I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
,
p
p
.
29
6
2
~
2
9
7
0
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
6i
6
.
1
1
2
6
4
2962
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
A
H
y
bri
d Cryp
tog
ra
phic Sys
te
m
for Secur
ed D
ev
ice
to Devi
ce
Co
m
m
uni
ca
tion
A.
Ra
m
a
K
rish
na
1
,
A.
S.
N.
Cha
k
ra
v
a
rt
hy
2
,
A.
S.
C.
S.
S
a
s
t
ry
3
1
,3
De
p
t.
o
f
ECE
,
K L
Un
iv
e
rsity
,
G
u
n
tu
r
A
.
P
.
,
In
d
ia
2
De
p
t.
o
f
CS
E,
J
N
T
U.
K
-
UCEV
,
A
.
P
.
,
I
n
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ma
y
1
5
,
2
0
1
6
R
ev
i
s
ed
Oct
1
5
,
2
0
1
6
A
cc
ep
ted
Oct
29
,
2
0
1
6
It
is
g
e
n
e
ra
l
f
a
c
t
th
a
t
e
v
e
n
a
f
ter
e
n
o
r
m
o
u
s
e
x
p
a
n
sio
n
o
f
w
ir
e
les
s
c
o
m
m
u
n
ica
ti
o
n
th
e
re
a
re
stil
l
d
e
a
d
re
g
io
n
s
th
a
t
h
a
m
p
e
rs
th
e
e
ff
e
c
ti
v
e
c
o
m
m
u
n
ica
ti
o
n
.
W
it
h
e
x
p
o
n
e
n
ti
a
l
rise
in
th
e
sm
a
rt
p
h
o
n
e
s,
a
n
e
w
la
y
e
r
o
f
c
o
m
m
u
n
ica
ti
o
n
h
a
s
e
v
o
lv
e
d
th
a
t
c
o
u
ld
a
d
d
re
ss
th
e
c
o
n
c
e
rn
s
o
f
d
e
a
d
re
g
io
n
s
a
n
d
c
a
p
a
c
it
y
b
a
rriers
.
D2
D
is
th
e
e
v
o
lv
in
g
c
o
m
m
u
n
ica
ti
o
n
tec
h
n
o
l
o
g
y
w
h
ich
f
o
c
u
se
s
o
n
sh
o
rt
d
istan
c
e
h
o
p
s
b
e
tw
e
e
n
th
e
p
u
b
l
ic
d
e
v
ice
s
to
re
a
c
h
th
e
d
e
stin
a
ti
o
n
.
T
h
e
m
a
jo
r
d
ra
w
b
a
c
k
o
f
th
is
tec
h
n
o
lo
g
y
is
th
a
t
m
o
st
o
f
th
e
d
e
v
ice
s
a
re
p
u
b
li
c
h
e
n
c
e
tru
stw
o
rth
i
n
e
ss
o
f
th
e
e
n
ti
re
c
h
a
n
n
e
l
n
e
e
d
s
to
b
e
a
d
d
re
ss
e
d
in
o
rd
e
r
t
o
m
a
k
e
it
a
v
i
a
b
le
so
lu
ti
o
n
.
I
n
th
is
p
a
p
e
r,
w
e
in
tro
d
u
c
e
a
n
o
v
e
l
h
y
b
rid
c
ry
p
to
g
ra
p
h
ic
a
p
p
ro
a
c
h
t
h
a
t
c
o
u
ld
a
d
d
re
ss
m
u
lt
ip
le
e
a
v
e
sd
ro
p
p
e
rs’
sc
e
n
a
rio
.
T
h
is
a
p
p
ro
a
c
h
i
n
c
o
r
p
o
ra
tes
b
o
th
Hu
f
fm
a
n
c
o
d
i
n
g
a
n
d
Bi
n
a
ry
c
o
d
in
g
to
e
n
h
a
n
c
e
th
e
c
ry
p
to
b
e
n
e
f
it
s
f
o
r
th
e
i
n
f
o
rm
a
ti
o
n
tran
sm
it
ted
o
v
e
r
D2
D
c
h
a
n
n
e
l
t
h
a
t
c
o
n
sists
o
f
se
v
e
ra
l
p
u
b
li
c
d
e
v
ice
s.
T
h
e
d
u
a
l
-
c
ry
p
to
n
a
tu
re
o
f
th
e
p
ro
p
o
se
d
a
lg
o
rit
h
m
o
ff
e
rs
h
ig
h
e
r
e
ff
icie
n
c
y
,
b
e
tt
e
r
se
c
u
rit
y
a
n
d
im
p
ro
v
e
d
k
e
y
tr
a
n
sm
is
sio
n
.
T
h
u
s,
th
e
p
r
o
p
o
se
d
h
y
b
rid
c
r
y
p
to
g
ra
p
h
ic
a
p
p
r
o
a
c
h
is
r
o
b
u
st
in
n
a
t
u
re
w
h
il
e
e
a
s
y
a
n
d
sim
p
le
t
o
o
p
e
ra
te.
In
a
d
d
it
i
o
n
,
t
h
e
p
r
o
p
o
se
d
a
p
p
ro
a
c
h
c
o
u
l
d
re
c
o
v
e
r
th
e
o
rig
i
n
a
l
i
n
f
o
rm
a
ti
o
n
w
it
h
o
u
t
a
n
y
d
isto
rti
o
n
f
ro
m
th
e
e
n
c
ry
p
ted
d
a
ta
m
a
k
in
g
th
e
a
p
p
ro
a
c
h
lo
ss
les
s
in
n
a
tu
re
.
F
u
rt
h
e
r
sim
u
latio
n
re
su
lt
s
p
ro
v
e
th
a
t
th
e
p
ro
p
o
se
d
o
f
f
e
rs
c
o
n
f
id
e
n
ti
a
li
ty
to
th
e
tran
sm
it
te
d
to
d
a
ta
w
h
il
e
a
d
d
re
ss
in
g
th
e
n
e
tw
o
r
k
c
a
p
a
c
it
y
c
ru
n
c
h
.
K
ey
w
o
r
d
:
B
in
ar
y
co
d
in
g
C
r
y
p
to
g
r
ap
h
y
D2
D
co
m
m
u
n
icatio
n
Hu
f
f
m
a
n
co
d
in
g
W
ir
eless
co
m
m
u
n
icatio
n
Co
p
y
rig
h
t
©
2
0
1
6
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
All
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
A
.
R
a
m
a
Kr
i
s
h
n
a
,
Dep
ar
t
m
en
t o
f
E
lectr
o
n
ics a
n
d
C
o
m
m
u
n
icat
io
n
E
n
g
i
n
ee
r
in
g
,
K
L
U
n
iv
er
s
it
y
,
Vad
d
es
w
ar
a
m
,
Gu
n
t
u
r
,
A
.
P
,
5
2
2
5
0
2
,
I
n
d
ia.
E
m
ail:
r
a
m
ak
r
i
s
h
n
a.
a@
k
l
u
n
iv
er
s
it
y
.
i
n
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
i
s
d
ig
ital
er
a,
w
ir
eless
h
a
s
b
ec
o
m
e
t
h
e
m
aj
o
r
b
ac
k
d
r
o
p
f
o
r
ch
ea
p
an
d
h
ig
h
s
p
ee
d
d
ata
tr
an
s
f
er
an
d
s
ev
er
al
ad
v
a
n
ce
tech
n
o
lo
g
ies
ar
e
co
n
s
ta
n
tl
y
ev
o
l
v
i
n
g
th
at
ar
e
en
s
u
r
e
w
ir
eless
ap
p
r
o
ac
h
w
o
u
ld
b
e
th
e
p
r
im
ar
y
co
m
m
u
n
icat
io
n
ch
a
n
n
el.
I
t
is
ev
id
en
t
t
h
at
to
e
n
s
u
r
e
an
ef
f
ec
ti
v
e
co
m
m
u
n
icati
o
n
ch
an
n
el
th
a
t
is
ca
p
ab
le
o
f
tr
an
s
f
er
r
i
n
g
s
i
g
n
i
f
i
ca
n
ta
m
o
u
n
t
o
f
d
ata
b
et
w
ee
n
t
w
o
au
th
o
r
ized
p
er
s
o
n
n
el
r
eq
u
ir
es
a
w
id
e
s
p
r
ea
d
in
f
r
astru
ct
u
r
e
[
1
]
.
W
ith
t
h
e
ad
v
an
ce
m
e
n
ts
i
n
t
h
e
tech
n
o
lo
g
y
t
h
e
co
r
r
esp
o
n
d
in
g
r
eq
u
ir
e
m
e
n
t
o
f
t
h
e
co
m
m
u
n
icatio
n
c
h
an
n
el
v
ar
ies
s
ig
n
i
f
ica
n
tl
y
.
Fo
r
ex
a
m
p
le,
s
m
aller
p
ac
k
ets
d
r
o
p
w
it
h
m
o
r
e
co
v
er
a
g
e
f
o
r
tr
an
s
m
is
s
io
n
,
h
ig
h
d
ata
r
ates,
s
ec
u
r
ed
an
d
r
o
b
u
s
t
co
m
m
u
n
ic
atio
n
to
n
a
m
e
f
e
w
[
2
]
.
T
h
e
m
a
j
o
r
d
r
aw
b
ac
k
o
f
t
h
e
ex
is
t
in
g
co
m
m
u
n
icat
io
n
ch
a
n
n
el
s
ar
e
co
m
p
le
x
n
et
w
o
r
k
ar
ch
itectu
r
e
an
d
h
i
g
h
p
o
w
er
r
eq
u
ir
em
e
n
t
f
o
r
p
r
o
ce
s
s
in
g
a
n
d
tr
an
s
m
i
s
s
io
n
o
f
th
e
d
ata
p
ac
k
et
s
.
