• Title/Summary/Keyword: Cheon's algorithm

Search Result 86, Processing Time 0.023 seconds

Pairing-Friendly Curves with Minimal Security Loss by Cheon's Algorithm

  • Park, Cheol-Min;Lee, Hyang-Sook
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.656-659
    • /
    • 2011
  • In ICISC 2007, Comuta and others showed that among the methods for constructing pairing-friendly curves, those using cyclotomic polynomials, that is, the Brezing-Weng method and the Freeman-Scott-Teske method, are affected by Cheon's algorithm. This paper proposes a method for searching parameters of pairing-friendly elliptic curves that induces minimal security loss by Cheon's algorithm. We also provide a sample set of parameters of BN-curves, FST-curves, and KSS-curves for pairing-based cryptography.

A Study on State Synthesis Algorithm for ICSC(InCheon Silicon Compiler) (ICSC(InCheon Silicon Compiler)를 위한 상태 합성알고리즘에 대한 연구)

  • Cho, Joong-Hwee
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.521-524
    • /
    • 1988
  • This paper describes BSDL(Behavioral/Structural Description Language), CDTF(Control Data Text File) and state synthesizer built for use in ICSC(InCheon Silicon Compiler). BSDL describes structral and behaviral specifications of an ASIC(Application Specific IC) for digital system design. ICSC's paser generates CDTF consists of if-then-else, arithmetic and data transfer statement according to each BSDL statement. State synthesizer generates CCG(Control Constraint Graph) in consideration of execution of statement and generates VCG (Variable Constraint Graph) in consideration use of variable generation and use of variable. Also, it involves allocating algorithm operation nodes in the data path and the control path to machine states with minimum state number and as small area as possible.

  • PDF

Query Space Exploration Using Genetic Algorithm

  • Lee, Jae-Hoon;Kim, Young-Cheon;Lee, Sung-Joo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.683-689
    • /
    • 2003
  • Information retrieval must be able to search the most suitable document that user need from document set. If foretell document adaptedness by similarity degree about QL(Query Language) of document, documents that search person does not require are searched. In this paper, showed that can search the most suitable document on user's request searching document of the whole space using genetic algorithm and used knowledge-base operator to solve various model's problem.

  • PDF

Contingency Ranking Algorithm Using Voltage Stability (전압안정성를 고려한 전력계통의 상정사고 선택 앨고리즘)

  • Park, Kyu-Hong;Cho, Yang-Haeng;Jung, Leen-Hark
    • Proceedings of the KIEE Conference
    • /
    • 2002.07a
    • /
    • pp.105-107
    • /
    • 2002
  • This paper presents a algorithm for contingency ranking using the real power ratio. The fundamemtal cause of voltage collapse is considered due to excessive power trnsfer through the line. To obtain contingency ranking, maximum real power tansferred to the load is obtained when load impedance $Z_r$ equal to line impedance $Z_s$. This algorithm is verified by simulation on a 6-bus test system.

  • PDF

Contingency Ranking Algorithm Using Voltage Stability (전압안정성를 고려한 전력계통의 상정사고 선택 엘고리즘)

  • Park, Kyu-Hong;Cho, Yang-Haeng;Jung, Ieen-Hark
    • Proceedings of the KIEE Conference
    • /
    • 2002.06a
    • /
    • pp.146-148
    • /
    • 2002
  • This paper presents a algorithm for contingency ranking using the real power ratio, The fundamemtal cause of voltage collapse is considered due to excessive power trnsfer through the line To obtain contingency ranking, maximum real power tansferred to the load is obtained when load $impedance^{Z_r}$ equal to line $impedance^{Z_s}$, This algorithm is verified by simulation on a 6-bus test system.

