I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
41
,
No
.
3
,
Ma
r
ch
20
2
6
,
p
p
.
1
1
3
4
~
1
1
4
0
I
SS
N:
2
502
-
4
7
52
,
DOI
: 1
0
.
1
1
5
9
1
/ijee
cs
.v
41
.
i
3
.
pp
1
1
3
4
-
1
1
4
0
1134
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs
.
ia
esco
r
e.
co
m
Desig
n and
imple
menta
tion o
f
nov
el encryptio
n
archi
tect
u
re
using
mix
co
lumn
wit
h
nov
el adder
Ra
dh
a
Appi
s
et
t
y
,
M
un
u
s
wa
m
y
Siv
a
K
um
a
r
D
e
p
a
r
t
me
n
t
o
f
El
e
c
t
r
o
n
i
c
s a
n
d
C
o
mm
u
n
i
c
a
t
i
o
n
En
g
i
n
e
e
r
i
n
g
,
K
o
n
e
r
u
La
k
s
h
mai
a
h
Ed
u
c
a
t
i
o
n
F
o
u
n
d
a
t
i
o
n
,
A
n
d
h
r
a
P
r
a
d
e
s
h
,
I
n
d
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ap
r
5
,
2
0
2
4
R
ev
is
ed
Sep
2
2
,
2
0
2
5
Acc
ep
ted
Dec
1
3
,
2
0
2
5
Dig
it
a
l
i
n
fo
rm
a
ti
o
n
is
e
x
trem
e
ly
sim
p
le
to
p
r
o
c
e
ss
th
e
se
d
a
y
s,
b
u
t
it
c
a
n
b
e
a
c
c
e
s
se
d
b
y
u
n
a
u
th
o
rize
d
p
e
o
p
le.
Cry
p
to
g
ra
p
h
y
is
o
n
e
o
f
th
e
m
o
st
e
ffe
c
ti
v
e
a
n
d
wi
d
e
ly
u
se
d
m
e
th
o
d
s
f
o
r
d
a
t
a
se
c
u
rit
y
,
to
p
ro
tec
t
th
is
in
f
o
rm
a
ti
o
n
.
T
h
e
c
ry
p
to
g
ra
p
h
y
tec
h
n
iq
u
e
s
a
re
b
e
c
o
m
in
g
p
o
p
u
lar
a
n
d
wi
d
e
ly
a
d
o
p
t
e
d
d
u
e
t
o
th
e
se
c
u
rit
y
th
re
a
ts
d
u
ri
n
g
d
a
t
a
tran
sm
issio
n
.
A
n
e
ss
e
n
ti
a
l
p
a
rt
o
f
a
c
ry
p
to
g
ra
p
h
ic
sy
ste
m
,
c
ry
p
t
o
g
ra
p
h
y
a
l
g
o
rit
h
m
s
a
re
d
e
v
e
lo
p
e
d
a
n
d
imp
lem
e
n
ted
to
in
c
re
a
se
d
a
t
a
se
c
u
rit
y
.
T
h
e
d
e
v
e
lo
p
e
rs
o
f
th
e
se
c
ry
p
to
g
ra
p
h
ic
a
l
g
o
rit
h
m
s
to
o
k
in
to
c
o
n
sid
e
ra
ti
o
n
a
d
d
it
i
o
n
a
l
p
a
ra
m
e
ters
,
in
c
lu
d
in
g
sp
e
e
d
,
re
so
u
rc
e
c
o
n
su
m
p
ti
o
n
,
re
li
a
b
il
it
y
,
u
sa
g
e
ty
p
e
,
a
n
d
flex
ib
il
it
y
,
e
v
e
n
if
th
e
ir
p
r
ima
ry
g
o
a
ls
a
re
c
o
n
fi
d
e
n
ti
a
li
t
y
,
i
n
teg
rit
y
,
a
n
d
a
u
th
e
n
ti
c
it
y
.
It
’
s
imp
o
rtan
t
t
o
u
n
d
e
rsta
n
d
t
h
a
t
e
a
c
h
c
o
m
p
o
n
e
n
t
a
ffe
c
ts
th
e
wa
y
th
a
t
a
c
r
y
p
t
o
g
ra
p
h
ic
tec
h
n
i
q
u
e
is
d
e
si
g
n
e
d
.
He
n
c
e
,
t
h
is
a
n
a
l
y
sis
p
re
se
n
ts
th
e
d
e
sig
n
a
n
d
imp
lem
e
n
tatio
n
o
f
a
n
o
v
e
l
e
n
c
ry
p
ti
o
n
a
rc
h
it
e
c
tu
re
u
sin
g
m
ix
c
o
lu
m
n
wit
h
a
n
o
v
e
l
a
d
d
e
r
.
T
h
e
n
o
v
e
l
e
n
c
ry
p
ti
o
n
a
lg
o
rit
h
m
is
d
e
sig
n
e
d
f
o
r
a
n
e
n
c
r
y
p
t
io
n
a
rc
h
it
e
c
tu
re
(
EA
)
with
m
ix
c
o
lu
m
n
u
si
n
g
n
o
v
e
l
a
d
d
e
r.
T
h
i
s
n
o
v
e
l
e
n
c
ry
p
ti
o
n
a
lg
o
rit
h
m
will
a
tt
a
in
b
e
tt
e
r
se
c
u
ri
ty
a
n
d
p
e
rfo
rm
a
n
c
e
.
K
ey
w
o
r
d
s
:
Ad
v
an
ce
d
e
n
cr
y
p
tio
n
s
tan
d
ar
d
Ar
ith
m
etic
o
p
er
atio
n
s
C
r
y
p
to
g
r
ap
h
y
Data
s
ec
u
r
ity
E
n
cr
y
p
tio
n
ar
ch
itectu
r
e
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
R
ad
h
a
Ap
p
is
etty
Dep
ar
tm
en
t o
f
E
lectr
o
n
ics an
d
C
o
m
m
u
n
icatio
n
E
n
g
in
ee
r
i
n
g
,
Ko
n
er
u
L
a
k
s
h
m
aiah
E
d
u
ca
tio
n
Fo
u
n
d
atio
n
An
d
h
r
a
Pra
d
esh
,
I
n
d
ia
E
m
ail:
r
ee
th
u
.
a@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
Data
s
ec
u
r
ity
in
n
etwo
r
k
s
is
b
ec
o
m
in
g
a
n
im
p
o
r
tan
t
is
s
u
e
th
ese
d
ay
s
.
Giv
en
th
e
s
p
ee
d
at
wh
ich
tech
n
o
lo
g
y
is
d
ev
elo
p
in
g
,
th
e
im
p
o
r
tan
ce
o
f
d
ata
in
teg
r
ity
a
n
d
co
n
f
i
d
en
tiality
,
d
ata
ex
ch
a
n
g
ed
o
v
e
r
n
etwo
r
k
s
is
b
ec
o
m
in
g
m
o
r
e
an
d
m
o
r
e
im
p
o
r
tan
t.
E
n
h
an
cin
g
th
e
c
u
r
r
en
t
m
eth
o
d
s
a
n
d
a
p
p
r
o
a
c
h
es
to
u
n
d
er
s
tan
d
co
m
m
u
n
icatio
n
f
ea
tu
r
es in
th
e
p
r
esen
ce
o
f
i
n
tr
o
d
u
ce
r
h
ac
k
in
g
tech
n
o
lo
g
ies ar
e
n
ec
ess
ar
y
d
u
e
to
s
ec
u
r
ity
r
is
k
s
o
n
d
ata
tr
an
s
f
er
.
I
n
s
im
p
le
ter
m
s
,
cr
y
p
to
g
r
ap
h
y
is
th
e
s
cien
ce
o
f
p
r
o
tectin
g
co
m
m
u
n
i
ca
tio
n
s
d
ata
f
r
o
m
ex
ter
n
al
th
r
ea
ts
.
I
t is also
an
ef
f
ec
tiv
e
m
eth
o
d
f
o
r
p
r
o
tectin
g
au
th
en
ticatio
n
,
d
ata
in
teg
r
ity
,
an
d
co
n
f
id
en
tiality
.
