• Title/Summary/Keyword: factoring

Search Result 115, Processing Time 0.024 seconds

A Secure Quantum-Resistant Authentication and Key Distribution Protocol for NFC Payment Environments (NFC 결제 환경에서 양자 컴퓨팅에 안전한 인증 및 키 분배 프로토콜)

  • Kim, JongHyun;Park, KiSung;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.485-492
    • /
    • 2018
  • Recently, the numerous authentication and key distribution protocol for NFC payment environment have been proposed using public key cryptosystems. However, these protocol are vulnerable to quantum computing attack because quantum computing can solve factoring and discrete logarithm problem effectively using Grover and Shor's algorithm. For these reason, the secure authentication and key distribution have become a very important security issue in order to prevent quantum computing attacks. Therefore, to ensure user's payment information and privacy, we propose a secure quantum resistant authentication and key distribution protocol for NFC payment environments.

An Analysis on the Productivity Depreciating Factor of Cast-In-Place Piles Work (현장(現場)타설 콘크리트 말뚝공사의 생산성(生產性) 저하요인 분석(分析))

  • Lee, Myung-Do;Lee, Hyun-Seok;Seo, Jang-Woo;Kang, Kyung-In
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2008.05a
    • /
    • pp.133-139
    • /
    • 2008
  • Productivity is an important factor of the construction's success and growth. However, compared to the other industries, the study of productivity in the construction industry is still insufficient. Even though the Cast-in-Place piles work is also important in construction process, the research on the productivity is not enough. So, it is necessary for the systematic research on the productivity of Cast-In-Place Piles Work. Therefore, the purpose of the study is to classify lower productivity's cause and find a way to improve these situations. This study will give the checklist for the further study of factoring and improvement of the Cast-in-Place piles work productivity.

  • PDF

A Comparative Analysis of Demotivation in Secondary English Classes

  • Kim, Kyung-Ja
    • English Language & Literature Teaching
    • /
    • v.15 no.4
    • /
    • pp.75-94
    • /
    • 2009
  • This study was designed to assess demotivation factors and compare the factor between two secondary school student groups. It furthermore examined how the factors related to students' L2 proficiency. A 31-item questionnaire was completed by 407 junior (JH) and senior high school (SH) students. Five factors were extracted through the principal axis factoring: Teachers' competence and teaching styles, Dissatisfaction with English classes and grading system, Difficulty of learning English, Lack of motivation and interest in learning English, and Inadequate learning contents. Although both JH and SH students did not perceive their English teacher as a strong attribution of demotivation, Difficulty of learning English and Dissatisfaction with English classes and grading system were the two strongest demotivating factors. When compared the overall mean scores of each factor between JH and SH groups, significant differences were found in all factors except Factor 4, with SH students reporting stronger demotivation. JH students attributed their demotivation to Difficulty of learning English, while SH students attributed that to Dissatisfaction with English classes and grading system. Both groups tended to attribute their demotivation to external forces. The study also showed that several demotivation factors related negatively to L2 proficiency.

  • PDF

Performance-Driven Multi-Levelizer for Multilevel Logic Synthesis (다단 논리합성을 위한 성능 구동형 회로 다단기)

  • 이재흥;정정화
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.11
    • /
    • pp.132-139
    • /
    • 1993
  • This paper presents a new performance-driven multi-levelizer which transforms a two-level description into a boolean network of the multilevel structure satisfied with user's costraints, such as chip area, the number of wires and literals, maximum delay, function level, fanin, fanout, etc.. The performance of circuits is estimated by reference to the informations in cell library through the cell mapping phase, and multi-levelization of circuits is constructed by the decomposition using the kernel and factoring concepts. Here, the saving cost of a common subexpression is defined to the sum of area and delay saved, when it is substituted. The experiments with MCNC benchmarks show the efficiency of the proposed method.

  • PDF

An Assignment Method for Loop with Loop-Carried Dependence (루프 캐리 종속성을 가진 루프의 할당 기법)

  • Kim, Hyeon-Cheol;Yu, Gi-Yeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.8
    • /
    • pp.379-389
    • /
    • 2001
  • 본 논문에서는 루프 반복들 간에 종속 관계가 존재하는 루프의 효율적 수행을 위한 새로운 루프 할당 기법을 제안한다. 그리고, 중앙 큐를 사용하여 공유 메모리 다중처리기에 루프 반복을 할당하는 기존 셀프 스케쥴링 기법들을 루프 캐리 종속성(loop-carried dependence)을 가진 루프의 할당에 적용하기 위해 제안한 기법을 이용한 그들의 변형에 대해 알아본다. 종속 거리를 고려하여 루프를 세 단계별로 할당하는 제안된 CDSS(Carried-Dependence Self-Scheduling) 기법 또한, 중앙 작업 큐를 기반으로 한 것이며 별도의 스케쥴러가 필요 없는 셀프 스케쥴링 알고리즘이다. 종속거리, 프로세서 수, 반복 수, 스케쥴링 연산 시간 등을 다양하게 하여 변형된 할당 기법들과 비교 분석한 결과, 제안한 기법은 양호한 부하 균형을 유지하였으며 변형된 다른 기법들에 비해 루프 수행 시간을 줄여 효율적임을 알 수 있었다. 다양한 실험 환경에서 평균적으로 제안한 CDSS, 변형된 SS, Factoring, GSS, CSS 기법 순으로 루프 수행 시간 측면에서 좋은 성능을 보였다.