T
h
u
s
to
ef
f
ec
ti
v
e
ad
d
r
ess
t
h
e
ab
o
v
e
co
n
ce
r
n
s
o
f
t
h
e
ex
is
ti
n
g
w
ir
eles
s
n
et
w
o
r
k
s
,
a
n
o
v
e
l
o
p
en
-
p
u
b
lic
ch
an
n
el
i
s
r
eq
u
ir
e
t
h
at
o
f
f
er
s
s
ig
n
if
ican
t
l
y
h
i
g
h
n
u
m
b
er
o
f
p
o
s
s
ib
le
p
ath
s
a
n
d
en
er
g
y
at
ea
ch
n
o
d
e
b
u
t r
eq
u
ir
e
s
lo
w
e
n
er
g
y
f
o
r
tr
a
n
s
m
i
s
s
io
n
.
Si
n
ce
,
d
ev
ice
-
to
-
d
ev
ice
(
D2
D)
co
m
m
u
n
icatio
n
i
s
i
n
d
ep
en
d
en
t
o
f
e
x
i
s
ti
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2088
-
8708
A
Hyb
r
id
C
r
yp
to
g
r
a
p
h
ic
S
ystem
fo
r
S
ec
u
r
ed
Dev
ice
to
Dev
ic
e
C
o
mmu
n
ica
tio
n
(
A
.
R
a
ma
K
r
is
h
n
a
)
2963
w
ir
ele
s
s
n
et
w
o
r
k
ar
ch
itect
u
r
e
b
u
t
ca
n
o
p
er
ate
in
tan
d
e
m
w
i
t
h
th
e
s
y
s
te
m
h
as
r
ec
en
tl
y
e
m
er
g
ed
as
a
p
r
o
m
i
s
i
n
g
tech
n
iq
u
e
th
a
t
ca
n
s
i
g
n
if
ican
t
l
y
b
o
o
s
t
th
e
p
er
f
o
r
m
an
ce
o
f
e
x
is
t
in
g
w
ir
eles
s
n
et
w
o
r
k
s
[
1
]
.
T
h
e
p
r
im
e
id
ea
o
f
in
co
r
p
o
r
atin
g
D2
D
co
m
m
u
n
ic
atio
n
alo
n
g
w
it
h
th
e
e
x
is
ti
n
g
in
f
r
astru
ct
u
r
e
w
as
to
e
m
p
lo
y
th
e
p
u
b
lic
ch
a
n
n
e
l
r
ath
er
th
a
n
t
h
e
lice
n
s
ed
b
a
n
d
.
I
n
ad
d
itio
n
,
t
h
e
o
p
er
ato
r
s
ex
p
ec
t
th
at
D2
D
co
m
m
u
n
icatio
n
w
o
u
ld
o
f
f
er
h
i
g
h
d
ata
r
ates
as
its
o
p
er
atio
n
d
is
tan
ce
is
s
m
all
b
ased
o
n
av
a
il
ab
len
eig
h
b
o
r
h
o
o
d
-
u
s
er
eq
u
ip
m
en
ts
w
h
ile
e
x
is
t
in
g
co
m
m
u
n
icatio
n
is
i
n
f
r
astru
ct
u
r
e
-
b
ased
w
h
ic
h
h
as
h
ig
h
o
p
er
atio
n
al
d
is
ta
n
ce
[
2
]
.
T
h
er
ef
o
r
e,
s
ig
n
i
f
ica
n
t
a
m
o
u
n
t
o
f
r
esear
ch
is
f
o
cu
s
ed
o
n
i
m
p
r
o
v
in
g
v
ar
io
u
s
f
ac
to
r
s
a
s
s
o
cia
ted
w
it
h
D2
D
co
m
m
u
n
icat
io
n
to
en
s
u
r
e
a
h
o
li
s
tic
d
ev
elo
p
m
en
t
o
f
t
h
i
s
tech
n
o
lo
g
y
.
T
h
is
co
m
m
u
n
icat
io
n
c
h
an
n
el
i
s
o
f
f
er
s
s
i
m
p
le
ar
c
h
itect
u
r
e,
h
i
g
h
d
ata
r
ates,
an
d
p
r
ec
is
e
tr
an
s
m
i
s
s
io
n
w
ith
au
th
o
r
ized
clien
ts
.
U
n
f
o
r
t
u
n
a
tel
y
,
as
th
e
m
ea
n
s
o
f
co
m
m
u
n
icatio
n
i
s
f
o
cu
s
ed
o
n
th
e
m
a
x
i
m
izatio
n
o
f
p
u
b
li
c
n
o
d
es
r
ath
er
t
h
an
p
r
i
v
ate
n
o
d
es
an
d
also
t
h
e
n
u
m
b
er
o
f
n
o
d
es
w
o
u
ld
al
s
o
b
e
in
cr
ea
s
ed
d
r
asti
ca
ll
y
,
t
h
e
s
ec
u
r
it
y
o
f
i
n
f
o
r
m
atio
n
b
ein
g
tr
a
n
s
m
itted
p
la
y
s
a
v
ital
r
o
le
i
n
th
e
f
ea
s
ib
il
it
y
o
f
D2
D
co
m
m
u
n
icatio
n
s
y
s
te
m
.
E
v
e
n
th
o
u
g
h
it
ad
d
r
ess
es
th
e
f
ac
to
r
s
o
f
en
er
g
y
r
eq
u
ir
em
en
t,
in
f
r
astr
u
ctu
r
e
s
ec
u
r
it
y
/
s
a
f
et
y
,
p
ac
k
et
d
r
o
p
s
an
d
d
ata
r
ates
in
an
ef
f
ec
ti
v
e
m
an
n
er
in
co
m
p
ar
i
s
o
n
w
it
h
e
x
is
t
in
g
s
y
s
te
m
s
[
3
]
.
Fu
r
t
h
er
m
o
r
e,
w
it
h
ev
er
i
n
cr
ea
s
in
g
r
is
e
i
n
t
h
e
s
m
ar
t
d
ev
ice
u
s
er
s
(
p
h
o
n
e
s
,
p
ad
s
,
an
d
etc)
th
er
e
is
a
s
ig
n
i
f
ica
n
tl
y
r
i
s
e
in
th
e
p
o
s
s
i
b
ilit
y
o
f
lo
ca
tin
g
an
o
p
ti
m
a
l
en
er
g
y
p
ath
w
i
th
h
ig
h
d
ata
r
ate
an
d
im
p
r
o
v
ed
co
v
er
ag
e
ca
n
b
e
f
o
u
n
d
to
en
g
a
g
e
in
co
m
m
u
n
icatio
n
.
Th
er
ef
o
r
e
it
h
as
b
ec
o
m
e
a
v
ita
l
task
to
p
r
o
v
id
e
ef
f
ec
ti
v
e
d
ata
s
ec
u
r
it
y
a
n
d
in
te
g
r
it
y
ap
p
r
o
ac
h
s
o
as
to
en
s
u
r
e
th
e
f
ea
s
ib
ilit
y
o
f
D2
D
co
m
m
u
n
icatio
n
ch
a
n
n
el.
I
n
th
i
s
p
ap
er
,
w
e
f
o
cu
s
o
n
i
m
p
r
o
v
ed
s
p
ec
tr
al
u
tili
za
t
io
n
o
f
th
e
d
ata
b
ein
g
tr
an
s
m
itted
in
a
s
ec
u
r
ed
m
an
n
e
r
o
v
er
p
u
b
lic
D2
D
c
o
m
m
u
n
ic
atio
n
ch
a
n
n
el
s
.
T
h
e
m
aj
o
r
f
o
cu
s
o
f
th
is
r
esear
ch
w
a
s
to
d
esig
n
an
d
d
ev
elo
p
an
in
n
o
v
at
iv
e
n
o
v
el
f
r
a
m
e
w
o
r
k
th
at
ex
p
lo
its
v
ar
io
u
s
f
ac
to
r
s
to
p
r
o
v
id
e
r
eliab
le
an
d
r
o
b
u
s
t
D2
D
co
m
m
u
n
icatio
n
b
ased
o
n
t
h
e
e
x
is
t
in
g
n
et
wo
r
k
co
n
s
tr
ai
n
ts
a
n
d
i
m
p
r
o
v
e
p
ac
k
et
s
tr
an
s
f
er
r
ate
w
h
ile
m
i
n
i
m
izi
n
g
t
h
e
lo
ad
ex
i
s
tin
g
co
m
m
u
n
icatio
n
in
f
r
astr
u
ctu
r
e.
E
v
e
n
th
o
u
g
h
s
ev
er
al
ap
p
r
o
ac
h
es
f
o
r
o
p
ti
m
ized
D2
D
co
m
m
u
n
ica
tio
n
h
a
v
e
b
ee
n
p
r
o
p
o
s
ed
b
u
t
s
til
l
it
h
as
e
v
o
l
v
ed
in
to
a
r
esear
ch
to
p
ic
w
i
th
it
s
s
co
p
e
ex
p
an
d
in
g
i
n
to
v
ar
io
u
s
f
ield
s
.
Un
f
o
r
tu
n
atel
y
,
w
i
th
s
ig
n
i
f
ica
n
t
r
is
e
in
t
h
e
r
esear
ch
m
u
c
h
o
f
t
h
e
f
o
cu
s
w
a
s
co
n
tr
ib
u
ted
to
w
ar
d
s
s
ec
u
r
i
n
g
th
e
p
h
y
s
ical
la
y
er
r
ath
e
r
th
an
t
h
e
D2
D
co
m
m
u
n
icatio
n
s
c
h
an
n
el
la
y
er
.
W
ith
th
e
g
r
o
w
i
n
g
m
ar
k
et
o
f
s
m
ar
t
d
ev
ices
w
it
h
s
ec
u
r
e
p
h
y
s
ical
la
y
er
ar
e
d
if
f
ic
u
lt
to
d
esi
g
n
an
d
m
ar
k
e
t
d
u
e
to
s
h
ea
r
h
ig
h
p
r
ice
a
n
d
co
m
p
lex
o
p
er
atio
n
w
h
ile
u
s
i
n
g
d
ev
ices
[
1
]
.
T
h
is
led
to
d
esig
n
a
f
r
a
m
e
w
o
r
k
t
h
at
co
u
ld
s
ec
u
r
e
th
e
c
h
a
n
n
el
(
i.e
.
m
ea
n
s
o
f
co
m
m
u
n
icat
io
n
)
r
ath
e
r
th
an
t
h
e
d
ev
ice;
it
h
as b
ee
n
e
v
o
lv
i
n
g
in
to
an
ac
ti
v
e
r
esear
ch
ar
ea
.