C
o
n
s
eq
u
en
tly
,
in
f
o
r
m
atio
n
is
s
ec
u
r
ed
u
s
in
g
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es
s
o
th
at
o
n
ly
t
h
o
s
e
with
th
e
p
r
o
p
er
au
th
o
r
izatio
n
ca
n
d
ec
o
d
e
it [
1
]
.
Nu
m
er
o
u
s
m
o
d
e
r
n
tech
n
o
lo
g
y
ap
p
licatio
n
s
,
lik
e
co
m
p
u
te
r
p
ass
wo
r
d
s
,
Au
to
m
ated
teller
m
ac
h
in
e
(
AT
M
)
ca
r
d
s
,
an
d
e
-
co
m
m
er
c
e,
r
eq
u
ir
e
cr
y
p
to
g
r
ap
h
y
.
Usi
n
g
a
cr
y
p
to
g
r
ap
h
ic
ap
p
r
o
ac
h
,
r
eg
u
lar
tex
t
ca
n
b
e
tr
an
s
f
o
r
m
ed
in
to
ci
p
h
er
tex
t
to
en
ab
le
s
ec
r
et
wr
itin
g
.
Data
s
en
t
an
d
r
ec
eiv
ed
o
v
e
r
n
etwo
r
k
s
is
p
r
o
tecte
d
;
t
h
is
is
th
e
p
r
im
a
r
y
o
b
jectiv
e
o
f
s
ec
u
r
ity
.
An
ef
f
icien
t
en
cr
y
p
tio
n
m
eth
o
d
is
r
eq
u
i
r
ed
t
o
en
h
an
c
e
d
ata
s
ec
u
r
ity
an
d
ma
in
tain
co
n
f
id
en
tiality
[
2
]
.
T
h
e
m
o
s
t
im
p
o
r
tan
t
p
ar
t
o
f
an
in
f
o
r
m
atio
n
s
ec
u
r
ity
s
y
s
tem
is
cr
y
p
to
g
r
ap
h
y
.
I
t
p
r
o
v
id
es
d
ata
in
teg
r
ity
,
ac
c
u
r
ac
y
,
an
d
s
ec
u
r
ity
[
3
]
.
T
h
er
e
ar
e
v
ar
io
u
s
cr
y
p
to
g
r
a
p
h
ic
tech
n
iq
u
es
th
at
p
r
o
v
id
e
th
e
p
o
s
s
ib
ilit
y
o
f
v
er
if
y
in
g
p
a
s
s
wo
r
d
s
a
n
d
tr
ad
e
an
d
in
s
tall
m
en
t
to
p
r
iv
ate
ex
ch
an
g
es.
C
r
y
p
to
g
r
a
p
h
y
is
v
ital
f
o
r
s
ec
u
r
e
in
ter
c
h
an
g
es;
it
is
n
o
t
en
o
u
g
h
with
o
u
t
s
o
m
eo
n
e
’
s
h
elp
.
T
h
e
s
af
e
eq
u
iv
alen
t
tech
n
iq
u
e
an
aly
s
is
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
n
o
ve
l e
n
cryp
tio
n
a
r
ch
itectu
r
e
u
s
in
g
m
ix
c
o
lu
mn
…
(
R
a
d
h
a
A
p
p
is
etty
)
1135
allo
ws
th
e
m
ess
ag
e
’
s
s
en
d
er
an
d
d
esig
n
ate
d
r
ec
eiv
e
r
to
v
i
ew
its
co
n
ten
t.
E
n
c
o
d
in
g
an
d
d
ec
o
d
i
n
g
p
lain
tex
t
m
ess
ag
es,
s
u
ch
as
em
ails
,
i
s
o
n
e
o
f
th
e
p
r
im
ar
y
u
s
es
o
f
cr
y
p
to
g
r
ap
h
y
in
elec
tr
o
n
ic
co
m
m
u
n
icatio
n
[
4
]
.
T
wo
ca
teg
o
r
ies
o
f
cr
y
p
to
g
r
ap
h
y
ex
is
t:
i)
Sy
m
m
etr
ic
k
ey
cr
y
p
to
g
r
ap
h
y
:
i
n
th
is
m
eth
o
d
,
t
h
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es
u
tili
ze
th
e
s
am
e
k
ey
;
ii)
Asy
m
m
etr
ic
k
ey
cr
y
p
to
g
r
ap
h
y
:
in
th
is
m
et
h
o
d
,
t
h
e
p
u
b
lic
k
ey
an
d
p
r
i
v
ate
k
ey
a
r
e
u
s
ed
f
o
r
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es,
r
esp
ec
tiv
ely
[
5
]
.
E
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
tech
n
iq
u
es
ca
n
b
e
u
s
ed
to
s
ec
u
r
e
tex
t
f
iles
o
n
a
co
m
p
u
ter
.
On
e
o
f
th
e
m
ain
to
o
ls
f
o
r
en
s
u
r
in
g
th
e
s
e
cu
r
ity
o
f
in
f
o
r
m
atio
n
is
cr
y
p
to
g
r
ap
h
y
.
I
t
o
f
f
er
s
d
ig
ital
s
ig
n
atu
r
e,
au
th
e
n
ticatio
n
,
s
ec
r
et
s
u
b
-
s
to
r
ag
e,
s
y
s
tem
s
ec
u
r
ity
,
a
n
d
o
th
er
f
ea
tu
r
es
i
n
ad
d
itio
n
to
g
u
a
r
an
teein
g
th
e
co
n
f
id
en
tiality
o
f
th
e
in
f
o
r
m
atio
n
.
I
n
o
r
d
er
to
g
u
ar
d
ag
ain
s
t
in
f
o
r
m
atio
n
m
a
n
ip
u
la
tio
n
,
f
o
r
g
er
y
,
a
n
d
co
u
n
ter
f
eiti
n
g
,
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
s
o
lu
tio
n
ca
n
g
u
ar
an
tee
in
f
o
r
m
atio
n
co
n
f
id
en
tiality
,
in
teg
r
ity
,
an
d
ce
r
tai
n
ty
.
C
r
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es
ca
n
av
o
i
d
d
ata
lo
s
s
o
r
c
y
b
er
th
ef
t
i
n
a
n
u
m
b
e
r
o
f
ap
p
licatio
n
s
,
in
clu
d
in
g
s
o
cial
n
etwo
r
k
in
g
,
o
n
lin
e
tr
an
s
ac
tio
n
s
,
s
o
cial
s
ec
u
r
ity
,
a
n
d
m
an
a
g
in
g
s
m
ar
t a
p
p
licatio
n
s
th
r
o
u
g
h
th
e
in
te
r
n
et
o
f
th
in
g
s
(
I
o
T
)
[
6
]
.
T
h
e
s
tu
d
y
o
f
p
r
o
tectin
g
co
m
m
u
n
icatio
n
s
an
d
m
ess
ag
es
co
n
ten
t
is
k
n
o
wn
as
cr
y
p
to
g
r
ap
h
y
.
T
h
e
g
o
al
o
f
cr
y
p
ta
n
aly
s
is
,
th
e
o
th
er
s
u
b
d
is
cip
lin
e,
is
to
d
ef
ea
t
o
r
co
m
p
r
o
m
is
e
th
e
s
ec
u
r
ity
th
at
cr
y
p
to
g
r
ap
h
y
h
as
p
r
o
v
id
e
d
.
T
h
e
b
asis
o
f
b
o
th
cr
y
p
tan
aly
s
is
an
d
cr
y
p
to
g
r
ap
h
y
is
m
ath
em
atics.
E
n
cr
y
p
tio
n
,
o
r
th
e
p
r
o
ce
s
s
o
f
tr
an
s
f
o
r
m
in
g
d
ata
an
d
in
f
o
r
m
atio
n
in
to
a
f
o
r
m
th
a
t
ca
n
n
o
t
b
e
u
s
ed
b
y
s
o
m
e
o
n
e
wh
o
is
n
o
t
a
u
th
o
r
ized
to
ac
ce
s
s
it,
is
f
r
eq
u
en
tly
co
n
n
ec
ted
with
cr
y
p
t
o
g
r
a
p
h
y
[
7
]
.
