The Advanced Encryption Standard (AES) was specified in 2001 by the National Institute of Standards and Technology. Our attempt is to define the hardware rule about hardware calculation and to find further reduce for the size of AES, by seeking to other normal bases.Finally, we give the result that our hardware implementation is better than the previous results.
With reference to the traditional two dimensional cellular automata network model, we design a kind of hexagonal network model with reconfigurable boundary. By simulating, we have achieved a series of experiments based on the model of the network packet exchange .Then we draw that the node load under congestion phase state is with characteristics of white noise and 1/f noise by computing the power spectrum density. And the results reveal the fact that, the hexagonal one gains more efficient network transmission capacity than the square one, and it is more applicable for the behavioral modeling study on the large-scale network.
Radio frequency identification (RFID) has been applied to a variety of domains. RFID tag search problem becomes significant when the total number of tags is very large and only the data of a particular tag or a small group of tags are required. This paper proposes a lightweight serverless RFID tag search protocol in conformity with EPC C1G2 standards. The computation operations in the protocol are only PRNG and XOR. The security analysis shows that the protocol achieves authentication, data confidentiality, untraceability and data integrity.
E-cash should be spent anonymously in normal circumstances, while in many schemes, the trusted authority is the only one who acts as customer-tracer and e-coin-tracer for preventing illegal transactions, but it is not the case in the reality. In our practical scheme, the bank traces double-spenders without the help of others, and the trusted third party traces e-coins and the owner only when the customer is involved in crimes. When customers lose their e-coins for some reasons, the loss-tracing can be triggered in our scheme which is neglected by almost all existing schemes, so if the lost coins haven't been spent by anyone, the customers can get the refund from the bank. And then the security proofs for our E-cash scheme are provided in the random oracle model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.