1
.
1
.
Cry
pto
g
ra
ph
y
C
r
y
p
to
g
r
ap
h
y
(
as
n
a
m
e
i
n
d
ica
tes
s
ec
r
et
w
r
i
tin
g
)
i
s
a
n
ar
t
o
f
tr
an
s
f
o
r
m
i
n
g
t
h
e
i
n
f
o
r
m
atio
n
i
n
to
n
o
i
s
e
lik
e
o
r
u
n
r
ea
d
ab
le
d
ata
to
an
y
u
n
au
th
o
r
ized
in
d
i
v
id
u
al
o
r
ea
v
esd
r
o
p
p
er
.
Dig
ital
cr
y
p
to
g
r
ap
h
y
o
f
f
er
s
p
r
o
tectio
n
to
in
f
o
r
m
atio
n
a
n
d
au
th
e
n
ticate
s
th
e
p
er
s
o
n
n
el
ac
ce
s
s
i
n
g
t
h
e
in
f
o
r
m
at
io
n
.
I
t
h
as
b
ec
o
m
e
a
h
i
g
h
f
o
cu
s
ed
r
esear
ch
ar
ea
w
it
h
i
n
t
h
e
ar
ea
o
f
in
f
o
r
m
atio
n
s
ec
u
r
it
y
a
n
d
ass
u
r
an
ce
f
ield
[
4
]
.
T
h
e
d
ig
ital
cr
y
p
to
g
r
ap
h
y
h
as
r
ec
ei
v
ed
s
i
g
n
i
f
ica
n
t
atte
n
t
io
n
in
t
h
e
c
u
r
r
en
t
d
i
g
ital
er
a,
d
u
e
to
r
ap
id
d
ev
elo
p
m
e
n
ts
a
n
d
escalatio
n
i
n
th
e
a
m
o
u
n
t
o
f
i
n
f
o
r
m
atio
n
tr
an
s
f
er
r
ed
o
n
th
e
p
u
b
lic
ch
a
n
n
e
ls
s
u
c
h
as
D2
D
co
m
m
u
n
icatio
n
.
W
e
f
o
cu
s
o
n
th
e
cr
y
p
to
s
y
s
te
m
s
t
h
at
co
u
ld
o
f
f
e
r
a
m
ea
n
s
o
f
s
ec
u
r
ed
co
m
m
u
n
icatio
n
o
v
er
u
n
en
cr
y
p
ted
ch
a
n
n
els
a
n
d
/o
r
p
r
o
tect
th
e
i
n
te
g
r
it
y
o
f
tr
a
n
s
m
itted
in
f
o
r
m
atio
n
.
I
t
i
s
e
v
id
e
n
t
t
h
at
a
n
y
cr
y
p
to
s
y
s
te
m
w
o
r
k
s
o
n
a
s
p
r
esen
ted
i
n
t
h
e
F
ig
u
r
e
1
,
o
n
e
o
f
th
e
b
asic id
ea
s
as d
escr
ib
ed
b
elo
w
[
5
]
.
Fig
u
r
e
1
.
Gen
er
al
M
o
d
el
o
f
C
r
y
p
to
g
r
ap
h
ic
S
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
:
29
6
2
–
2
9
7
0
2964
Data
Ma
n
ip
u
latio
n
:
T
h
is
f
r
a
m
e
w
o
r
k
alter
s
t
h
e
o
r
ig
i
n
al
i
n
f
o
r
m
atio
n
b
ased
o
n
a
tr
an
s
f
o
r
m
/
co
d
e
o
r
lo
o
k
-
u
p
tab
lein
to
co
r
r
esp
o
n
d
in
g
cr
y
p
to
in
f
o
r
m
at
io
n
.
T
h
ese
tech
n
iq
u
es
ar
e
m
o
s
t
co
m
m
o
n
l
y
u
s
ed
ap
p
r
o
ac
h
es
as
th
e
ir
r
ev
er
s
e
-
tr
an
s
f
o
r
m
atio
n
w
o
u
ld
s
i
m
p
le.
T
h
e
in
f
o
r
m
atio
n
co
u
ld
b
e
r
ec
o
v
er
ed
w
i
th
m
i
n
i
m
al
o
r
n
o
d
is
to
r
tio
n
in
co
m
p
ar
is
o
n
w
it
h
o
r
ig
in
al
i
n
f
o
r
m
atio
n
.
Data
L
o
ca
tio
n
p
er
m
u
tatio
n
:
T
h
is
f
r
a
m
e
w
o
r
k
p
r
o
p
o
s
es
th
at
t
h
e
o
r
ig
i
n
al
i
n
f
o
r
m
atio
n
co
u
ld
b
e
p
r
o
tecte
d
b
y
m
ea
n
s
o
f
c
h
a
n
g
i
n
g
t
h
e
lo
ca
tio
n
o
f
i
n
f
o
r
m
atio
n
b
its
b
ased
o
n
a
tr
an
s
f
o
r
m
/
co
d
e
o
r
lo
o
k
-
u
p
tab
le
in
to
co
r
r
esp
o
n
d
in
g
cr
y
p
to
in
f
o
r
m
at
io
n
.
T
h
e
in
f
o
r
m
atio
n
co
u
ld
b
e
r
ec
o
v
er
ed
w
it
h
n
o
d
is
t
o
r
tio
n
in
co
m
p
ar
is
o
n
w
it
h
o
r
ig
i
n
al
i
n
f
o
r
m
atio
n
.
T
h
e
o
r
ig
i
n
al
i
n
f
o
r
m
atio
n
co
u
l
d
b
e
r
ec
o
v
er
ed
f
r
o
m
e
n
cr
y
p
t
ed
d
ata
b
y
i
n
v
er
s
e
p
er
m
u
tatio
n
.
I
t
is
a
w
ell
k
n
o
w
n
f
ac
t
th
a
t
ea
ch
o
f
th
e
ab
o
v
e
ap
p
r
o
ac
h
es
h
a
s
s
e
v
er
al
ad
v
a
n
tag
e
s
a
n
d
co
r
r
esp
o
n
d
in
g
li
m
ita
tio
n
s
.
C
u
r
r
en
tl
y
s
i
g
n
i
f
ic
an
t
f
o
cu
s
i
s
i
n
co
r
p
o
r
atin
g
i
n
co
m
b
in
i
n
g
b
o
th
th
e
ap
p
r
o
ac
h
es
to
g
e
n
er
ate
a
h
y
b
r
id
m
o
d
el
as d
is
c
u
s
s
ed
in
t
h
is
p
ap
er
.
I
n
b
r
ief
,
t
h
e
p
r
o
p
o
s
ed
alg
o
r
it
h
m
u
s
es
a
co
m
b
i
n
a
tio
n
o
f
H
u
f
f
m
a
n
co
d
in
g
a
n
d
B
in
ar
y
al
g
o
r
ith
m
to
s
ec
u
r
el
y
tr
an
s
m
it
t
h
e
i
n
f
o
r
m
at
io
n
p
ac
k
ets
v
ia
D2
D
co
m
m
u
n
icatio
n
b
et
w
ee
n
t
w
o
o
r
m
o
r
e
p
u
b
lic
d
ev
ices.
T
h
e
Hu
f
f
m
a
n
al
g
o
r
ith
m
o
f
f
er
s
h
i
g
h
er
e
f
f
icien
c
y
i
n
b
lo
ck
en
cr
y
p
t
io
n
,
w
h
ile
t
h
e
B
in
ar
y
s
ec
u
r
el
y
co
d
est
h
e
k
e
y
ma
n
a
g
e
m
e
n
t
ad
v
an
tag
e
s
.
T
h
u
s
th
e
d
u
al
p
r
o
tectio
n
m
a
k
es
t
h
e
d
ata
tr
an
s
m
i
s
s
io
n
s
ec
u
r
e.
T
h
e
r
e
m
ai
n
i
n
g
p
ap
er
is
s
tr
u
ct
u
r
ed
as
th
e
Sectio
n
2
d
ea
ls
w
ith
b
ac
k
g
r
o
u
n
d
o
n
v
ar
io
u
s
ex
is
tin
g
h
y
b
r
id
alg
o
r
ith
m
s
.
T
h
e
Sectio
n
3
in
tr
o
d
u
ce
s
t
h
e
co
d
in
g
co
n
ce
p
t
s
o
f
Hu
f
f
m
a
n
an
d
b
i
n
ar
y
i
n
d
etail.
Sectio
n
4
d
ea
ls
w
it
h
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
an
d
Sectio
n
5
ill
u
s
tr
ate
s
v
ar
io
u
s
p
h
a
s
es
o
f
co
m
p
u
ter
s
i
m
u
la
tio
n
th
a
t
w
er
e
ca
r
r
ied
o
u
t
to
test
an
d
an
a
l
y
ze
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
.
F
in
al
l
y
t
h
e
co
n
clu
s
io
n
is
p
r
ese
n
ted
in
t
h
e
Sectio
n
6.
2.
B
ACK
G
RO
UND
W
ith
t
h
e
r
ap
id
ad
v
an
ce
m
e
n
ts
in
t
h
e
n
et
w
o
r
k
tec
h
n
o
lo
g
y
a
n
d
s
i
g
n
a
l
p
r
o
ce
s
s
in
g
t
h
e
co
r
r
esp
o
n
d
in
g
r
eq
u
ir
e
m
en
t
o
f
th
e
co
m
m
u
n
ic
atio
n
ch
a
n
n
el
v
ar
ies
s
i
g
n
if
ica
n
tl
y
i
n
ter
m
s
o
f
s
ec
u
r
it
y
co
n
s
tr
ain
ts
.
C
o
m
m
o
n
l
y
th
e
w
o
r
d
s
ec
u
r
it
y
m
ea
n
s
a
n
e
n
v
ir
o
n
m
e
n
t
t
h
at
i
s
d
an
g
er
f
r
ee
f
r
o
m
m
alicio
u
s
in
ten
t
i
n
d
i
v
i
d
u
als/
o
r
g
a
n
izatio
n
s
.