His
to
r
ically
,
im
p
o
r
tan
t
m
ess
ag
es
f
o
r
d
i
p
lo
m
atic
an
d
m
ilit
ar
y
co
m
m
u
n
icatio
n
s
wer
e
en
cr
y
p
te
d
to
en
s
u
r
e
th
eir
p
r
o
t
ec
tio
n
[
8
]
.
E
n
cr
y
p
tio
n
is
th
e
p
r
o
ce
s
s
o
f
s
c
r
am
b
lin
g
d
ata,
in
clu
d
in
g
tex
t,
im
ag
es,
au
d
io
,
v
id
eo
,
an
d
o
th
e
r
ty
p
es o
f
co
n
ten
t,
to
m
ak
e
it
u
n
r
ea
d
ab
l
e,
in
v
is
ib
le,
o
r
m
ea
n
in
g
less
d
u
r
in
g
tr
a
n
s
m
is
s
io
n
o
r
s
to
r
ag
e
.
Ma
in
tain
in
g
d
ata
s
ec
u
r
ity
f
r
o
m
h
ac
k
er
s
is
th
e
p
r
im
ar
y
g
o
al
o
f
cr
y
p
to
g
r
a
p
h
y
.
Dec
r
y
p
tio
n
r
es
to
r
es
th
e
o
r
ig
in
al
d
ata
f
r
o
m
en
cr
y
p
ted
d
ata
in
th
e
o
p
p
o
s
ite
d
ir
ec
tio
n
[
9
]
.
C
u
r
r
en
t
cr
y
p
to
g
r
ap
h
y
aim
s
to
ac
h
iev
e
th
e
f
o
llo
win
g
f
o
u
r
g
o
als:
i.
)
C
o
n
f
id
en
tiality
:
th
e
i
n
f
o
r
m
atio
n
ca
n
n
o
t
b
e
an
aly
ze
d
b
y
s
o
m
e
o
n
e
f
o
r
wh
o
m
it
was
n
o
t
in
t
en
d
ed
;
ii.
)
I
n
teg
r
ity
:
th
e
i
n
f
o
r
m
atio
n
ca
n
n
o
t
b
e
ch
an
g
ed
wh
ile
b
ei
n
g
s
to
r
ed
o
r
tr
an
s
m
itted
b
etwe
en
th
e
s
en
d
er
an
d
th
e
in
ten
d
ed
r
ec
ip
ie
n
t
with
o
u
t
th
e
ch
an
g
e
b
ein
g
d
is
co
v
er
e
d
;
iii.
)
No
n
-
r
ep
u
d
iatio
n
:
th
e
in
f
o
r
m
atio
n
’
s
cr
ea
to
r
o
r
s
en
d
er
ca
n
n
o
t
later
ch
an
g
e
th
ei
r
in
ten
tio
n
s
;
iv
.
)
Au
th
e
n
ti
ca
tio
n
:
th
e
s
en
d
er
an
d
r
ec
ip
ie
n
t
ca
n
v
er
if
y
ea
c
h
o
th
e
r
’
s
id
en
titi
es
th
e
in
f
o
r
m
atio
n
’
s
o
r
ig
in
,
a
n
d
d
esti
n
atio
n
.
C
r
y
p
to
g
r
ap
h
y
al
g
o
r
ith
m
s
a
r
e
u
s
ed
to
ac
h
iev
e
s
ev
er
al
o
b
jectiv
es,
in
clu
d
in
g
s
ec
u
r
ity
o
r
co
n
f
id
en
tiality
,
in
teg
r
ity
,
an
d
au
th
en
ticity
.
W
h
en
d
ev
elo
p
i
n
g
th
ese
alg
o
r
ith
m
s
,
s
ev
er
al
f
ac
to
r
s
n
ee
d
to
b
e
tak
en
in
to
co
n
s
id
er
atio
n
,
in
clu
d
in
g
s
p
ee
d
,
r
eso
u
r
ce
co
n
s
u
m
p
tio
n
,
an
d
u
s
ag
e
ty
p
e.
T
h
u
s
,
s
atis
f
y
in
g
ea
ch
o
f
th
ese
r
eq
u
ir
em
en
ts
at
th
e
s
am
e
tim
e
wh
en
d
esig
n
in
g
an
alg
o
r
ith
m
is
d
if
f
icu
lt
an
d
o
f
t
en
im
p
o
s
s
i
b
le.
Mo
s
t
alg
o
r
ith
m
s
ca
n
b
e
cr
ac
k
ed
if
d
if
f
er
en
t
g
o
als
ar
e
tak
en
in
to
c
o
n
s
id
er
atio
n
wh
e
n
d
e
v
elo
p
in
g
th
eir
d
esig
n
,
an
d
i
f
th
e
attac
k
er
h
as th
e
n
ec
ess
ar
y
tim
e,
r
eso
u
r
ce
s
,
an
d
d
esire
,
th
ey
ca
n
r
e
v
ea
l th
e
in
f
o
r
m
atio
n
[
1
0
].
I
n
d
ata
co
m
m
u
n
icatio
n
,
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es
ar
e
u
tili
ze
d
to
p
r
o
tect
th
e
d
ata.
T
h
e
m
o
s
t
wid
ely
u
s
ed
cr
y
p
to
g
r
ap
h
ic
ap
p
r
o
ac
h
e
s
ar
e
th
e
d
ata
en
cr
y
p
tio
n
s
tan
d
ar
d
(
DE
S),
t
r
ip
le
DE
S (
3
DE
S)
[
1
0
]
,
ellip
tic
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
[
1
0
]
.
T
h
ese
d
ay
s
,
a
n
u
m
b
er
o
f
tech
n
iq
u
es
h
a
v
e
b
ee
n
d
e
v
elo
p
ed
to
in
cr
ea
s
e
co
m
p
u
tin
g
r
eso
u
r
ce
u
s
e
an
d
s
ec
u
r
ity
at
th
e
s
am
e
tim
e
[
1
0
].
T
h
is
p
r
o
b
lem
ca
n
b
e
r
eso
lv
ed
u
s
in
g
ex
is
tin
g
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es
(
s
u
ch
d
ig
ital sig
n
atu
r
es o
r
m
es
s
ag
e
au
th
en
ticatio
n
c
o
d
es),
b
u
t th
er
e
m
ig
h
t
b
e
ad
d
itio
n
al
ch
a
llen
g
es [
1
1
].
Ho
wev
er
,
th
e
ad
v
an
ce
e
n
c
r
y
p
tio
n
s
tan
d
ar
d
(
AE
S
)
is
r
eg
ar
d
ed
as
th
e
b
est
o
p
tio
n
b
ec
a
u
s
e
o
f
its
ad
v
an
tag
es
o
v
e
r
th
e
o
th
e
r
s
.
T
h
e
ad
v
an
ce
e
n
cr
y
p
tio
n
s
tan
d
ar
d
AE
S
is
a
s
y
m
m
etr
ic
cr
y
p
to
g
r
ap
h
y
s
tan
d
a
r
d
th
at
was
ap
p
r
o
v
ed
b
y
th
e
Natio
n
al
I
n
s
titu
te
o
f
Stan
d
ar
d
s
a
n
d
T
ec
h
n
o
lo
g
y
(
NI
ST)
f
o
r
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
o
f
d
ata
b
lo
ck
s
.
A
s
a
r
esu
lt
o
f
t
h
e
AE
S
’
s
h
ig
h
lev
el
o
f
s
ec
u
r
ity
,
q
u
ick
h
ar
d
war
e
an
d
s
o
f
twar
e
im
p
lem
en
tatio
n
s
,
v
ar
i
o
u
s
ess
en
tial a
p
p
licatio
n
s
th
at
r
eq
u
i
r
e
d
ep
en
d
a
b
le
s
y
s
tem
s
an
d
ar
ch
it
ec
tu
r
es,
it is
wid
ely
u
s
ed
[
12
]
.