  • PDF

Application of Block Design for an Efficient Conference Key Distribution System (효율적인 회의용 키분배 시스템을 위한 Block Design의 응용)

  • Lee, Tae-Hun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

OPTIMIZATION OF STOCK MANAGEMENT SYSTEM WITH DEFICIENCIES THROUGH FUZZY RATIONALE WITH SIGNED DISTANCE METHOD IN SEABORN PROGRAMING TOOL

  • K. KALAIARASI;N. SINDHUJA
    • Journal of applied mathematics & informatics
    • /
    • v.42 no.2
    • /
    • pp.379-390
    • /
    • 2024
  • This study proposes a fuzzy inventory model for managing large-scale production, incorporating cost considerations. The model accounts for two types of expenditure scenarios-parametric and exponential. Uncertainty surrounds holding costs, setup costs, and demand rates. The approach considers a supply chain system with a complex manufacturing process, factoring in transportation costs based on the quantity of goods and distance between the supplier and retailer. The initial crisp model is then transformed into a fuzzy simulation, incorporating specific fuzzy variables affecting inventory costs. The proposed method significantly reduces overall inventory costs for the entire supply chain. Retailer demand is linked to inventory levels, and vendor/distributor storage deteriorates over time. The fuzzy condition assumes hexagonal variables for all associated factors. The study employs the signed distance method for defuzzification to determine the optimal order quantity with hexagonal fuzzy numbers. Mathematical examples are provided to illustrate the practicality of the proposed approach.

Design and Implementation of the Central Queue Based Loop Scheduling Method (중앙 큐 기반의 루프 스케쥴링 기법의 설계 및 구현)

  • Kim, Hyun-Chul;Kim, Hyo-Cheol;Yoo, Kee-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.5
    • /
    • pp.16-26
    • /
    • 2001
  • In this paper, we present a new scheduling method called CDSS(Carried-Dependence Self-Scheduling) for efficiently execution of the loop with intra dependency between iterations based on the central queue. We also implemented it on shared memory system using Java language. Also, we study the modification that converts the existing self-scheduling method based on the central task queue for parallel loops onto the same form applied to loop with loop-carried dependences. The proposed method is self scheduling and assigns the loops in three-level considering the synchronization point according to the dependence distance of the loops. To adapt the proposed scheme and modified methods into various platforms, including a uni-processor system, we use threads for implementation. Compared to other assignment algorithms with various changes of application and system parameters, CDSS is found to be more efficient than other methods in overall execution time including scheduling overheads. CDSS shows improved performance over modified SS, Factoring, GSS and CSS by about 0.02, 40.5, 46.1 and 53.6%, respectively. In CDSS, we achieve the best performance on varying application programs using a few threads, which equal the dependence distance.

  • PDF

A Study of Field Application Process of Public Key Algorithm RSA Based on Mathematical Principles and Characteristics through a Diagnostic (수학원리와 특성 진단을 기반으로 한 공개키 RSA 알고리즘의 현장 적용 프로세스)

  • Noh, SiChoon;Song, EunJee;Moon, SongChul
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.71-81
    • /
    • 2015
  • The RSA public key encryption algorithm, a few, key generation, factoring, the Euler function, key setup, a joint expression law, the application process are serial indexes. The foundation of such algorithms are mathematical principles. The first concept from mathematics principle is applied from how to obtain a minority. It is to obtain a product of two very large prime numbers, but readily tracking station the original two prime number, the product are used in a very hard principles. If a very large prime numbers p and q to obtain, then the product is the two $n=p{\times}q$ easy station, a method for tracking the number of p and q from n synthesis and it is substantially impossible. The RSA encryption algorithm, the number of digits in order to implement the inverse calculation is difficult mathematical one-way function and uses the integer factorization problem of a large amount. Factoring the concept of the calculation of the mod is difficult to use in addition to the problem in the reverse direction. But the interests of the encryption algorithm implementation usually are focused on introducing the film the first time you use encryption algorithm but we have to know how to go through some process applied to the field work This study presents a field force applied encryption process scheme based on public key algorithms attribute diagnosis.

Estimation of Sodium Hydroxide Waste Origin-Destination Matrices for Preventing Hazardous Material Transportation Disasters

  • Kim, Geun-Young;Jung, Tae-Hwa;Kim, Sang-Won
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.1
    • /
    • pp.73-79
    • /
    • 2009
  • Hazardous materials (HazMats) are substances that are flammable, explosive, toxic, or harmful, if released into the environment. Since the transportation of HazMats increases in many developed countries, HazMat transportation has the key function in the process of HazMat usage to trace information of production, storage, shipment, usage, and waste disposal. The Korean Ministry of Environment (KMOE) and the National Emergency Management Agency (NEMA) have developed many laws, regulations, and standards for hazardous materials. However, the Korean HazMat laws, regulations, and standards do not guarantee accurate information of HazMat origin-destination (O-D) shipments, though the HazMat O-D movement is the critical information in safety and security of HazMat transportation. The objectives of this research are: (1) to investigate emerging and recurrent issues in Korean HazMat transportation, and (2) to develop the estimation method of O-D matrices for hazardous materials under limited data sets. The sodium hydroxide waste shipment among forty candidate HazMats is selected as the sample research case. The growth-factor method is applied to estimate the 2005 O-D matrix of sodium-hydroxide waste shipment. The column-and-row factoring process is used to calibrate the estimated sodium-hydroxide O-D matrix. The result shows the applicability of the O-D estimation process for hazardous materials. The Sodium Hydroxide Waste Origin-Destination Matrix is obtained to trace routes and paths of the Sodium Hydroxide transportation.