Mo
s
t
o
f
t
h
e
e
x
is
t
in
g
co
m
m
u
n
i
ca
tio
n
s
y
s
te
m
s
f
o
c
u
s
o
n
p
h
y
s
i
ca
l
s
ec
u
r
it
y
t
h
at
p
r
o
tects
i
n
f
r
a
s
tr
u
ct
u
r
e,
p
h
y
s
ica
l
d
ata
f
r
o
m
u
n
a
u
t
h
o
r
ized
in
tr
u
s
io
n
o
r
d
estru
ctio
n
[
6
]
.
I
n
th
i
s
p
ap
er
,
w
e
f
o
cu
s
o
n
tr
an
s
m
is
s
io
n
s
ec
u
r
it
y
th
at
f
o
cu
s
es
o
n
i
n
f
o
r
m
atio
n
t
h
at
b
ein
g
tr
an
s
m
itted
b
et
w
ee
n
a
u
th
o
r
ized
p
er
s
o
n
n
el
th
r
o
u
g
h
a
ch
ai
n
o
f
p
h
y
s
ical
d
ev
ices (
m
o
s
tl
y
p
u
b
lic
d
ev
ice
s
)
.
Nester
en
k
o
,
A
.
Y.
E
.
,
et
al
.,
[
7
]
p
r
o
p
o
s
ed
a
n
e
w
h
y
b
r
id
en
cr
y
p
tio
n
s
c
h
e
m
e
b
ased
o
n
E
lGa
m
al
as
y
m
m
etr
ic
en
cr
y
p
t
io
n
s
ch
e
m
e
w
it
h
d
is
tr
ib
u
ted
s
ec
r
et
k
e
y
s
.
T
h
e
k
e
y
s
w
er
e
u
s
ed
as
d
ef
e
n
s
e
a
g
ain
s
t
u
n
a
u
t
h
o
r
ized
in
tr
u
s
io
n
o
f
en
cr
y
p
ted
m
e
s
s
a
g
es.
T
h
is
s
c
h
e
m
e
v
ie
w
s
th
e
p
r
o
b
le
m
asd
is
cr
ete
lo
g
ar
ith
m
a
n
d
in
co
r
p
o
r
ates
th
e
s
ec
u
r
it
y
t
h
at
u
s
e
s
ellip
tic
cu
r
v
e
as
th
e
b
asi
s
.
T
h
e
m
ai
n
f
e
at
u
r
e
o
f
th
e
s
ch
e
m
e
is
th
e
f
ac
t
th
at
p
lain
m
e
s
s
a
g
e
is
n
o
t
r
ep
r
esen
ted
as
a
p
o
in
t
o
f
ellip
tic
cu
r
v
e,
h
e
n
ce
,
ca
n
en
cr
y
p
t
a
lo
n
g
m
e
s
s
a
g
es.
T
h
e
cr
y
p
to
g
r
ap
h
ic
p
r
o
p
er
ties
o
f
th
e
s
ch
e
m
e
w
er
e
v
al
id
ated
w
it
h
p
r
ac
tical
ev
al
u
atio
n
s
.
P
er
s
ich
etti,
E
.
,
[
8
]
in
tr
o
d
u
ce
s
a
n
en
cr
y
p
tio
n
alg
o
r
ith
m
t
h
at
i
n
co
r
p
o
r
ates
co
d
in
g
th
eo
r
y
i
n
a
p
o
s
t
-
q
u
a
n
t
u
m
s
ce
n
ar
io
.
T
h
e
h
y
b
r
id
co
n
ce
p
t
o
f
th
e
alg
o
r
ith
m
u
s
es
Nied
er
r
eiter
c
o
n
s
tr
u
ctio
n
w
h
i
ch
o
f
f
er
s
a
r
an
d
o
m
m
o
d
el
f
o
c
u
s
e
s
o
f
I
ND
-
C
C
A
s
ec
u
r
it
y
ap
p
r
o
ac
h
.
Sh
e
n
,
W
.
,
et
al
.,
[
9
]
in
v
es
tig
at
es
v
ar
io
u
s
f
ac
to
r
s
an
d
l
i
m
i
tati
o
n
s
o
f
th
e
D2
D
co
m
m
u
n
icat
io
n
s
c
h
a
n
n
e
l
ex
is
t
in
g
p
r
o
to
co
ls
an
d
p
r
o
p
o
s
ed
a
n
e
w
s
ec
u
r
e
an
d
r
o
b
u
s
t
k
e
y
ex
c
h
an
g
e
co
n
ce
p
t
t
h
at
en
a
b
les
an
y
t
w
o
s
m
ar
t
co
m
m
u
n
icati
v
e
d
ev
ices
to
la
u
n
ch
a
D2
D
co
m
m
u
n
icatio
n
s
w
it
h
o
u
t
p
r
io
r
p
u
b
lic
co
v
er
t
k
e
y
in
f
o
r
m
at
io
n
.
T
h
is
p
r
o
to
co
l
w
as
d
e
s
ig
n
ed
b
ased
o
n
th
e
Dif
f
ie
-
Hel
l
m
a
n
k
e
y
e
x
ch
a
n
g
e
p
r
o
to
co
l
an
d
ass
u
r
a
n
ce
f
r
a
m
e
w
o
r
k
.
T
h
e
p
r
o
p
o
s
ed
s
ch
e
m
e
w
as
d
ev
elo
p
ed
o
n
A
n
d
r
o
id
p
latf
o
r
m
b
ased
d
ev
ices
an
d
s
i
m
u
latio
n
u
s
in
g
th
e
W
i
-
Fi
co
m
m
u
n
icatio
n
c
h
a
n
n
el
p
r
o
v
e
s
th
e
r
o
b
u
s
t
n
es
s
an
d
p
r
o
to
co
l su
cc
es
s
f
u
l i
m
p
le
m
en
tat
io
n
.
A
b
d
-
E
lr
a
h
m
an
,
E
.
et.
al
[
1
0
]
a
n
al
y
ze
d
v
ar
io
u
s
s
ec
u
r
it
y
f
ac
to
r
s
s
u
r
r
o
u
n
d
in
g
t
h
e
D2
D
co
m
m
u
n
ica
tio
n
s
'
in
b
o
th
P
r
o
x
i
m
it
y
Ser
v
ice
s
a
n
d
tr
an
s
m
i
s
s
io
n
s
ta
g
es.
I
n
itia
ll
y
,
e
x
is
ti
n
g
li
m
itat
io
n
s
a
n
d
r
eq
u
ir
e
m
en
ts
w
er
e
co
n
s
id
er
ed
b
y
t
h
e
a
u
t
h
o
r
s
in
d
esig
n
an
d
d
ev
elo
p
m
e
n
t
o
f
th
e
Gr
o
u
p
Key
Ma
n
ag
e
m
e
n
t
(
GKM
)
co
n
ce
p
t
th
at
w
o
u
ld
co
v
er
tl
y
a
n
d
ef
f
icie
n
tl
y
ex
c
h
an
g
e
m
es
s
ag
e
s
o
v
er
D2
D
p
r
o
ce
s
s
in
g
,
tr
a
n
s
m
is
s
io
n
an
d
r
ec
eiv
in
g
s
tag
e
s
o
f
th
e
co
m
m
u
n
icatio
n
s
y
s
te
m
.
T
h
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
w
a
s
an
a
l
y
ze
d
i
n
d
ep
th
a
n
d
s
i
m
u
lated
w
it
h
d
etailco
m
p
ar
is
o
n
w
it
h
e
x
is
t
in
g
ap
p
r
o
ac
h
es
th
at
f
o
cu
s
o
n
n
ea
r
f
ield
co
m
m
u
n
ic
atio
n
s
i
m
ilar
D2
D
(
i.e
.
ad
-
h
o
c)
[
1
1
]
.
Fu
r
th
er
m
o
r
e,
th
e
s
i
m
u
lat
io
n
r
es
u
lt
s
p
r
o
v
e
th
at
th
e
Gr
o
u
p
Ke
y
Ma
n
a
g
e
m
en
t (
GKM
)
co
n
ce
p
t
is
an
ef
f
icie
n
t
k
e
y
m
a
n
a
g
e
m
e
n
t
s
y
s
te
m
f
o
r
D2
D
co
m
m
u
n
i
ca
tio
n
.
R
eg
e,
K
.,
et
a
l
.,
[
1
2
]
p
r
esen
ted
a
h
y
b
r
id
en
cr
y
p
tio
n
ap
p
r
o
ac
h
th
at
i
n
co
r
p
o
r
ate
A
E
S
a
n
d
R
S
A
to
i
m
p
r
o
v
e
th
e
le
v
el
o
f
p
r
o
tectio
n
f
o
r
th
e
in
f
o
r
m
at
io
n
b
ein
g
tr
a
n
s
m
itted
b
et
w
ee
n
t
wo
o
r
m
o
r
e
p
u
b
lic
d
ev
ices
t
h
at
w
er
e
u
s
i
n
g
B
l
u
eto
o
th
co
m
m
u
n
i
ca
tio
n
to
tr
a
n
s
m
it
th
e
in
f
o
r
m
a
tio
n
.
L
u
,
X.
,
et
al
.,
[
1
3
]
p
r
o
v
es
i
f
an
cr
y
p
to
tex
t
i
s
s
ec
u
r
ed
w
it
h
KE
M
(
i.e
.
Ke
y
E
n
ca
p
s
u
latio
n
Me
ch
an
i
s
m
)
an
d
o
f
f
er
s
k
e
y
f
le
x
ib
ilit
y
an
d
au
th
e
n
tica
tio
n
t
h
e
n
T
ag
-
DE
M
(
i.e
.
T
ag
Data
E
n
ca
p
s
u
lati
o
n
Me
ch
a
n
is
m
)
t
h
at
s
ec
u
r
es
t
h
e
au
t
h
e
n
tic
cr
y
p
to
te
x
t
f
r
o
m
ea
r
lier
p
h
ase
i
s
i
m
m
u
n
e
to
k
e
y
r
elate
d
attac
k
s
.
T
h
e
s
i
m
u
latio
n
r
esu
lt
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2088
-
8708
A
Hyb
r
id
C
r
yp
to
g
r
a
p
h
ic
S
ystem
fo
r
S
ec
u
r
ed
Dev
ice
to
Dev
ic
e
C
o
mmu
n
ica
tio
n
(
A
.