On
e
o
f
th
e
k
ey
e
lem
en
ts
an
d
th
e
o
n
e
in
ch
ar
g
e
o
f
d
if
f
u
s
io
n
in
t
h
e
AE
S
is
th
e
Mix
C
o
lu
m
n
s
tr
an
s
f
o
r
m
atio
n
.
I
t
is
s
ig
n
if
ica
n
t
in
r
elatio
n
to
th
e
ci
p
h
er
’
s
wid
e
tr
ail
ap
p
r
o
ac
h
.
H
o
wev
er
,
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
o
f
AE
S is
r
eso
u
r
ce
-
s
en
s
itiv
e
an
d
ca
n
b
e
s
lo
w
at
lo
w
-
en
d
d
ev
ices.
A
lig
h
tweig
h
t
s
ec
u
r
e
m
ed
ical
im
ag
e
e
n
cr
y
p
tio
n
alg
o
r
ith
m
is
d
esig
n
ed
to
m
o
n
ito
r
th
e
h
ea
lth
d
ata
r
em
o
tely
.
T
h
is
m
o
d
el
em
p
l
o
y
s
a
weig
h
ted
s
h
if
t
ap
p
r
o
x
im
ate
ad
d
er
(
W
SAA
)
b
ased
en
cr
y
p
ti
o
n
lo
g
ic.
T
h
e
d
ata
is
en
cr
y
p
ted
u
s
in
g
a
2
5
6
-
b
it
k
ey
,
wh
ich
in
cr
ea
s
es
th
e
en
c
r
y
p
tio
n
’
s
r
esis
tan
ce
to
v
ar
io
u
s
attac
k
s
.
T
h
is
m
o
d
el
p
er
f
o
r
m
an
ce
is
v
alid
ated
f
o
r
i
ts
v
er
tical,
h
o
r
izo
n
tal,
en
tr
o
p
y
,
k
e
y
s
p
ac
e
,
s
en
s
itiv
ity
,
h
is
to
g
r
am
an
d
d
ia
g
o
n
al
co
r
r
elatio
n
.
T
h
e
o
b
tain
ed
r
esu
l
ts
in
d
icate
d
th
at
th
is
m
o
d
el
h
a
d
less
co
m
p
u
tatio
n
al
co
m
p
lex
i
ty
[
1
3
].
Usi
n
g
th
e
AE
S
an
d
ellip
tic
cu
r
v
e
cr
y
p
to
g
r
a
p
h
y
(
E
C
C
)
alg
o
r
ith
m
s
,
a
two
-
lev
el
c
r
y
p
to
g
r
ap
h
ic
tech
n
iq
u
e
is
im
p
lem
e
n
ted
t
o
im
p
r
o
v
e
d
ata
s
ec
u
r
ity
in
clo
u
d
c
o
m
p
u
tin
g
.
W
ith
th
e
u
s
e
o
f
two
-
le
v
el
cr
y
p
to
g
r
ap
h
y
tech
n
iq
u
es
,
s
y
m
m
etr
ic
AE
S
an
d
asy
m
m
etr
ic
E
C
C
,
th
is
s
tu
d
y
s
u
g
g
ests
an
im
p
r
o
v
ed
d
ata
s
ec
u
r
ity
m
o
d
el.
T
h
is
m
eth
o
d
to
o
k
in
to
c
o
n
s
id
er
atio
n
th
e
a
m
o
u
n
t
o
f
tim
e
n
ee
d
e
d
to
co
m
p
lete
cr
y
p
to
g
r
ap
h
ic
o
p
er
atio
n
s
,
im
p
r
o
v
ed
d
ata
s
ec
u
r
ity
a
g
ain
s
t
h
ac
k
e
r
s
b
y
p
r
ev
en
tin
g
th
em
f
r
o
m
o
b
tain
in
g
th
e
ac
tu
al
d
ata,
en
ab
le
d
d
ata
co
n
f
id
en
tiality
an
d
in
teg
r
ity
,
in
cr
ea
s
ed
s
p
ee
d
b
y
u
s
in
g
s
m
aller
E
C
C
k
ey
s
i
n
th
e
cr
y
p
to
g
r
ap
h
ic
p
r
o
ce
s
s
,
an
d
r
aise u
s
er
tr
u
s
t le
v
els f
o
r
th
e
clo
u
d
c
o
m
p
u
tin
g
p
latf
o
r
m
[
1
4
].
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
41
,
No
.
3
,
Ma
r
ch
20
2
6
:
1
1
3
4
-
1
1
4
0
1136
An
im
p
lem
en
tatio
n
o
f
an
alg
o
r
ith
m
f
o
r
cr
y
p
to
g
r
a
p
h
y
u
s
in
g
ad
d
er
s
an
d
s
u
b
tr
a
cto
r
s
is
s
h
o
wn
.
T
h
e
im
p
lem
en
tatio
n
o
f
a
cr
y
p
to
g
r
a
p
h
y
alg
o
r
ith
m
u
s
in
g
ad
d
er
s
an
d
s
u
b
tr
ac
to
r
s
is
p
r
esen
ted
in
t
h
is
p
ap
er
.
T
h
e
m
o
s
t
d
if
f
icu
lt
co
m
p
o
n
e
n
t
o
f
n
etwo
r
k
ap
p
licatio
n
s
,
th
e
i
n
ter
n
et,
a
n
d
d
ata
co
m
m
u
n
icatio
n
s
y
s
tem
s
th
ese
d
ay
s
is
d
ata
s
ec
u
r
ity
.
T
h
e
b
ett
er
o
p
tio
n
i
s
p
r
o
v
id
ed
b
y
cr
y
p
to
g
r
ap
h
y
,
wh
ich
u
s
es
v
ar
io
u
s
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
tech
n
iq
u
es
to
tr
an
s
f
o
r
m
p
lain
tex
t
in
to
a
cip
h
e
r
f
o
r
m
w
h
ile
p
r
o
tectin
g
p
r
i
v
ac
y
,
in
teg
r
it
y
,
an
d
au
th
e
n
ticity
.
T
h
e
r
esu
lts
o
f
th
e
s
im
u
latio
n
in
d
icate
th
at
th
e
n
ew
ap
p
r
o
ac
h
h
as
an
ex
ce
llen
t
p
o
ten
tia
l
f
o
r
s
u
cc
ess
.
T
h
e
ad
d
er
’
s
s
tr
u
ctu
r
al
c
h
an
g
es a
llo
wed
th
em
to
ac
h
iev
e
a
lo
w
-
p
o
wer
an
d
lo
w
-
d
elay
p
r
o
ce
s
s
[
1
5
].
A
m
o
d
el
was
d
esig
n
ed
to
im
p
r
o
v
e
t
h
e
id
e
n
tity
-
b
ased
f
u
lly
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
(
I
B
FHE
)
wh
ich
is
d
esig
n
ed
wh
ile
co
m
b
in
in
g
th
e
id
en
tity
-
b
ased
e
n
cr
y
p
ti
o
n
(
I
B
E
)
a
n
d
lattice
-
b
ased
cr
y
p
to
g
r
ap
h
y
.
Utilizin
g
th
e
Mic
cian
cio
’
s
in
n
o
v
ativ
e
tr
ap
d
o
o
r
an
d
Peik
er
t
’
s
p
o
wer
f
u
l
Alp
er
in
-
Sh
er
if
f
an
d
s
im
p
le
n
o
is
e
m
o
d
el
ev
alu
atio
n
en
h
a
n
ce
d
th
e
p
e
r
f
o
r
m
an
ce
o
f
I
B
F
HE
.
Fu
r
th
er
m
o
r
e,
a
m
ask
in
g
m
o
d
el
was
cr
ea
ted
in
o
r
d
er
t
o
cr
ea
te
an
ef
f
icien
t
m
u
lti
-
id
en
t
ity
f
u
lly
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
(
MI
FHE
)
tech
n
iq
u
e.
T
h
is
was
ac
h
iev
ed
b
y
ex
p
an
d
i
n
g
th
e
cip
h
e
r
tex
ts
f
r
o
m
a
s
in
g
le
i
d
en
tity
k
ey
t
o
an
ex
p
an
d
e
d
u
n
d
er
th
e
c
o
m
b
i
n
e
d
k
ey
,
all
o
win
g
th
e
cip
h
er
tex
t to
b
e
ev
alu
ate
d
h
o
m
o
m
o
r
p
h
ically
u
n
d
er
d
if
f
er
e
n
t id
en
titi
es [
16
].
