supported by the National Key Research and Development Program of China (Grant No.2022YFB2701900);the National Natural Science Foundation of China (Grant No.62202444);the Fundamental Research Funds for the Central Universities。
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric...
This research presents,and claries the application of two permutation algorithms,based on chaotic map systems,and applied to a le of speech signals.They are the Arnold cat map-based permutation algorithm,and the Baker...
supported by National Key Research and Development Program of China(Grant No.2017YFA0303903);National Natural Science Foundation of China(Grant No.62072270);National Cryptography Development Fund(Grant Nos.MMJJ20170121,MMJJ20180101);Zhejiang Province Key R&D Project(Grant No.2017C01062)。
Dear editor,Recently,the permutation-based cryptology becomes a good topic in symmetric-key research groups.Many dedicated ciphers are permutation-based,and researchers introduced lots of cryptographic permutations wh...
supported by the National Natural Science Foundation of China(No.61572516,No.61802437,No.61902428)。
As a generalized integral property,division property was proposed by Todo at EUROCRYPT 2015.We propose a new security criterion of S-boxes against division property and prove that it is invariant under permutation-xor...
Multi-type quasi-cyclic(QC) low-density parity-check(LDPC) codes can be considered as multiple-edge protograph QC-LDPC codes having some advantages in the minimum Hamming distance bound over single-edge protograph cod...
supported by National Natural Science Foundation of China (Grant No. 61571116)
Dear editor,Maintaining the secrecy of secret keys under the so-called power analysis attack(PAA)is challenging(the summary of PAAs countermeasure was shown in Appendix A).Prior studies have demonstrated that conventi...
supported by the National Nature Science Foundation of China under Grant Nos.61872381,61872359,61862011,and 61402522;supported by Guangxi Key Laboratory of Cryptography and Information Security under Grant No.GCIS201704
This paper is twofold. The first is devoted to study a class of quadratic rotation symmetric S-boxes(RSSBs) which was presented by Gao G, et al., Constructions of quadratic and cubic rotation symmetric bent functions,...
supported by the Program for New Century Excellent Talents in University of China(No.NCET-11-0873);the Key Project of Chongqing Natural Science Foundation(No.CSTC2011BA2016);the Program for Fundamental and Advanced Research of Chongqing(No.cstc2013jcyj A40045)
Traditional Block compressed sensing(BCS) schemes encode nature images via a fixed sampling rate without taking the sparsity level differences among the blocks into consideration. In order to improve the sampling effi...
Pilot plays an essential role in a duplex communication system.Several methods have been proposed for pilot assignment over specific scenarios.With the help of permutation encoding,we implemented a genetic algorithm f...
supported by the Tencent and Shanghai Jiao Tong University Joint Project
The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of au...