R
a
ma
K
r
is
h
n
a
)
2965
s
h
o
w
t
h
at
th
e
p
r
o
p
o
s
ed
h
y
b
r
id
en
cr
y
p
tio
n
s
c
h
e
m
e
i
s
s
ec
u
r
ed
an
d
r
o
b
u
s
t
ag
ain
s
t
R
K
A
.
I
n
ad
d
itio
n
,
ex
is
t
in
g
KE
M
ap
p
r
o
ac
h
es
w
er
e
also
s
i
m
u
lated
o
n
l
y
to
p
r
o
v
e
th
a
t th
e
y
s
ati
s
f
y
t
h
ese
t
w
o
p
r
o
p
er
ties
.
K
w
o
n
,
H.
,
[
1
4
]
p
r
o
p
o
s
ed
a
n
ew
D2
D
ce
r
ti
f
icatio
n
p
r
o
ce
s
s
t
h
at
in
co
r
p
o
r
ates
a
co
v
er
t
k
e
y
d
eter
m
i
n
in
g
s
tag
e
u
s
i
n
g
cip
h
er
tex
t
-
p
o
lic
y
attr
ib
u
te
-
b
ased
en
cr
y
p
tio
n
(
C
P
-
A
B
E
)
.
B
y
lev
er
a
g
i
n
g
C
P
-
AB
E
,
th
is
ap
p
r
o
ac
h
o
f
f
er
s
a
ag
r
ee
m
en
t
p
r
o
to
co
l
an
d
ex
c
h
an
g
e
t
h
e
k
e
y
in
f
o
r
m
atio
n
b
et
w
ee
n
t
h
e
co
m
m
u
n
icatin
g
p
ar
ties
i
n
a
m
u
lti
-
h
o
p
n
et
w
o
r
k
s
y
s
te
m
(
i
.
e.
s
i
m
i
lar
to
D2
D
co
m
m
u
n
icatio
n
)
.
I
n
ad
d
itio
n
,
s
ev
er
al
d
ev
iatio
n
s
o
f
t
h
e
p
r
o
to
co
ls
w
er
e
i
n
tr
o
d
u
ce
d
f
o
r
d
if
f
er
e
n
t
s
ce
n
ar
io
s
in
a
m
u
l
ti
-
h
o
p
n
et
w
o
r
k
s
w
it
h
o
u
t
n
et
w
o
r
k
i
n
f
r
astru
c
tu
r
e.
Si
m
u
latio
n
r
esu
lts
s
h
o
w
t
h
at
th
e
s
c
h
e
m
e
g
ai
n
s
r
atio
n
al
c
o
m
p
u
tatio
n
co
s
t
an
d
ar
e
i
m
m
u
n
e
to
MI
T
M
an
d
r
ep
lay
attac
k
i
n
D2
D
m
o
b
ile
m
u
lti
-
h
o
p
n
et
w
o
r
k
s
.
3.
CO
DIN
G
T
E
CH
NI
Q
U
E
S
Hu
f
f
m
a
n
co
d
in
g
:
I
t
is
en
tr
o
p
y
b
ased
co
d
in
g
tech
n
iq
u
e
th
at
is
co
m
m
o
n
l
y
u
s
ed
f
o
r
co
m
p
r
ess
io
n
o
f
th
e
d
ata
in
a
lo
s
s
les
s
m
a
n
n
er
.
T
h
is
tech
n
iq
u
e
u
s
e
s
t
h
e
f
r
e
q
u
en
c
y
o
f
o
cc
u
r
r
e
n
ce
as
r
ef
er
en
ce
to
d
esi
g
n
a
v
ar
iab
le
-
le
n
g
th
k
e
y
b
ased
lo
o
k
u
p
-
tab
le
f
o
r
co
d
in
g
t
h
at
o
r
i
g
i
n
al
i
n
f
o
r
m
atio
n
.
T
h
e
s
u
cc
es
s
o
f
t
h
e
co
d
in
g
lar
g
el
y
d
ep
en
d
s
o
n
th
e
lo
o
k
u
p
-
tab
le
d
eter
m
i
n
ed
f
r
o
m
t
h
e
o
r
ig
i
n
al
in
f
o
r
m
atio
n
w
h
ic
h
is
o
b
tain
ed
b
ased
o
n
th
e
f
r
eq
u
en
c
y
o
f
o
cc
u
r
r
en
ce
f
o
r
ea
ch
p
o
s
s
ib
le
v
al
u
e.
Fi
g
u
r
e
2
(
a)
an
d
2
(
b
)
s
h
o
w
s
t
h
e
f
lo
w
ch
ar
t
f
o
r
Hu
f
f
m
a
n
en
co
d
in
g
a
n
d
d
ec
o
d
in
g
p
r
o
ce
s
s
r
esp
ec
tiv
el
y
.
Hu
f
f
m
a
n
co
d
in
g
ex
p
lo
it
s
a
g
en
er
alize
d
ap
p
r
o
ac
h
f
o
r
th
e
s
elec
tio
n
o
f
ea
ch
p
o
s
s
ib
le
v
alu
e
an
d
estab
lis
h
es
a
co
r
r
esp
o
n
d
in
g
p
r
ef
ix
co
d
e
th
at
ca
n
co
m
p
r
eh
e
n
d
all
th
e
p
o
s
s
ib
le
v
alu
e
s
ex
i
s
tin
g
i
n
th
e
o
r
ig
in
a
l
in
f
o
r
m
atio
n
in
co
n
s
id
er
atio
n
.
T
h
e
co
d
in
g
s
tar
ts
w
i
th
s
m
aller
p
r
ef
ix
co
d
e
e
m
p
lo
y
ed
f
o
r
v
al
u
es
t
h
at
ar
e
h
a
v
i
n
g
h
ig
h
er
f
r
eq
u
en
c
y
a
n
d
as
th
e
f
r
eq
u
en
c
y
o
f
t
h
e
v
a
lu
e
d
ec
r
ea
s
e
s
th
e
co
d
in
g
s
tr
i
n
g
in
cr
ea
s
es
[
1
5
]
.
T
h
is
ap
p
r
o
ac
h
w
a
s
ab
le
to
d
ev
is
ea
m
o
s
t
e
f
f
i
cien
t
co
d
in
g
f
r
a
m
e
w
o
r
k
i
n
wh
ich
n
o
t
w
o
p
o
s
s
ib
le
v
al
u
es
w
il
l
h
a
v
e
th
e
s
a
m
e
p
r
ef
ix
co
d
e
d
eter
m
in
ed
f
r
o
m
t
h
e
lo
o
k
-
u
p
tab
le.
T
h
ese
u
n
iq
u
e
co
d
es
o
f
b
its
w
il
l
p
r
o
d
u
ce
a
d
ata
w
h
ich
i
s
o
f
t
h
e
s
m
al
ler
s
ize
a
n
d
co
m
p
letel
y
d
if
f
er
en
t
f
r
o
m
th
e
o
r
ig
i
n
al
in
f
o
r
m
atio
n
,
w
h
en
t
h
e
ac
t
u
al
v
al
u
e
f
r
eq
u
e
n
cie
s
co
m
p
r
e
h
en
d
w
it
h
t
h
e
p
r
ef
ix
-
c
o
d
es in
th
e
lo
o
k
-
u
p
tab
le
t
h
e
co
d
e
ca
n
b
e
d
ec
o
d
ed
[
1
6
-
17]
.
T
h
e
en
co
d
in
g
p
r
o
ce
s
s
o
f
Hu
f
f
m
an
's
m
eth
o
d
is
f
air
l
y
e
f
f
icie
n
t;
it
ta
k
es
O
(
n
lo
g
n
)
o
p
er
ati
o
n
s
to
co
d
e
th
e
co
m
p
le
te
o
r
ig
i
n
al
i
n
f
o
r
m
at
io
n
[
1
8
-
19]
.
I
n
g
e
n
er
al,
t
h
is
ap
p
r
o
ac
h
o
f
f
er
s
th
e
o
p
ti
m
al
m
a
n
n
er
to
ta
k
e
b
en
e
f
i
t
o
f
th
e
c
h
a
n
g
i
n
g
f
r
eq
u
en
c
ies
v
alu
es
i
n
a
n
i
n
f
o
r
m
atio
n
s
tr
ea
m
.
I
t
is
e
v
id
en
t
t
h
at
t
h
is
ap
p
r
o
ac
h
o
p
er
ates
o
n
th
e
r
an
g
e
o
f
1
0
% to
3
0
% c
o
m
p
r
e
s
s
io
n
r
atio
b
u
t t
h
e
e
n
cr
y
p
tio
n
la
r
g
el
y
d
ep
en
d
s
o
n
d
is
tr
ib
u
t
io
n
o
f
t
h
e
i
n
f
o
r
m
atio
n
.
T
h
e
p
r
im
e
co
n
ce
p
t
th
at
d
r
iv
e
s
t
h
is
co
d
in
g
tec
h
n
iq
u
e
is
b
a
s
ed
o
n
m
ap
p
in
g
t
h
e
le
s
s
f
r
eq
u
en
c
y
v
a
lu
e
s
w
i
th
a
lar
g
er
p
r
ef
ix
co
d
e
f
r
o
m
th
e
d
eter
m
i
n
ed
lo
o
k
-
u
p
tab
le
an
d
s
m
aller
p
r
ef
i
x
co
d
e
f
o
r
h
i
g
h
f
r
eq
u
en
c
y
v
al
u
e
s
.
I
n
ad
d
itio
n
,
th
e
e
n
tire
co
d
i
n
g
i
s
m
ap
p
ed
b
ased
o
n
th
e
lo
o
k
-
u
p
tab
le
w
h
ic
h
h
as
u
n
iq
u
e
co
d
e
f
o
r
ea
ch
v
al
u
e.
T
h
is
p
r
o
p
er
ty
ab
o
u
t th
e
co
d
e
is
cr
u
cial
w
i
th
r
esp
ec
t t
o
ea
s
il
y
d
ec
i
p
h
er
in
g
th
e
co
d
e
[
2
0
-
2
1
]
.
(
a)
(
b)
Fig
u
r
e
2
.