A
r
ev
er
s
ib
le
d
ata
h
id
in
g
in
e
n
cr
y
p
ted
d
o
m
ain
(
R
DH
-
ED
)
f
r
am
ewo
r
k
b
ased
o
n
f
u
lly
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
en
ca
p
s
u
lated
-
d
if
f
e
r
en
ce
ex
p
an
s
io
n
(
FHEE
-
DE
)
.
B
o
o
ts
tr
ap
p
in
g
a
n
d
k
ey
s
witc
h
in
g
m
et
h
o
d
s
wer
e
in
tr
o
d
u
ce
d
f
o
r
co
n
tr
o
llin
g
th
e
ex
ten
s
io
n
o
f
cip
h
er
tex
t
a
n
d
h
o
m
o
m
o
r
p
h
ic
d
ec
r
y
p
tio
n
f
ailu
r
e.
Key
-
s
witch
in
g
-
b
ased
least
-
s
ig
n
if
ican
t
-
b
it
,
o
r
KS
-
L
SB
,
was
d
ev
elo
p
ed
to
en
ab
le
d
ir
ec
t
d
ata
ex
tr
ac
tio
n
f
r
o
m
en
cr
y
p
te
d
d
o
m
ain
s
with
o
u
t
r
e
q
u
ir
in
g
th
e
u
s
e
o
f
a
p
r
iv
ate
k
ey
.
W
ith
o
u
t
u
tili
zin
g
th
e
p
r
iv
ate
k
e
y
,
t
h
e
u
s
er
,
s
u
cc
ess
f
u
l
in
d
ec
ip
h
er
in
g
th
e
cip
h
e
r
tex
t
th
a
t
th
e
s
er
v
er
p
r
o
v
id
ed
.
T
h
e
o
b
t
ain
ed
r
esu
lts
in
d
icate
d
th
at
th
e
p
r
esen
ted
m
o
d
el
r
ev
er
s
ib
ilit
y
an
d
em
b
ed
d
i
n
g
c
ap
ac
ity
wer
e
b
etter
th
a
n
ea
r
li
e
r
en
cr
y
p
tio
n
m
o
d
els [
1
7
].
T
h
e
m
ain
o
b
jectiv
e
was
to
d
es
ig
n
a
tr
u
s
ted
a
n
d
p
r
o
v
en
m
o
d
e
l
th
at
ca
n
o
f
f
er
au
th
e
n
ticated
e
n
cr
y
p
tio
n
(
AE
)
f
o
r
e
n
co
d
in
g
as
m
ap
p
i
n
g
th
e
m
ess
ag
ed
to
th
e
cu
r
v
e.
T
h
e
m
o
d
el
p
r
o
v
i
d
ed
th
e
a
n
aly
tical
r
esu
lts
,
wh
ich
ar
e
r
elate
d
to
th
e
s
ec
u
r
ity
r
eq
u
ir
em
en
ts
o
f
th
e
p
r
esen
te
d
m
o
d
el
a
g
ain
s
t
v
ar
io
u
s
en
c
r
y
p
tio
n
m
o
d
els.
I
n
ad
d
itio
n
,
a
co
m
p
ar
is
o
n
is
co
n
s
id
er
ed
b
etwe
en
p
r
esen
ted
m
o
d
el
an
d
p
r
e
v
io
u
s
m
o
d
el
is
to
v
alid
ate
th
e
p
er
f
o
r
m
an
ce
.
T
h
is
m
o
d
el
wa
s
o
u
tp
er
f
o
r
m
ed
o
th
e
r
m
o
d
el
in
ter
m
s
o
f
n
u
m
b
er
o
f
en
co
d
in
g
a
n
d
d
ec
o
d
i
n
g
o
p
er
atio
n
s
,
b
ein
g
r
esis
tan
t
to
a
ttack
s
[
18
].
T
wo
h
ar
d
war
e
d
esig
n
s
wer
e
o
p
tim
ized
to
ac
ce
ler
ate
th
e
o
p
e
r
atio
n
o
f
b
r
a
k
er
s
k
i/
f
an
-
v
er
ca
u
ter
en
(
B
FV
)
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
m
o
d
el
with
b
etter
p
er
f
o
r
m
an
ce
p
o
l
y
n
o
m
ial
m
u
ltip
lier
s
.
T
h
e
ac
ce
ler
ato
r
a
r
ch
itectu
r
e
was
o
p
tim
ized
t
o
ac
ce
ler
ate
th
e
s
im
p
le
e
n
cr
y
p
te
d
a
r
ith
m
e
tic
lib
r
ar
y
(
SEAL
)
wh
ich
was
d
ev
elo
p
e
d
b
y
a
cr
y
p
to
g
r
ap
h
y
r
esear
ch
g
r
o
u
p
.
T
h
e
h
ar
d
war
e
d
esig
n
s
ar
e
i
m
p
lem
en
ted
wh
ile
tar
g
etin
g
1
0
2
-
d
e
g
r
ee
p
o
ly
n
o
m
ials
with
8
-
b
it
co
ef
f
icien
ts
f
o
r
p
lain
tex
t
an
d
32
-
b
it
co
ef
f
icien
ts
f
o
r
cip
h
er
tex
t.
T
h
ese
m
o
d
els
ac
h
iev
ed
7
x
an
d
1
2
x
laten
cy
s
p
ee
d
-
ups
wh
ic
h
in
clu
d
es
in
p
u
t/o
u
tp
u
t
(
I
/O
)
o
p
er
atio
n
s
f
o
r
b
o
th
o
f
f
lo
ad
e
d
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
[
19
].
A
u
b
lo
ck
wh
ic
h
is
a
lig
h
tweig
h
t
cip
h
er
alg
o
r
ith
m
d
esig
n
ed
to
im
p
r
o
v
e
th
e
p
er
f
o
r
m
an
ce
o
f
en
cr
y
p
tio
n
as
well
as
d
ec
r
y
p
tio
n
.
Usi
n
g
s
eq
u
e
n
tial
cir
cu
its
in
a
s
im
u
latio
n
p
latf
o
r
m
u
tili
zin
g
9
0
n
m
tech
n
o
lo
g
y
,
th
e
th
r
o
u
g
h
p
u
t
o
f
b
o
th
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
ap
p
r
o
ac
h
ed
1
Gb
/s
.
W
i
th
im
p
r
o
v
ed
n
an
o
tech
n
o
lo
g
y
f
r
o
m
h
ar
d
war
e
v
en
d
o
r
s
,
th
is
m
o
d
el
m
ay
s
ee
p
er
f
o
r
m
a
n
ce
g
ai
n
s
o
f
m
o
r
e
th
a
n
two
-
f
o
l
d
im
p
r
o
v
em
e
n
t.
W
ith
lo
w
p
o
wer
co
n
s
u
m
p
tio
n
,
th
is
d
ev
ic
e
was
ab
le
to
attain
th
e
n
ec
ess
ar
y
d
eg
r
ee
o
f
co
m
m
u
n
icatio
n
p
er
f
o
r
m
a
n
ce
[
20
].
T
wo
n
ew
d
y
n
am
ic
s
ea
r
ch
ab
le
s
y
m
m
etr
ic
en
cr
y
p
tio
n
s
(
DSSE)
ar
e
d
esig
n
ed
f
o
r
s
ec
u
r
ity
an
d
r
o
b
u
s
tn
ess
(
SR
)
-
DSSEa
an
d
SR
−
DS
SEb
.
B
o
th
o
f
th
ese
m
eth
o
d
s
m
ain
tain
e
d
th
eir
r
o
b
u
s
tn
ess
in
th
e
f
ac
e
o
f
ir
r
atio
n
al
q
u
er
ies
wh
ile
ac
h
ie
v
in
g
T
y
p
e
I
−
-
b
ac
k
war
d
a
n
d
f
o
r
war
d
s
ec
u
r
ity
.
