserving permutations-such queries are called order-generic. It was discovered that for some domains order-generic FO queries fail to express more than pure order queries. The collapse result theorem was proved for locally genetic queries over a linearly ordered domain with the Pseudo finite Homogeneity Property (or / and the Isolation Property) by Belegradek et al.. Here the authors consider a circularly ordered domain and prove the collapse result theorem over a quasi circularly minimal domain.
文摘Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.
文摘Computer simulation is a good guide and reference for development and research on petroleum refining processes. Traditionally, pseudo-components are used in the simulation, in which their physical properties are estimated by empirical relations and cannot be associated with actual chemical reactions, as no molecular structure is available for pseudo-components. This limitation can be overcome if real components are used. In this paper, a real component based method is proposed for the simulation of a diesel hydrotreating process by using the software of Unisim Design. This process includes reaction units and distillation units. The chemical reaction network is established by analyzing the feedstock. The feedstock is characterized by real components, which are obtained based on true boiling point curve. Simulation results are consistent with actual data.
基金supported by the National Basic Research Program of China("973"Project)(Grant No.2011CB013505)the National Natural Science Funds for Distinguished Young Scholar(Grant No.50925933)
文摘The study on seepage flow passing through single fractures is essential and critical for understanding of the law of seepage flow passing through fracture networks and the coupling mechanisms of seepage field and stress field in rock masses.By using the fractal interpolation to reconstruct a natural coarse fracture,as well as taking into account the microstructure of the fracture,the numerical simulation of seepage flow passing through the coarse fractures with two distinct vertical scaling factors is conducted based on the MRT-LBM model of the lattice Boltzmann method.Then,after obtaining the length of the preferential flow pathway,the permeability of the two kinds of fractures is estimated respectively.In view of difficulties in locating the preferential flow pathway of natural fracture networks,by numerical tests a transect permeability weighted algorithm for estimating the fracture network permeability is proposed.The algorithm is not specific to one or more particular preferential flow pathways,but considers the contribution of each section to hinder the fluid passing through the medium.In order to apply the new algorithm,by capturing the structure of fracture networks based on the image-processing technique,the numerical simulations of seepage flow passing through two groups of natural fracture networks is carried out,the permeability is forecasted and the partial flows are reproduced for both cases.It is found that the preferential flow pathway emerges at the beginning of evolution,then is strengthened subsequently,and finally reaches a steady status.Furthermore,by using the proposed method some details on local flow can be clearly observed such as backflows and vortices at local branches can exist simultaneously and so forth,suggesting the validness of the proposed method for multiscale simulations of seepage flow.
基金supported by the National Natural Science Foundation of China (Grant Nos. 51277018, 61175102, & 51475115)the Open Fund of the State Key Laboratory of Mechanical Transmissions (Grant No.SKLMT-KFKT-201509)
文摘According to the anti-phase sine current superposition theorem, the orientation, the magnetic flux density, the angular speed and the rotational direction of the spatial universal rotating magnetic field (SURMF) can be controlled within the tri-axial orthogonal square Helmholtz coils (TOSHC). Nevertheless, three coupling direction angles of the normal vector of the SURMF in the Descartes coordinate system cannot be separately controlled, thus the adjustment of the orientation of the SURMF is difficult and the flexibility of the robotic posture control is restricted. For the dimension reduction and the decoupling of control variables, the orthogonal transformation operation theorem of the SURMF is proposed based on two independent rotation angular variables, which employs azimuth and altitude angles as two variables of the three-phase sine current superposition formula derived by the orthogonal rotation inverse transformation. Then the unique control rules of the orientation and the rotational direction of the SURMF are generalized in each spatial quadrant, thus the scanning of the normal vector of the SURMF along the horizontal or vertical direction can be achieved through changing only one variable, which simplifies the control process of the orientation of the SURMF greatly. To validate its feasibility and maneuverability, experiments were conducted in the animal intestine utilizing the innovative dual hemisphere capsule robot (DHCR) with active and passive modes. It was demonstrated that the posture adjustment and the steering rolling locomotion of the DHCR can be realized through single variable control, thus the orthogonal transformation operation theorem makes the control of the orientation of the SURMF convenient and flexible significantly. This breakthrough will lay a foundation for the human-machine interaction control of the SURMF.