(
a)
T
h
e
Flo
w
C
h
ar
t
o
f
Hu
f
f
m
a
n
En
co
d
in
g
(
b
)
T
h
e
Flo
w
C
h
ar
t o
f
Hu
f
f
m
an
D
ec
o
d
in
g
B
in
ar
y
C
o
d
in
g
:
B
in
ar
y
en
cr
y
p
tio
n
is
an
alg
o
r
it
h
m
w
h
ic
h
is
u
s
ed
to
co
d
e
an
d
d
ec
o
d
e
th
e
s
ec
u
r
ed
d
ata
u
s
i
n
g
as
y
m
m
etr
ic
e
n
cr
y
p
tio
n
alg
o
r
ith
m
w
h
er
e
it
u
s
es b
o
t
h
p
r
iv
ate
an
d
p
u
b
lic
k
e
y
.
I
t
is
ea
s
y
to
r
ea
d
f
o
r
s
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
:
29
6
2
–
2
9
7
0
2966
w
h
ile
d
ec
r
ea
s
e
w
it
h
t
h
e
co
m
p
lex
it
y
.
B
in
ar
y
en
co
d
in
g
a
n
d
d
ec
o
d
in
g
f
lo
w
c
h
ar
ts
ar
e
s
h
o
w
n
i
n
F
i
g
u
r
e
3
(
a)
an
d
3
(
b
)
r
esp
ec
tiv
ely
.
(
a)
(
b)
Fig
u
r
e
3
.
(
a)
T
h
e
Flo
w
C
h
ar
t
o
f
B
in
ar
y
En
co
d
i
n
g
(
b
)
T
h
e
Flo
w
C
h
ar
t o
f
B
in
ar
y
Dec
o
d
in
g
4.
P
RO
P
O
SE
D
AL
G
O
R
I
T
H
M
T
h
e
m
aj
o
r
f
o
cu
s
o
f
t
h
i
s
Sec
t
io
n
w
as
to
d
esi
g
n
a
n
d
d
ev
el
o
p
an
i
n
n
o
v
ati
v
e
n
o
v
el
f
r
a
m
e
w
o
r
k
th
a
t
ex
p
lo
its
v
ar
io
u
s
f
ac
to
r
s
to
p
r
o
v
id
e
r
eliab
le
an
d
r
o
b
u
s
t
D2
D
co
m
m
u
n
icatio
n
b
ased
o
n
t
h
e
ex
is
ti
n
g
n
e
t
w
o
r
k
co
n
s
tr
ain
ts
an
d
i
m
p
r
o
v
e
p
ac
k
ets
tr
an
s
f
er
r
ate
w
h
ile
m
i
n
i
m
izi
n
g
t
h
e
lo
ad
e
x
is
t
i
n
g
co
m
m
u
n
ica
tio
n
in
f
r
astru
ct
u
r
e.
T
h
e
b
asic
p
r
o
ce
d
u
r
e
f
o
r
en
co
d
in
g
an
d
d
ec
o
d
in
g
th
e
d
ig
ital
in
f
o
r
m
at
i
o
n
u
s
i
n
g
p
r
o
p
o
s
ed
alg
o
r
ith
m
is
p
r
esen
ted
in
th
e
F
ig
u
r
e
4
a
n
d
F
i
g
u
r
e
5
r
esp
ec
ti
v
el
y
.
I
n
ad
d
itio
n
,
t
h
e
ap
p
r
o
ac
h
g
en
er
ate
s
a
b
in
ar
y
co
d
e
u
s
in
g
th
e
p
ar
tic
u
lar
d
ef
i
n
ed
in
p
u
t
f
ac
to
r
s
.
HYB
R
I
D
E
NC
R
YP
T
I
ON
A
L
GORIT
HM
Step
: 1
E
n
ter
th
e
in
p
u
t d
ata.
Step
: 2
I
n
p
u
t d
ata
g
o
es to
b
in
a
r
y
m
o
d
e.
Step
: 3
I
n
b
in
ar
y
f
ir
s
t is
x
o
r
p
r
iv
ate
k
e
y
.
Step
: 4
f
in
d
t
h
e
2
’
s
co
m
p
le
m
e
n
t.
Step
: 5
f
in
d
t
h
e
1
’
s
co
m
p
le
m
e
n
t.
Step
: 6
f
in
d
t
h
e
x
o
r
w
ith
p
u
b
li
c
k
e
y
.
Step
: 7
ch
ip
p
er
tex
t .
Step
: 8
No
w
ap
p
l
y
i
n
g
H
u
f
f
m
a
n
o
n
ch
ip
p
er
tex
t.
Step
: 9
R
ea
d
ch
ar
ac
ter
f
r
o
m
d
atab
ase
Step
: 1
0
R
ep
lace
th
e
ch
ar
ac
ter
m
atch
i
n
d
ata
b
ase.
Step
: 1
1
Sav
e
th
at
i
n
f
ile.
Step
: 1
2
ch
ip
p
er
tex
t g
o
t.
HYB
R
I
D
DE
C
R
YP
T
I
ON
A
L
GORIT
HM
Step
: 1
in
p
u
t
t
h
e
ch
ip
p
er
tex
t.
Step
: 2
s
ea
r
ch
th
e
e
n
co
d
e
f
r
o
m
d
atab
ase.
Step
: 3
m
a
tch
t
h
e
co
d
e
an
d
p
aste in
p
lace
o
f
t
h
at
ch
ar
ac
ter
a
n
d
p
u
t r
eq
u
ir
ed
ch
ar
ac
ter
.
Step
: 4
f
in
d
t
h
e
x
o
r
w
ith
p
u
b
li
c
k
e
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2088
-
8708
A
Hyb
r
id
C
r
yp
to
g
r
a
p
h
ic
S
ystem
fo
r
S
ec
u
r
ed
Dev
ice
to
Dev
ic
e
C
o
mmu
n
ica
tio
n
(
A
.
R
a
ma
K
r
is
h
n
a
)
2967
Step
: 5
f
in
d
t
h
e
1
’
s
co
m
p
le
m
e
n
t.
Step
: 6
f
in
d
t
h
e
2
’
s
co
m
p
le
m
e
n
t.
Step
: 7
f
in
d
t
h
e
x
o
r
w
ith
p
r
i
v
a
te
k
e
y
.
Step
: 8
Or
ig
in
al
te
x
t
s
f
o
u
n
d
.
Fig
u
r
e
4
.
E
n
co
d
in
g
P
r
o
ce
s
s
o
f
th
e
H
y
b
r
id
C
r
y
p
to
g
r
ap
h
ic
S
y
s
te
m
Fig
u
r
e
5
.
Dec
o
d
in
g
P
r
o
ce
s
s
o
f
th
e
H
y
b
r
id
C
r
y
p
to
g
r
ap
h
ic
S
y
s
te
m
5.
SI
M
UL
AT
I
O
N
A
ND
RE
SU
L
T
S
T
h
is
Sectio
n
p
r
ese
n
ts
w
it
h
t
h
e
ex
p
er
i
m
e
n
tatio
n
an
a
l
y
s
is
a
n
d
co
r
r
esp
o
n
d
in
g
test
r
e
s
u
l
ts
o
f
p
r
o
p
o
s
ed
H
y
b
r
id
en
cr
y
p
tio
n
s
y
s
te
m
.
T
h
ese
s
i
m
u
latio
n
s
w
er
e
r
ep
licate
d
u
s
i
n
g
J
A
V
A
p
r
o
g
r
a
m
m
in
g
b
ased
d
ev
elo
p
m
e
n
t
en
v
ir
o
n
m
e
n
t.
An
al
y
s
is
a
n
d
tes
tin
g
w
as
d
o
n
e
i
n
a
p
h
ased
m
a
n
n
er
u
s
in
g
te
x
t
d
ata
o
f
v
ar
y
i
n
g
s
ize
s
a
n
d
clas
s
es
o
f
f
ea
t
u
r
es.
T
h
e
y
w
er
e
an
al
y
z
ed
f
o
r
r
o
b
u
s
tn
ess
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
.
5
.
1
.
P
ha
s
e
-
1
Cla
s
s
Dia
g
ra
m
T
h
e
class
d
iag
r
a
m
is
co
n
s
id
er
ed
as
th
e
p
r
im
e
b
u
ild
in
g
b
lo
ck
o
f
an
y
o
b
j
ec
t
o
r
ien
ted
m
o
d
elin
g
.
I
t
is
p
r
im
ar
il
y
e
m
p
lo
y
ed
f
o
r
b
o
th
co
n
ce
p
tu
al
a
n
d
d
etailed
m
o
d
elin
g
o
f
t
h
e
ap
p
licatio
n
w
h
er
ein
th
e
d
ia
g
r
a
m
tr
an
s
late
s
t
h
e
o
p
er
atio
n
s
i
n
to
co
r
r
esp
o
n
d
in
g
p
r
o
g
r
a
m
m
i
n
g
c
o
d
e.
Fu
r
th
er
,
th
e
y
co
u
ld
b
e
ef
f
ec
ti
v
el
y
e
m
p
lo
y
ed
f
o
r
co
n
ce
p
tu
al
d
ata
m
o
d
elin
g
b
ased
ap
p
licatio
n
s
.
A
r
elatio
n
s
h
ip
o
f
t
h
e
p
r
o
p
o
s
ed
h
y
b
r
id
en
cr
y
p
tio
n
al
g
o
r
ith
m
u
s
i
n
g
t
h
e
cla
s
s
d
iag
r
a
m
i
s
ill
u
s
tr
ated
i
n
th
e
F
i
g
u
r
e
6
,
t
h
e
s
p
ec
if
ic
attr
ib
u
te
s
a
n
d
o
p
er
atio
n
co
n
n
ec
tio
n
ar
e
f
o
u
n
d
o
n
clas
s
a
n
d
o
b
j
ec
ts
d
iag
r
a
m
s
.
Mo
r
eo
v
er
,
th
e
clas
s
es
i
n
a
clas
s
d
ia
g
r
a
m
r
ep
r
esen
t
b
o
th
t
h
e
m
ai
n
o
b
j
ec
ts
,
in
ter
ac
tio
n
s
in
t
h
e
ap
p
licatio
n
an
d
t
h
e
clas
s
es to
b
e
p
r
o
g
r
a
m
m
ed
.