SR
−
DSS
Ea
h
as
b
etter
r
o
u
n
d
-
tr
ip
an
d
co
m
m
u
n
icatio
n
c
o
s
ts
th
an
SR
−
DSSEb
.
W
h
ile
th
e
SR
−
DSSEb
h
as
b
etter
s
ea
r
ch
p
er
f
o
r
m
an
ce
c
o
m
p
ar
e
d
to
SR
−
DSSEa
[2
1
].
I
n
o
r
d
er
to
tr
a
n
s
f
o
r
m
th
e
attr
ib
u
te
-
b
ased
en
c
r
y
p
tio
n
(
AB
E
)
m
o
d
el
with
ex
ter
n
al
d
ec
r
y
p
tio
n
in
to
an
AB
E
m
o
d
el
with
v
er
if
iab
le
d
ec
r
y
p
tio
n
,
a
m
o
d
el
was
cr
ea
ted
.
T
h
is
m
o
d
el
was
s
im
p
le,
o
p
tim
al
an
d
g
en
e
r
al.
W
ith
th
e
h
elp
o
f
a
f
ew
n
o
n
-
d
o
m
in
an
t
o
p
er
atio
n
s
,
th
is
v
e
r
if
iab
le
o
u
ts
o
u
r
ce
d
AB
E
is
less
ex
p
en
s
iv
e
to
u
tili
ze
an
d
h
as less
u
s
er
s
th
an
a
g
en
er
al
o
u
ts
o
u
r
ce
d
AB
E
.
I
t a
ls
o
d
o
esn
’
t in
cr
ea
s
e
th
e
s
ize
o
f
th
e
cip
h
er
tex
t o
th
er
th
a
n
th
e
ad
d
itio
n
o
f
a
h
ash
v
alu
e,
wh
ich
is
less
th
an
2
0
b
y
tes f
o
r
a
n
8
0
-
b
it secu
r
ity
lev
el
[
2
2
].
Ma
n
y
r
esear
ch
er
s
h
av
e
d
e
v
el
o
p
ed
v
ar
io
u
s
en
c
r
y
p
tio
n
tech
n
iq
u
es
f
o
r
ac
h
iev
in
g
s
ec
u
r
e
a
n
d
f
ast
d
ata
tr
an
s
m
is
s
io
n
.
Ho
wev
er
,
m
o
s
t
o
f
th
e
tech
n
iq
u
es
wer
e
n
o
t
ef
f
ec
tiv
e
f
o
r
b
o
th
s
p
ee
d
a
n
d
s
ec
u
r
ity
a
n
d
h
as
m
o
r
e
d
elay
.
T
o
s
o
lv
e
th
ese
is
s
u
e
s
,
th
is
wo
r
k
p
r
esen
ts
th
e
d
esig
n
an
d
im
p
lem
en
tatio
n
o
f
n
o
v
el
en
cr
y
p
tio
n
ar
ch
itectu
r
e
(
E
A)
u
s
in
g
m
ix
co
lu
m
n
with
a
n
o
v
el
ad
d
e
r
.
T
h
e
r
em
ain
i
n
g
wo
r
k
is
o
r
g
an
ized
as
f
o
llo
ws:
Sectio
n
2
d
em
o
n
s
tr
ates
th
e
d
esig
n
an
d
im
p
lem
en
tatio
n
o
f
n
o
v
el
en
cr
y
p
tio
n
a
r
ch
itectu
r
e
u
s
in
g
m
ix
co
lu
m
n
with
n
o
v
el
ad
d
er
.
Sectio
n
3
ev
alu
ates
th
e
r
esu
lt
an
aly
s
i
s
o
f
th
e
p
r
esen
ted
ap
p
r
o
ac
h
.
Fin
ally
,
th
e
co
n
clu
s
io
n
is
p
r
o
v
id
e
d
in
s
ec
tio
n
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
n
o
ve
l e
n
cryp
tio
n
a
r
ch
itectu
r
e
u
s
in
g
m
ix
c
o
lu
mn
…
(
R
a
d
h
a
A
p
p
is
etty
)
1137
2.
NO
VE
L
E
NCR
YP
T
I
O
N
A
R
CH
I
T
E
CT
URE U
SI
NG
M
I
X
CO
L
UM
N
USI
NG
NO
VE
L
ADD
E
R
I
n
th
is
s
ec
tio
n
,
th
e
d
esig
n
a
n
d
im
p
lem
en
tatio
n
o
f
a
n
o
v
el
en
c
r
y
p
tio
n
a
r
ch
itectu
r
e
u
s
in
g
a
m
i
x
co
lu
m
n
with
n
o
v
el
ad
d
er
is
p
r
esen
ted
.
Fig
u
r
e
1
p
r
esen
ts
th
e
ar
ch
ite
ctu
r
e
o
f
th
e
d
esig
n
a
n
d
im
p
le
m
en
tatio
n
o
f
n
o
v
el
en
cr
y
p
tio
n
ar
ch
itectu
r
e
u
s
in
g
m
ix
co
l
u
m
n
with
n
o
v
el
ad
d
e
r
.
T
h
is
n
o
v
el
e
n
cr
y
p
tio
n
alg
o
r
ith
m
is
d
esig
n
ed
with
en
cr
y
p
tio
n
tech
n
iq
u
e
with
m
i
x
co
lu
m
n
u
s
in
g
n
o
v
el
ad
d
er
.
T
h
e
b
o
ttlen
ec
k
o
f
th
e
en
tire
E
S
cip
h
er
p
r
o
ce
d
u
r
e
is
th
e
s
u
b
s
titu
tio
n
b
o
x
,
o
f
ten
k
n
o
wn
as
S
-
B
o
x
.
I
t
is
a
n
o
n
-
lin
ea
r
tr
an
s
f
o
r
m
atio
n
.
Usi
n
g
a
s
u
b
s
titu
tio
n
tab
le
to
r
ep
lac
e
d
ata
was
th
e
f
ir
s
t
m
o
d
if
icatio
n
m
ad
e
to
th
e
E
S
en
cr
y
p
tio
n
cip
h
er
.
T
h
e
f
ix
ed
ta
b
le,
k
n
o
wn
as
th
e
S
-
b
o
x
,
r
e
p
lace
s
th
e
1
6
in
p
u
t
b
y
tes
an
d
m
ain
tain
s
ev
er
y
p
o
s
s
ib
le
co
m
b
in
atio
n
o
f
eig
h
t
-
b
it
o
r
d
er
.
T
h
e
n
ew
1
6
b
y
tes
th
at
ar
e
p
lace
d
in
a
m
at
r
ix
with
f
o
u
r
r
o
ws
a
n
d
co
lu
m
n
s
.
An
in
v
er
s
e
S
-
b
o
x
is
u
s
ed
b
y
in
v
-
s
u
b
b
y
tes
to
p
er
f
o
r
m
th
e
in
v
er
s
e
o
p
e
r
atio
n
,
o
r
d
ec
r
y
p
tio
n
.
Fig
u
r
e
1
.
No
v
el
en
cr
y
p
tio
n
ar
ch
itectu
r
e
u
s
in
g
m
i
x
co
lu
m
n
with
n
o
v
el
ad
d
er
Data
r
o
ws
ar
e
m
o
v
ed
in
th
e
s
ec
o
n
d
tr
an
s
f
o
r
m
atio
n
.
I
n
th
is
p
r
o
ce
d
u
r
e,
th
e
s
h
if
t
r
o
ws
o
p
er
atio
n
u
s
es
th
e
s
u
b
b
y
tes
’
o
u
tp
u
t
as
in
p
u
t.
B
y
m
o
v
in
g
b
y
tes
cy
clica
lly
,
th
e
o
p
er
atio
n
is
ca
r
r
ied
o
u
t
in
th
is
p
r
o
ce
s
s
.
I
n
th
is
ca
s
e,
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
s
h
if
ts
two
b
its
in
th
e
th
ir
d
r
o
w,
th
r
ee
b
its
in
th
e
f
o
u
r
th
r
o
w,
an
d
o
n
e
b
it
in
th
e
s
ec
o
n
d
r
o
w
wh
ile
leav
in
g
th
e
f
ir
s
t
r
o
w
o
f
th
e
m
atr
ix
u
n
c
h
an
g
ed
.
