A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover...A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
The effect of Dzyaloshinskii-Moriya (D-M) interaction on the bistable nano-scale soliton switching offers the possiblity of developing a new innovative approach for data storage technology. The dynamics of Heisenber...The effect of Dzyaloshinskii-Moriya (D-M) interaction on the bistable nano-scale soliton switching offers the possiblity of developing a new innovative approach for data storage technology. The dynamics of Heisenberg ferromagnetic spin system is expressed in terms of generalized inhomogeneous higher order nonlinear Schr6dinger (NLS) equation. The bistable soliton switching in the ferromagnetic medium is established by solving the associated coupled evolution equations for amplitude and velocity of the soliton using the fourth order Runge-Kutta method numerically.展开更多
基金Supported by the National Key Foundation Research "973" project (No.G1999035802) and the National Natural Science Foundation of China (No.60273027).
文摘A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the secu-rity of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system
基金support by NBHM in the form of major research project, BRNS in the form of Young Scientist Research Award, India and ICTP, Italy in the form of Junior Associateshipfinancial support from CSIR, India in the form of Senior Research Fellowship
文摘The effect of Dzyaloshinskii-Moriya (D-M) interaction on the bistable nano-scale soliton switching offers the possiblity of developing a new innovative approach for data storage technology. The dynamics of Heisenberg ferromagnetic spin system is expressed in terms of generalized inhomogeneous higher order nonlinear Schr6dinger (NLS) equation. The bistable soliton switching in the ferromagnetic medium is established by solving the associated coupled evolution equations for amplitude and velocity of the soliton using the fourth order Runge-Kutta method numerically.