Fig
u
r
e
6
.
C
lass
D
iag
r
a
m
o
f
t
h
e
H
y
b
r
id
E
n
cr
y
p
tio
n
A
l
g
o
r
ith
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
:
29
6
2
–
2
9
7
0
2968
5
.
2
.
P
ha
s
e
2
Sn
a
p Sho
t
s
T
h
e
r
esu
lt
s
o
f
s
i
m
u
latio
n
i
s
r
ep
r
esen
ted
i
n
t
h
is
p
h
a
s
e
a
s
s
n
ap
s
h
o
ts
.
Fi
g
u
r
e
7
r
ep
r
esen
t
s
th
e
i
n
it
ial
s
tep
o
f
s
i
m
u
la
tio
n
,
w
h
ich
r
eq
u
ir
es
n
a
m
e
a
n
d
p
ass
w
o
r
d
o
f
an
au
t
h
e
n
ticated
u
s
er
to
en
co
d
e
an
d
d
ec
o
d
e
th
e
in
f
o
r
m
atio
n
u
s
i
n
g
p
r
o
p
o
s
ed
alg
o
r
ith
m
.
Ne
x
t
s
tep
i
n
s
i
m
u
lat
i
o
n
is
th
e
s
elec
t
io
n
o
f
e
n
co
d
in
g
o
r
d
ec
o
d
in
g
s
ta
g
e
as
s
h
o
w
n
i
n
F
i
g
u
r
e
8
.
T
h
e
f
in
al
s
tep
is
to
ap
p
ly
t
h
e
p
r
o
p
o
s
e
d
h
y
b
r
id
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
f
o
r
en
co
d
in
g
o
r
d
ec
o
d
in
g
as s
h
o
w
n
i
n
F
i
g
u
r
e
9
o
r
F
ig
u
r
e
1
0
r
esp
ec
tiv
el
y
.
Fig
u
r
e
7
.
GUI
o
f
H
y
b
r
id
C
r
y
p
to
g
r
ap
h
ic
S
y
s
te
m
Fig
u
r
e
8
.
B
asic G
UI
o
f
Sele
cti
o
n
o
f
S
en
d
er
an
d
R
ec
e
iv
er
A
l
g
o
r
ith
m
Fig
u
r
e
9
.
GUI
o
f
E
n
co
d
in
g
P
r
o
ce
s
s
f
o
r
H
y
b
r
id
C
r
y
p
to
g
r
ap
h
i
c
S
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2088
-
8708
A
Hyb
r
id
C
r
yp
to
g
r
a
p
h
ic
S
ystem
fo
r
S
ec
u
r
ed
Dev
ice
to
Dev
ic
e
C
o
mmu
n
ica
tio
n
(
A
.
R
a
ma
K
r
is
h
n
a
)
2969
Fig
u
r
e
1
0
.
GUI
o
f
Dec
o
d
in
g
P
r
o
ce
s
s
f
o
r
H
y
b
r
id
C
r
y
p
to
g
r
ap
h
ic
S
y
s
te
m
5
.
3
.
P
ha
s
e
3
Nu
m
er
ica
l a
na
ly
s
is
T
ab
le
1
s
h
o
w
s
t
h
e
co
m
p
ar
a
tiv
e
a
n
al
y
s
i
s
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
w
i
th
w
ell
-
k
n
o
wn
R
MSE
alg
o
r
ith
m
f
o
r
in
f
o
r
m
atio
n
co
n
t
ain
i
n
g
: o
n
l
y
c
h
ar
ac
ter
s
,
o
n
l
y
n
u
m
b
er
s
o
r
b
o
th
.
T
ab
le
1
.
C
o
m
p
ar
is
o
n
o
f
R
MS
E
o
f
th
e
C
o
lo
r
I
m
a
g
es
b
et
w
ee
n
B
in
ar
y
C
o
d
in
g
an
d
P
r
o
p
o
s
e
d
Hy
b
r
id
A
lg
o
r
it
h
m
F
i
l
e
S
i
z
e
R
M
S
E
E
n
c
r
y
p
t
R
M
S
E
D
e
c
r
y
p
t
B
i
n
a
r
y
En
c
r
y
p
t
N
u
mb
e
r
s
C
h
a
r
B
o
t
h
N
u
mb
e
r
s
C
h
a
r
B
o
t
h
2
K
B
1
1
.
7
1
5
0
1
1
.
2
9
0
0
1
0
.
7
9
5
0
0
0
0
9
.
7
7
0
9
5
K
B
1
2
.
0
0
1
0
1
1
.
4
7
1
0
1
1
.
1
5
6
0
0
0
0
1
0
.
1
8
4
8
1
0
K
B
1
1
.
6
5
9
0
1
1
.
4
7
2
0
1
1
.
2
5
6
0
0
0
0
9
.
6
6
2
4
2
0
K
B
1
3
.
2
4
3
0
1
3
.
4
3
6
0
1
3
.
2
4
4
0
0
0
0
1
0
.
1
3
1
1
3
6
K
B
1
3
.
4
1
4
0
1
3
.
7
0
4
0
1
3
.
5
6
7
0
0
0
0
1
0
.
3
2
1
0
5
0
K
B
1
2
.
5
4
7
0
1
2
.
5
5
9
0
1
2
.
2
3
9
0
0
0
0
8
.
6
8
0
1
6.
CO
NCLU
SI
O
N
I
n
th
i
s
p
ap
er
,
w
e
p
r
esen
ted
a
n
e
w
h
y
b
r
id
cr
y
p
to
g
r
ap
h
ic
s
y
s
te
m
b
ased
o
n
H
u
f
f
m
a
n
co
d
in
g
a
n
d
B
in
ar
y
th
at
co
u
ld
i
m
p
r
o
v
e
t
h
e
s
ec
u
r
i
t
y
o
f
t
h
e
in
f
o
r
m
at
io
n
b
ein
g
t
r
an
s
m
itted
o
v
er
m
u
lti
-
h
o
p
D2
D
co
m
m
u
n
ica
tio
n
ch
an
n
el.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
s
u
s
ed
a
co
m
b
i
n
atio
n
Hu
f
f
m
an
alg
o
r
it
h
m
a
n
d
B
in
ar
y
a
l
g
o
r
ith
m
f
o
r
h
i
g
h
er
ef
f
icien
c
y
in
b
lo
ck
en
cr
y
p
tio
n
an
d
co
v
er
tk
e
y
ag
r
ee
m
en
t
p
r
o
to
co
ls
.
Hen
ce
f
o
r
th
,
th
e
s
ig
n
i
f
i
ca
n
t
ad
v
an
tag
e
s
o
f
u
s
i
n
g
Hu
f
f
m
an
co
d
in
g
an
d
B
in
ar
y
al
g
o
r
ith
m
w
il
l
en
s
u
r
e
t
h
at
th
e
i
n
f
o
r
m
atio
n
tr
an
s
m
i
tte
d
in
m
o
r
e
co
v
er
tl
y
m
an
n
er
o
v
er
t
h
e
D2
D
c
h
a
n
n
e
l.
E
x
p
er
i
m
e
n
tal
r
es
u
lt
s
p
r
o
v
e
th
at
t
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
is
r
o
b
u
s
t,
lo
s
s
le
s
s
i
n
n
atu
r
e,
an
d
ca
n
ef
f
ec
ti
v
el
y
m
a
n
ag
e
t
h
e
n
et
w
o
r
k
’
s
tr
af
f
ic
is
s
u
es.
Mo
r
eo
v
er
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
p
r
o
v
es
th
a
t
th
e
D2
D
co
m
m
u
n
icatio
n
is
f
ea
s
ib
le
to
o
p
er
ate
i
n
d
ep
en
d
en
tl
y
o
r
i
n
co
llab
o
r
atio
n
w
it
h
t
h
e
e
x
i
s
ti
n
g
in
f
r
astru
ct
u
r
e
b
ased
co
m
m
u
n
i
ca
tio
n
s
y
s
te
m
.
I
n
ad
d
itio
n
,
en
cr
y
p
tio
n
o
n
m
e
d
ia
f
ile
co
n
v
er
t
it
i
n
to
a
b
in
ar
y
f
o
r
m
at
a
n
d
it
is
ea
s
y
to
u
n
d
er
s
tan
d
b
y
s
y
s
te
m
a
n
d
b
o
th
alg
o
r
ith
m
b
ased
o
n
th
ese
b
in
ar
y
n
u
m
b
er
i
t
tak
e
less
ti
m
e
to
en
cr
y
p
t
an
d
d
ec
r
y
p
t
f
r
o
m
an
o
th
er
alg
o
r
it
h
m
.
F
u
r
t
h
er
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
is
lo
s
s
le
s
s
in
n
atu
r
e
i.e
.
,
th
e
d
ec
r
y
p
t
ed
in
f
o
r
m
atio
n
a
n
d
o
r
ig
in
al
i
n
f
o
r
m
atio
n
w
o
u
ld
s
a
m
e
w
it
h
n
o
d
is
to
r
tio
n
.
RE
F
E
R
E
NC
E
S
[1
]
F
.
C.
Ch
e
n
g
a
n
d
S
.
T
a
tes
h
.
“
S
e
c
u
re
De
v
ic
e
-
t
o
-
De
v
ice
(D2
d
)
Co
m
m
u
n
ica
ti
o
n
,”
U.
S
.
P
a
ten
t
No
.
2
0
,
1
5
0
,
3
2
6
,
5
3
7
,
2
0
1
5
.
[2
]
L
.
G
o
ra
tt
i,
e
t
a
l.
,
“
C
o
n
n
e
c
ti
v
it
y
a
n
d
se
c
u
rit
y
in
a
D2
D
c
o
m
m
u
n
ica
ti
o
n
p
r
o
to
c
o
l
f
o
r
p
u
b
li
c
sa
f
e
t
y
a
p
p
li
c
a
ti
o
n
s
,”
i
n
W
ire
les
s Co
mm
u
n
ica
ti
o
n
s S
y
st
e
ms
(
IS
W
CS
),
2
0
1
4
1
1
t
h
In
ter
n
a
ti
o
n
a
l
S
y
mp
o
siu
m
o
n
,
p
p
.