I
n
th
e
p
r
o
ce
s
s
o
f
d
ec
r
y
p
tio
n
,
th
e
b
its
ar
e
s
h
if
ted
cy
clica
lly
to
th
e
r
ig
h
t
in
r
ev
er
s
e
o
r
d
e
r
.
T
h
e
r
esu
ltin
g
m
atr
ix
h
as
th
e
s
am
e
1
6
b
y
tes,
b
u
t
th
ey
ar
e
ar
r
an
g
e
d
d
if
f
er
en
tly
.
T
h
e
b
y
te
s
in
th
e
f
in
al
t
h
r
ee
r
o
ws
o
f
th
e
State
ar
e
cy
clica
lly
s
h
if
te
d
o
v
er
v
ar
y
in
g
n
u
m
b
er
s
o
f
b
y
tes (
o
f
f
s
ets)
in
th
e
s
h
if
t r
o
ws
(
SR
)
tr
an
s
f
o
r
m
atio
n
.
T
h
e
th
ir
d
tr
an
s
f
o
r
m
atio
n
n
o
w
co
m
b
in
es
th
e
co
lu
m
n
s
to
g
eth
er
.
T
h
is
n
ew
a
d
d
er
th
at
is
b
ein
g
p
r
esen
ted
is
u
s
ed
t
o
o
p
er
ate
t
h
e
m
ix
c
o
lu
m
n
.
I
t
a
p
p
ea
r
s
to
b
e
a
t
r
ee
’
s
s
tr
u
ctu
r
e
u
s
ed
to
ca
r
r
y
o
u
t
t
h
e
m
ix
co
lu
m
n
o
p
er
atio
n
.
Fo
r
ac
tiv
it
ies
with
g
r
ea
ter
p
er
f
o
r
m
an
c
e,
th
e
in
n
o
v
ativ
e
ad
d
er
is
u
s
ed
.
T
h
is
h
ig
h
-
s
p
ee
d
ad
d
er
is
im
p
lem
en
ted
at
th
e
g
ate
lev
el
lo
g
ic
u
s
in
g
th
e
s
m
allest
n
u
m
b
er
o
f
p
o
s
s
ib
le
g
ates.
As
a
r
esu
lt,
it
u
s
es
less
m
em
o
r
y
a
n
d
less
tim
e
d
elay
with
th
is
a
r
ch
itectu
r
e.
T
h
e
m
ix
co
lu
m
n
o
p
er
atio
n
p
r
o
ce
s
s
u
s
es
th
e
s
h
if
t
r
o
ws
’
r
esu
lt
as
i
n
p
u
t.
E
ac
h
co
lu
m
n
is
tr
ea
ted
as
a
f
o
u
r
-
ter
m
p
o
ly
n
o
m
ial
o
v
e
r
g
alo
is
f
ield
(
GF)
wh
en
p
er
f
o
r
m
in
g
th
e
m
ix
co
lu
m
n
o
p
er
atio
n
,
wh
ich
is
d
o
n
e
th
r
o
u
g
h
co
lu
m
n
-
by
-
co
lu
m
n
m
atr
ix
.
T
h
en
,
ea
ch
o
f
th
e
f
o
u
r
-
b
y
te
c
o
lu
m
n
s
is
m
o
d
if
ie
d
u
s
in
g
a
u
n
iq
u
e
GF
m
ath
e
m
atica
l
f
u
n
ctio
n
.
T
h
e
f
u
n
ctio
n
r
ep
lace
s
th
e
o
ld
co
lu
m
n
with
f
o
u
r
n
ew
b
y
tes
b
y
o
u
t
p
u
ttin
g
th
e
f
o
u
r
b
y
tes
th
at
wer
e
in
p
u
t
f
r
o
m
t
h
e
o
r
i
g
in
al
co
lu
m
n
.
T
h
e
co
n
s
tan
t
m
atr
ix
is
m
u
ltip
lied
b
y
ea
c
h
c
o
lu
m
n
o
n
th
e
lef
tm
o
s
t
m
atr
ix
,
a
n
d
th
e
r
esu
ltin
g
v
a
lu
e
is
s
tated
o
n
t
h
e
r
ig
h
t
s
id
e.
Fo
r
th
e
f
o
llo
win
g
p
h
ases
,
th
e
m
atr
ix
o
n
th
e
r
ig
h
t
s
id
e
is
n
o
w
r
eg
ar
d
ed
as
th
e
n
ew
s
tate
m
atr
ix
.
I
n
th
is
ca
s
e,
th
e
ad
d
itio
n
s
ar
e
in
ten
d
ed
to
b
e
XOR
o
p
e
r
atio
n
s
.
T
h
is
m
u
ltip
licatio
n
ca
u
s
es
a
co
lu
m
n
’
s
f
o
u
r
b
y
tes to
b
e
ch
a
n
g
ed
.
T
h
e
m
ix
co
lu
m
n
’
s
r
ev
er
s
e
p
r
o
ce
d
u
r
e
is
k
n
o
wn
as
th
e
in
v
e
r
s
e
m
ix
co
lu
m
n
.
T
h
e
tr
an
s
f
o
r
m
atio
n
o
f
s
h
if
t
r
o
ws
is
in
v
er
s
ely
r
ep
r
esen
ted
b
y
I
n
v
s
h
if
t
r
o
ws
.
T
h
e
f
i
n
al
th
r
ee
r
o
ws
o
f
th
e
State
’
s
b
y
tes
ar
e
cy
clica
lly
s
h
if
ted
ac
r
o
s
s
a
r
an
g
e
o
f
o
f
f
s
ets,
o
r
b
y
tes.
T
h
er
e
is
n
o
s
h
if
t
to
th
e
f
ir
s
t
r
o
w,
r
=
0
.
Nb
s
h
if
t
(
r
,
Nb
)
b
y
tes
ar
e
u
s
ed
to
cy
clica
lly
s
h
if
t
th
e
b
o
tto
m
th
r
ee
r
o
ws;
th
e
s
h
if
t
v
alu
e
s
h
if
t
(
r
,
Nb
)
is
d
ep
e
n
d
en
t
o
n
th
e
r
o
w
n
u
m
b
er
.
T
h
e
b
y
te
s
u
b
s
titu
tio
n
tr
an
s
f
o
r
m
atio
n
,
wh
ic
h
ap
p
lies
th
e
i
n
v
er
s
e
S
b
o
x
to
ev
er
y
b
y
te
i
n
th
e
State,
is
in
v
er
s
e
d
b
y
I
n
v
s
u
b
b
y
tes
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
41
,
No
.
3
,
Ma
r
ch
20
2
6
:
1
1
3
4
-
1
1
4
0
1138
Firstl
y
,
th
e
in
p
u
t
d
ata
is
ap
p
li
ed
to
S
-
b
o
x
.
T
h
e
S
-
b
o
x
p
er
f
o
r
m
s
n
o
n
-
lin
ea
r
tr
an
s
f
o
r
m
atio
n
s
o
f
in
p
u
t
d
ata
an
d
p
r
o
v
id
es
s
ec
u
r
ity
.
T
h
e
o
u
tp
u
t
o
f
S
-
b
o
x
is
ap
p
lied
to
Sh
if
t
r
o
ws
wh
e
r
e
it
s
h
if
ts
ea
c
h
r
o
w
cy
clica
lly
t
o
th
e
lef
t
b
y
a
ce
r
tain
n
u
m
b
er
o
f
b
y
tes.
Her
e,
th
e
m
ix
c
o
lu
m
n
o
p
er
atio
n
is
p
er
f
o
r
m
ed
w
ith
th
e
n
o
v
el
ad
d
er
.
T
h
is
n
ew
ad
d
er
th
at
is
b
ein
g
p
r
esen
ted
is
u
s
ed
to
o
p
er
ate
t
h
e
m
ix
co
lu
m
n
.
