http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks
( Wei Li ),( Chenyu Ge ),( Dawu Gu ),( Linfeng Liao ),( Zhiyong Gao ),( Xiujin Shi ),( Ting Lu ),( Ya Liu ),( Zhiqiang Liu ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.7
With the enlargement of wireless technology, vehicular ad-hoc networks (VANETs) are rising as a hopeful way to realize smart cities and address a lot of vital transportation problems such as road security, convenience, and efficiency. To achieve data confidentiality, integrity and authentication applying lightweight cryptosystems is widely recognized as a rather efficient approach for the VANETs. The Khudra cipher is such a lightweight cryptosystem with a typical Generalized Feistel Network, and supports 80-bit secret key. Up to now, little research of fault analysis has been devoted to attacking Khudra. On the basis of the single nibble-oriented fault model, we propose a differential fault analysis on Khudra. The attack can recover its 80-bit secret key by introducing only 2 faults. The results in this study will provides vital references for the security evaluations of other lightweight ciphers in the VANETs.
Security Analysis of the Whirlpool Hash Function in the Cloud of Things
( Wei Li ),( Zhiyong Gao ),( Dawu Gu ),( Chenyu Ge ),( Linfeng Liao ),( Zhihong Zhou ),( Ya Liu ),( Zhiqiang Liu ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.1
With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network
( Wei Li ),( Linfeng Liao ),( Dawu Gu ),( Chenyu Ge ),( Zhiyong Gao ),( Zhihong Zhou ),( Zheng Guo ),( Ya Liu ),( Zhiqiang Liu ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.1
With the advancement and deployment of wireless communication techniques, wireless body area network (WBAN) has emerged as a promising approach for e-healthcare that collects the data of vital body parameters and movements for sensing and communicating wearable or implantable healthful related information. In order to avoid any possible rancorous attacks and resource abuse, employing lightweight ciphers is most effective to implement encryption, decryption, message authentication and digital signature for security of WBAN. As a typical lightweight cryptosystem with an extended sponge function framework, the PHOTON family is flexible to provide security for the RFID and other highly-constrained devices. In this paper, we propose a differential fault analysis to break three flavors of the PHOTON family successfully. The mathematical analysis and simulating experimental results show that 33, 69 and 86 random faults in average are required to recover each message input for PHOTON-80 /20/16, PHOTON-160/36/36 and PHOTON-224/32/32, respectively. It is the first result of breaking PHOTON with the differential fault analysis. It provides a new reference for the security analysis of the same structure of the lightweight hash functions in the WBAN.
Chunmei Miao,Wei-Gao Ge,Zhaojun Zhang 한국수학교육학회 2014 純粹 및 應用數學 Vol.21 No.3
In this paper, we study the existence of positive solutions for singularimpulsive differential equations with integral boundary conditions "( )+ ( ) ( , ( ), '( ))=0, ∊ ',∆ ( )= ( ( ), '( )), =1,2,…, ,∆ '( )=- ( ( ), '( )), =1,2,…, , (0)=∫10 ( ) ( ) , '(1)=0,where the nonlinearity f(t, u, v) may be singular at v = 0. The proof is based onthe theory of Leray-Schauder degree, together with a truncation technique. Somerecent results in the literature are generalized and improved.
Finite Element Simulation and Experiment Verification of Rolling Forming for the Truck Wheel Rim
Gang Fang,Wei-Ran Gao,Xiao-Ge Zhang 한국정밀공학회 2015 International Journal of Precision Engineering and Vol. No.
The present research aims to investigate general laws of three-pass roll forming of steel wheel rim by finite element simulation. Firstly, finite element models of the rolling process were built on ABAQUS. To ensure the validity of models, some important settings as multistep construction, flexible boundary conditions of side rolls and nonlinear loading curves were considered, which provide the basis for high-accuracy numerical simulation of rim forming. Based on the results of simulation, each pass of the rim forming process was then analyzed. Especially, the investigations of wall thickness distribution and equivalent plastic strain on formed wheel rim are conducted, from which the role of three rolling passes and characteristics of rim forming can be summarized. Moreover, experiment results verified the reliability of finite element model. Subsequently, for analyzing the problems of welding-line cracking, model of flaring dies with various flaring angles were tried in simulations to discuss their influences on forming results of the wheel rim.
