Entity

Time filter

Source Type


Zhang X.-Y.,Zhengzhou University | Zhang X.-Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Zhang X.-Y.,Information Assurance | Qi Y.-H.,Zhengzhou University | And 2 more authors.
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | Year: 2015

Rotation-symmetric Boolean function is a class of Boolean functions with good cryptographic properties, and researches on its weight and nonlinearity cryptographic properties have good theoretical value. Different from the conventional calculation method, in this paper, these problems are converted to the evaluation of exponential sum on finite fields with a specific normal basis. Some new results about the weight and nonlinearity of some rotation-symmetric Boolean functions of degree 2 with 4 vertical bar with a slash n and n=2s are obtained. Using the proposed method, the weight and nonlinearity of almost all Rotation-symmetric Boolean functions of degree 2 can be evaluated. This new method is also interesting for studies on the other Boolean functions. © 2015, Science Press. All right reserved.


Cheng Q.,China Institute of Technology | Cheng Q.,Luoyang University of Foreign Languages | Ma C.,China Institute of Technology
Computers and Electrical Engineering | Year: 2011

In 2010, Vo et al. (2010) [7] proposed an enhancement of authenticated multiple key exchange protocol based on Lee et al.'s protocol. In this paper, we will show that Vo et al.'s multiple key exchange protocol cannot resist reflection attack. It means that their protocol fails to provide mutual authentication. Furthermore, we propose an improvement of Vo et al.'s protocol. Our proposed protocol with reflection attack resilience can really provide mutual authentication. © 2011 Elsevier Ltd. All rights reserved.


Qin Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Qin Y.,Luoyang University of Foreign Languages | Wang Q.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Zeng Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Xi Q.,State Key Laboratory of Mathematical Engineering and Advanced Computing
IET Conference Publications | Year: 2014

To improve the efficiency of analyzing malware behaviors and increase the validity of the test data, this paper proposes a parallel target-directed analysis method for malware behaviors, which combines static analysis with concolic testing techniques. It first uses static analysis techniques to identify and locate those interactive or input points and sensitive behavior functions. Then based on the distributed platform, by combining symbolic execution and concrete dynamic execution together and taking malware sensitive behaviors as the leading target, the parallel target-directed algorithm of searching sensitive paths and the method of leading and approaching sensitive behaviors are designed. It leads to traverse the sensitive functions, obtain the sensitive paths which can reach the sensitive behavior areas by path backtracking, and generate the corresponding test data. Finally, it finishes the analysis and test of malware behaviors. Experiments show that, compared with fuzz and full paths covering and traversing technique, this method can generate test data more efficiently, reduce the number of paths to be analyzed, and improve the analysis speed and efficiency of malware behaviors.


Cheng Q.,Luoyang University of Foreign Languages | Cheng Q.,Information Assurance
International Journal of Network Security | Year: 2015

Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will first prove that Isalam and Biswas's GKA protocol cannot provide perfect forward secrecy. Then we will point out that their GKA protocol is vulnerable to ephemeral key compromise attack.


Qin Y.,National Digital Switching System Engineering Technical Researching Center | Qin Y.,Luoyang University of Foreign Languages | Wang Q.,National Digital Switching System Engineering Technical Researching Center | Zeng Y.,National Digital Switching System Engineering Technical Researching Center | Xi Q.,National Digital Switching System Engineering Technical Researching Center
Applied Mechanics and Materials | Year: 2013

Currently, the malware behavior analysis technique spends a lot of time to generate test data. To improve it, this paper proposes a method of malware behavior analysis based on approach to sensitive behavior function. And the techniques of sensitive behavior function identification, sensitive path search and approaching sensitive behavior function are discussed in this paper. This method detects and analyzes the malware behavior by combining the concrete execution and symbolic execution together. It shows that this method can improve the efficiency of malware behavior detection by comparing it with fuzz and full path traversing technique. © (2013) Trans Tech Publications, Switzerland.

Discover hidden collaborations