  • PDF

Design and Evaluation of DDoS Attack Detection Algorithm in Voice Network (음성망 환경에서 DDoS 공격 탐지 알고리즘 설계 및 평가)

  • Yun, Sung-Yeol;Kim, Hwan-Kuk;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2555-2562
    • /
    • 2009
  • The algorithm that is proposed in this paper defined a probability function to count connection process and connection-end process to apply TRW algorithm to voice network. Set threshold to evaluate the algorithm that is proposed, Based on the type of connection attack traffic changing the probability to measure the effectiveness of the algorithm, and Attack packets based on the speed of attack detection time was measured. At the result of evaluation, proposed algorithm shows that DDoS attack starts at 10 packets per a second and it detects the attack after 1.2 seconds from the start. Moreover, it shows that the algorithm detects the attack in 0.5 second if the packets were 20 per a second.

Development of S/W Component for Search Algorithm Education (탐색 알고리즘 교육을 위한 S/W 컴포넌트의 개발)

  • Jeong, In-Kee
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.2
    • /
    • pp.179-186
    • /
    • 2002
  • Data structure and algorithm are primary courses for computer programming education. However, now those are not interesting courses for students because the programming methodologies that used these courses are not the proper methodologies for the visual and windows programming. Therefore, we developed the SCSA (Software Component for Search Algorithm) which is a software component for effective search algorithm education, and is based on visual programming in this thesis.

  • PDF

Scalar Multiplication on Elliptic Curves by Frobenius Expansions

  • Cheon, Jung-Hee;Park, Sang-Joon;Park, Choon-Sik;Hahn, Sang-Geun
    • ETRI Journal
    • /
    • v.21 no.1
    • /
    • pp.28-39
    • /
    • 1999
  • Koblitz has suggested to use "anomalous" elliptic curves defined over ${\mathbb{F}}_2$, which are non-supersingular and allow or efficient multiplication of a point by and integer, For these curves, Meier and Staffelbach gave a method to find a polynomial of the Frobenius map corresponding to a given multiplier. Muller generalized their method to arbitrary non-supersingular elliptic curves defined over a small field of characteristic 2. in this paper, we propose an algorithm to speed up scalar multiplication on an elliptic curve defined over a small field. The proposed algorithm uses the same field. The proposed algorithm uses the same technique as Muller's to get an expansion by the Frobenius map, but its expansion length is half of Muller's due to the reduction step (Algorithm 1). Also, it uses a more efficient algorithm (Algorithm 3) to perform multiplication using the Frobenius expansion. Consequently, the proposed algorithm is two times faster than Muller's. Moreover, it can be applied to an elliptic curve defined over a finite field with odd characteristic and does not require any precomputation or additional memory.

  • PDF

The Shape Optimal Design of Marine Medium Speed Diesel Engine Piston (박용(舶用) 중속(中速) 디젤엔진 피스톤의 형상최적설계(形狀最適設計))

  • Lee, Jun-Oh;Seong, Hwal-Gyeng;Cheon, Ho-Jeong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.9
    • /
    • pp.59-70
    • /
    • 2008
  • Polynomial is used to optimize crown bowl shape of a marine medium speed diesel engine piston. The primary goal of this paper is that it's for an original design through a thermal stress and highest temperature minimum. Piston is modeled using solid element with 6 design variables defined the positional coordinate value. Global optimum of design variables are found and evaluated as developed and integrated with the optimum algorithm combining genetic algorithm(GA) and tabu search(TS). Iteration for optimization is performed based on the result of finite element analysis. After optimization, thermal stress and highest temperature reduced 0.68% and 1.42% more than initial geometry.

An Improvement of AdaBoost using Boundary Classifier

  • Lee, Wonju;Cheon, Minkyu;Hyun, Chang-Ho;Park, Mignon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.2
    • /
    • pp.166-171
    • /
    • 2013
  • The method proposed in this paper can improve the performance of the Boosting algorithm in machine learning. The proposed Boundary AdaBoost algorithm can make up for the weak points of Normal binary classifier using threshold boundary concepts. The new proposed boundary can be located near the threshold of the binary classifier. The proposed algorithm improves classification in areas where Normal binary classifier is weak. Thus, the optimal boundary final classifier can decrease error rates classified with more reasonable features. Finally, this paper derives the new algorithm's optimal solution, and it demonstrates how classifier accuracy can be improved using the proposed Boundary AdaBoost in a simulation experiment of pedestrian detection using 10-fold cross validation.