5
4
8
-
5
5
2
,
2
0
1
4
.
[3
]
J.
L
.
M
a
ss
e
y
,
“
S
o
m
e
a
p
p
li
c
a
ti
o
n
s
o
f
so
u
rc
e
c
o
d
i
n
g
in
c
ry
p
to
g
ra
p
h
y
,
”
Eu
o
p
e
a
n
T
ra
n
s
a
c
ti
o
n
o
n
T
e
le
c
o
mm
u
n
ica
t
io
n
,
v
o
l
.
5
,
p
p
.
4
2
1
–
4
2
9
,
1
9
9
4
.
[4
]
J.
Kn
u
d
se
n
,
“
Ja
v
a
Cr
y
p
to
g
ra
p
h
y
,”
O’Re
il
l
y
a
n
d
A
ss
o
c
iate
s,
In
c
.
,
1
9
9
8
.
[5
]
H.
De
lf
s an
d
H.
Kn
e
b
l,
“
In
tro
d
u
c
t
io
n
to
Cry
p
to
g
ra
p
h
y
,”
S
p
rin
g
e
r,
2
0
0
7
.
[6
]
“
Hu
ffm
a
n
c
o
d
i
n
g
a
n
d
e
n
c
ry
p
ti
o
n
s
m
e
th
o
d
s,”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Co
mp
u
ter
S
c
ie
n
c
e
a
n
d
I
n
fo
r
ma
ti
o
n
S
e
c
u
ri
ty
,
v
o
l
/i
ss
u
e
:
8
(
9
)
,
p
p
.
1
9
5
–
1
9
9
,
2
0
1
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
:
29
6
2
–
2
9
7
0
2970
[7
]
A
.
Y.
E.
Ne
ste
re
n
k
o
a
n
d
A
.
V.
E.
P
u
g
a
c
h
e
v
,
“
A
n
e
w
h
y
b
rid
e
n
c
ry
p
ti
o
n
sc
h
e
m
e
,”
Prikla
d
n
a
y
a
Disk
re
tn
a
y
a
M
a
tem
a
ti
k
a
,
v
o
l
.
4
,
p
p
.
56
-
71
,
2
0
1
5
.
[8
]
E.
P
e
rsic
h
e
tt
i,
“
S
e
c
u
re
a
n
d
a
n
o
n
y
m
o
u
s
h
y
b
rid
e
n
c
ry
p
ti
o
n
f
ro
m
c
o
d
i
n
g
th
e
o
ry
,”
i
n
Po
st
-
Q
u
a
n
tu
m
Cry
p
to
g
ra
p
h
y
,
S
p
rin
g
e
r
Be
rli
n
He
id
e
lb
e
rg
,
p
p
.
1
7
4
-
1
8
7
,
2
0
1
1
.
[9
]
W
.
S
h
e
n
,
e
t
a
l.
,
“
S
e
c
u
re
k
e
y
e
sta
b
li
sh
m
e
n
t
f
o
r
d
e
v
ice
-
to
-
d
e
v
ic
e
c
o
m
m
u
n
ica
ti
o
n
s
,”
i
n
Gl
o
b
a
l
Co
mm
u
n
ic
a
ti
o
n
s
Co
n
fer
e
n
c
e
(
GLOBE
COM
),
2
0
1
4
IEE
E
,
p
p
.
3
3
6
-
3
4
0
,
2
0
1
4
.
[1
0
]
E.
A
.
El
ra
h
m
a
n
,
e
t
a
l.
,
“
D2
D
g
ro
u
p
c
o
m
m
u
n
ica
ti
o
n
s
se
c
u
rit
y
,”
i
n
Pro
to
c
o
l
En
g
in
e
e
rin
g
(
ICPE
)
a
n
d
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Ne
w
T
e
c
h
n
o
l
o
g
ies
o
f
Distri
b
u
ted
S
y
ste
ms
(
NT
DS
),
2
0
1
5
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
,
p
p
.
1
-
6
,
2
0
1
5
.
[1
1
]
E.
A
.
El
ra
h
m
a
n
,
e
t
a
l.
,
“
F
a
st
g
ro
u
p
d
i
sc
o
v
e
ry
a
n
d
n
o
n
-
re
p
u
d
iatio
n
i
n
D2
D
c
o
m
m
u
n
ica
ti
o
n
s
u
sin
g
IBE
,”
i
n
W
ire
les
s
Co
mm
u
n
ica
ti
o
n
s a
n
d
M
o
b
il
e
C
o
mp
u
ti
n
g
C
o
n
fer
e
n
c
e
(
I
W
CM
C),
2
0
1
5
In
ter
n
a
ti
o
n
a
l
,
p
p
.
6
1
6
-
6
2
1
,
2
0
1
5
.
[1
2
]
K.
Re
g
e
,
e
t
a
l.
,
“
Blu
e
to
o
t
h
Co
m
m
u
n
ica
ti
o
n
u
sin
g
Hy
b
rid
En
c
ry
p
ti
o
n
A
lg
o
rit
h
m
b
a
s
e
d
o
n
AES
a
n
d
RS
A
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
Ap
p
l
ica
ti
o
n
s
,
v
o
l/
issu
e
:
7
1
(
2
2
)
,
2
0
1
3
.
[1
3
]
X
.
L
u
,
e
t
a
l.
,
“
Re
late
d
-
k
e
y
s
e
c
u
rit
y
f
o
r
h
y
b
rid
e
n
c
r
y
p
ti
o
n
.
In
In
f
o
rm
a
ti
o
n
S
e
c
u
rit
y
,
S
p
rin
g
e
r
In
tern
a
ti
o
n
a
l
P
u
b
l
ish
i
n
g
,
p
p
.
1
9
-
32
,
2
0
1
4
.
[1
4
]
H.
Kw
o
n
,
e
t
a
l.
,
“
S
e
c
u
re
a
u
th
e
n
ti
c
a
ti
o
n
u
si
n
g
c
ip
h
e
rtex
t
p
o
li
c
y
a
tt
rib
u
te
-
b
a
se
d
e
n
c
ry
p
ti
o
n
in
m
o
b
il
e
m
u
lt
i
-
h
o
p
n
e
tw
o
rk
s
,
”
M
u
lt
ime
d
ia
T
o
o
ls
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
p
p
.
1
-
15
,
2
0
1
6
.
[1
5
]
R.
L
.
Riv
e
st
,
e
t
a
l.
,
“
On
b
re
a
k
in
g
a
h
u
f
fm
a
n
c
o
d
e
,
”
in
Pro
c
.
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
fo
rm
a
t
io
n
T
h
e
o
ry
,
v
o
l
/i
ss
u
e
:
42
(
3
)
,
1
9
9
6
.
[1
6
]
N.
L
e
e
,
e
t
a
l.
,
“
P
o
w
e
r
c
o
n
tro
l
f
o
r
D2
D
u
n
d
e
rlai
d
c
e
ll
u
lar
n
e
tw
o
rk
s:
M
o
d
e
li
n
g
,
a
lg
o
rit
h
m
s,
a
n
d
a
n
a
l
y
sis
,
”
S
e
lec
ted
Are
a
s in
C
o
mm
u
n
ic
a
ti
o
n
s,
IE
EE
J
o
u
rn
a
l
o
n
,
v
o
l/
issu
e
:
3
3
(
1
),
p
p
.
1
-
13
,
2
0
1
5
.
[1
7
]
Y.
L
iu
,
e
t
a
l.
,
“
S
e
c
u
re
D2
D
c
o
m
m
u
n
ica
ti
o
n
in
larg
e
-
sc
a
le
c
o
g
n
it
iv
e
c
e
ll
u
lar
n
e
tw
o
r
k
s
w
it
h
w
irele
ss
p
o
w
e
r
tran
sf
e
r
,”
i
n
Co
mm
u
n
ic
a
ti
o
n
s (
ICC),
2
0
1
5
IEE
E
In
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
4
3
0
9
-
4
3
1
4
,
2
0
1
5
.
[1
8
]
H.
Kw
o
n
,
e
t
a
l.
,
“
S
e
c
u
re
a
u
th
e
n
ti
c
a
ti
o
n
u
si
n
g
c
ip
h
e
rtex
t
p
o
li
c
y
a
tt
rib
u
te
-
b
a
se
d
e
n
c
ry
p
ti
o
n
in
m
o
b
il
e
m
u
lt
i
-
h
o
p
n
e
tw
o
rk
s
,
”
M
u
lt
ime
d
ia
T
o
o
ls
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
p
p
.
1
-
15
,
2
0
1
6
.
[1
9
]
S.
Na
g
a
ra
j,
e
t
a
l.
,
“
A
Bio
-
Cr
y
p
to
P
r
o
to
c
o
l
f
o
r
P
a
ss
w
o
r
d
P
r
o
tec
ti
o
n
Us
in
g
ECC
,”
Bu
ll
e
ti
n
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
In
f
o
rm
a
ti
c
s
,
v
o
l/
issu
e
:
4
(
1
),
p
p
.
67
-
72
,
2
0
1
5
.
[2
0
]
C.
M
e
sh
ra
m
,
“
Disc
re
te
L
o
g
a
rit
h
m
a
n
d
In
teg
e
r
F
a
c
to
riza
ti
o
n
u
si
n
g
ID
-
b
a
se
d
En
c
ry
p
ti
o
n
,”
Bu
ll
e
ti
n
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
I
n
fo
rm
a
ti
c
s
,
v
o
l/
issu
e
:
4
(
2
),
p
p
.
1
6
0
-
1
6
8
,
2
0
1
5
.
[2
1
]
T
.
N.
Ba
b
u
,
e
t
a
l.
,
“
Orth
o
L
in
e
a
r
F
e
e
d
b
a
c
k
S
h
if
t
Re
g
ister
Cr
y
p
to
g
ra
p
h
ic
S
y
ste
m
,”
J
o
u
rn
a
l
o
f
T
e
lem
a
ti
c
s
a
n
d
In
fo
rm
a
t
ics
,
v
o
l/
issu
e
:
3
(
2
),
2
0
1
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.