Multiple symmetric positive solutions of fourth-order two point boundary value problem
De-Xiang Ma,Wei-Gao Ge 한국전산응용수학회 2006 Journal of applied mathematics & informatics Vol.22 No.1-2
In this paper, by using the Krasnoselskii fixed point theorem, we study the existence of 2m or 2m + 1 symmetric positive solutions of fourth-order two point boundary value problem y(4)(t)−f(t, y(t), y00(t)) = 0, y(0) = y(1) = y0(0) = y00(1) = 0.
MULTIPLE SYMMETRIC POSITIVE SOLUTIONS OF FOURTH-ORDER TWO POINT BOUNDARY VALUE PROBLEM
Ma, De-Xiang,Ge, Wei-Gao 한국전산응용수학회 2006 Journal of applied mathematics & informatics Vol.22 No.1
In this paper, by using the Krasnoselskii fixed point theorem, we study the existence of 2m or 2m + 1 symmetric positive solutions of fourth-order two point boundary value problem y(4)(t) - f(t, y(t), y"(t))= 0, y(0) = y(1) = y'(0) = y"(1)=0.
Wu, Min-Qing,Hu, Pan,Gao, Jie,Wei, Wei-Dong,Xiao, Xiang-Sheng,Tang, Hai-Lin,Li, Xing,Ge, Qi-Dong,Jia, Wei-Hua,Liu, Ren-Bin,Xie, Xiao-Ming Asian Pacific Journal of Cancer Prevention 2013 Asian Pacific journal of cancer prevention Vol.14 No.1
Background: Low tyrosine-protein phosphatase nonreceptor type 12 (PTPN12) expression may be associated with breast cancer growth, proliferation, and metastasis. However, the prognostic value of PTPN12 in breast cancer has not been clearly identified. Patients and Methods: 51 triple-negative breast cancer (TNBC) patients and 83 non-TNBC patients with a histopathology diagnosis from October 2001 to September 2006 were included in this study. Immunohistochemical staining for PTPN12 on tissue microarrays was conducted. Results: High PTPN12 expression was seen in 39.2% of TNBC and 60.2 % of non-TNBC cases. Low PTPN12 expression was associated with lymph node status (p = 0.002) and distant metastatic relapse (p = 0.002) in TNBC patients. Similarly, low PTPN12 expression in non-TNBC patients was significantly correlated with lymph node status (p = 0.002), stage (p = 0.002) and distant metastatic relapse (p = 0.039). The high PTPN12 expression group was associated with longer DFS and OS compared with low PTPN12 expression group only in TNBC cases (p = 0.005, p = 0.015), according to univariate Cox regression analysis. Conclusion: These findings provide evidence that low expression of PTPN12 is associated with worse prognosis and may be used as a potential prognostic biomarker in TNBC patients.
Gui Mei Yu,Shu Long Zu,Wei Wei Zhou,Xi Jun Wang,Lei Shuai,Xue Lian Wang,Jin Ying Ge,Zhi Gao Bu 대한수의학회 2017 Journal of Veterinary Science Vol.18 No.-
Rabies remains an important worldwide health problem. Newcastle disease virus (NDV) was developed as a vaccine vector in animals by using a reverse genetics approach. Previously, our group generated a recombinant NDV (LaSota strain) expressing the complete rabies virus G protein (RVG), named rL-RVG. In this study, we constructed the variant rL-RVGTM, which expresses a chimeric rabies virus G protein (RVGTM) containing the ectodomain of RVG and the transmembrane domain (TM) and a cytoplasmic tail (CT) from the NDV fusion glycoprotein to study the function of RVG’s TM and CT. The RVGTM did not detectably incorporate into NDV virions, though it was abundantly expressed at the surface of infected BHK-21 cells. Both rL-RVG and rL-RVGTM induced similar levels of NDV virus-neutralizing antibody (VNA) after initial and secondary vaccination in mice, whereas rabies VNA induction by rL-RVGTM was markedly lower than that induced by rL-RVG. Though rL-RVG could spread from cell to cell like that in rabies virus, rL-RVGTM lost this ability and spread in a manner similar to the parental NDV. Our data suggest that the TM and CT of RVG are essential for its incorporation into NDV virions and for spreading of the recombinant virus from the initially infected cells to surrounding cells.