I
t
ap
p
ea
r
s
to
b
e
a
tr
ee
’
s
s
tr
u
ctu
r
e
u
s
ed
to
ca
r
r
y
o
u
t
th
e
m
ix
co
lu
m
n
o
p
er
atio
n
.
Nex
t
m
ix
co
lu
m
n
p
r
o
v
i
d
es
d
if
f
u
s
io
n
a
n
d
n
o
n
-
lin
ea
r
ity
t
o
th
e
d
at
a
an
d
m
ak
es
th
e
d
ata
as
r
esis
t
an
t
to
v
ar
io
u
s
attac
k
s
.
T
h
e
m
ix
co
lu
m
n
’
s
r
ev
e
r
s
e
p
r
o
ce
d
u
r
e
is
k
n
o
wn
as
th
e
in
v
er
s
e
m
ix
co
lu
m
n
.
T
h
e
tr
an
s
f
o
r
m
atio
n
o
f
s
h
if
t r
o
ws
is
in
v
e
r
s
ely
r
ep
r
esen
te
d
b
y
I
n
v
s
h
if
t r
o
ws
.
T
h
r
o
u
g
h
th
is
all
s
tep
s
,
th
e
in
f
o
r
m
atio
n
is
m
o
r
e
s
ec
u
r
ed
c
o
m
p
ar
e
d
to
o
t
h
er
ap
p
r
o
ac
h
es.
T
o
g
et
t
h
e
o
r
ig
i
n
al
in
f
o
r
m
atio
n
,
f
ir
s
t
th
e
I
n
v
Ma
x
c
o
lu
m
n
o
p
er
atio
n
is
p
er
f
o
r
m
ed
.
Nex
t
,
th
e
i
n
v
er
s
e
o
p
er
atio
n
s
h
if
t
r
o
w
o
p
er
ati
o
n
a
n
d
i
n
v
s
-
b
o
x
is
p
er
f
o
r
m
ed
.
I
n
th
is
way
,
th
e
d
a
ta
is
s
ec
u
r
ed
.
3.
RE
SU
L
T
ANAL
YSI
S
I
n
th
is
s
ec
tio
n
,
d
esig
n
an
d
im
p
lem
en
tatio
n
o
f
a
n
o
v
el
en
c
r
y
p
t
io
n
ar
ch
itectu
r
e
u
s
in
g
m
ix
co
l
u
m
n
with
n
o
v
el
ad
d
e
r
is
im
p
lem
en
ted
.
T
h
e
im
p
lem
en
tatio
n
a
n
d
s
im
u
la
tio
n
r
esu
lts
ar
e
ev
alu
ated
in
th
is
s
ec
tio
n
.
Fig
u
r
e
2
s
h
o
ws
th
e
r
eg
is
ter
t
r
an
s
f
er
le
v
el
(
R
T
L
)
s
ch
em
atic
o
f
n
o
v
e
l
en
cr
y
p
tio
n
ar
ch
itectu
r
e
u
s
in
g
m
ix
co
lu
m
n
with
n
o
v
el
a
d
d
er
.
T
a
b
le
1
s
h
o
ws
th
e
p
er
f
o
r
m
a
n
ce
c
o
m
p
ar
is
o
n
in
ter
m
s
o
f
to
tal
d
elay
,
l
o
g
ic
d
el
ay
an
d
r
o
u
te
d
elay
b
etwe
en
r
ip
p
le
ca
r
r
y
a
d
d
er
-
a
d
v
an
ce
d
en
cr
y
p
tio
n
s
tan
d
a
r
d
(
RCA
-
AE
S
)
an
d
th
e
p
r
esen
ted
n
o
v
el
E
A.
C
o
m
p
ar
ed
to
R
C
A
-
AE
S
ap
p
r
o
ac
h
,
th
e
n
o
v
el
E
A
h
as
v
er
y
less
to
tal
d
elay
,
lo
g
ic
d
elay
an
d
r
o
u
te
d
elay
.
Fig
u
r
e
3
s
h
o
ws
th
e
to
tal
d
elay
co
m
p
a
r
is
o
n
.
I
n
Fig
u
r
e
3
,
x
-
ax
is
in
d
icate
s
d
if
f
e
r
en
t
e
n
cr
y
p
tio
n
m
o
d
els
wh
er
e
as
y
-
ax
is
in
d
icate
s
to
t
al
d
elay
i
n
n
a
n
o
s
ec
o
n
d
s
.
C
o
m
p
ar
ed
to
R
C
A
-
AE
S,
th
e
n
o
v
el
E
A
h
as
r
eq
u
ir
e
d
v
er
y
le
s
s
to
tal
d
elay
.
Fig
u
r
e
4
d
em
o
n
s
tr
ates
th
e
lo
g
ic
d
elay
c
o
m
p
ar
ativ
e
g
r
ap
h
.
Her
e,
l
o
g
ic
d
elay
is
m
ea
s
u
r
ed
in
ter
m
s
o
f
n
an
o
s
ec
o
n
d
s
.
T
h
e
lo
g
ic
d
elay
p
er
f
o
r
m
an
ce
o
f
t
h
e
p
r
esen
ted
n
o
v
el
E
A
is
co
m
p
ar
ed
with
R
C
A
-
AE
S.
Pre
s
en
ted
E
S m
o
d
el
h
as
v
er
y
less
lo
g
ic
d
elay
t
h
an
R
C
A
-
E
S m
o
d
el.
Fig
u
r
e
5
s
h
o
ws
th
e
r
o
u
te
d
elay
co
m
p
ar
is
o
n
.
T
h
e
n
o
v
el
E
A
h
as
co
n
s
u
m
ed
v
er
y
less
r
o
u
te
d
elay
th
an
RCA
-
AE
S
m
o
d
el.
I
f
th
e
d
ela
y
is
less
,
th
en
th
e
s
p
ee
d
will
b
e
m
o
r
e.
T
h
e
d
esig
n
an
d
im
p
l
em
en
tatio
n
o
f
n
o
v
el
en
cr
y
p
tio
n
ar
ch
itectu
r
e
u
s
in
g
a
m
ix
co
lu
m
n
with
a
n
o
v
el
a
d
d
er
h
as
o
b
tain
ed
b
etter
p
er
f
o
r
m
an
ce
in
ter
m
s
o
f
r
o
u
te
d
elay
,
lo
g
ic
d
elay
,
a
n
d
t
o
tal
d
elay
th
an
ea
r
lier
en
c
r
y
p
ti
o
n
s
tan
d
ar
d
m
o
d
els.
Fig
u
r
e
2
.
R
T
L
s
ch
em
atic
o
f
n
o
v
el
en
cr
y
p
tio
n
a
r
ch
itectu
r
e
u
s
in
g
m
ix
co
lu
m
n
with
n
o
v
el
a
d
d
er
T
ab
le
1
.
Dela
y
p
er
f
o
r
m
an
ce
c
o
m
p
ar
is
o
n
A
d
d
e
r
s/
d
e
l
a
y
s
To
t
a
l
d
e
l
a
y
Lo
g
i
c
d
e
l
a
y
R
o
u
t
e
d
e
l
a
y
RCA
-
A
ES
1
2
.
3
2
5
n
s
7
.
9
4
7
n
s
4
.
3
n
s
P
r
e
sen
t
e
d
n
o
v
e
l
EA
3
.
1
2
5
n
s
0
.
3
1
1
n
s
2
.
9
n
s
Fig
u
r
e
3
.
T
o
tal
d
elay
c
o
m
p
ar
i
s
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
Desig
n
a
n
d
imp
leme
n
ta
tio
n
o
f
n
o
ve
l e
n
cryp
tio
n
a
r
ch
itectu
r
e
u
s
in
g
m
ix
c
o
lu
mn
…
(
R
a
d
h
a
A
p
p
is
etty
)
1139
Fig
u
r
e
4
.
L
o
g
ic
d
ela
y
co
m
p
ar
i
s
o
n
Fig
u
r
e
5
.
R
o
u
te
d
elay
co
m
p
ar
i
s
o
n
4.
CO
NCLU
SI
O
N
I
n
th
is
wo
r
k
,
d
esig
n
an
d
im
p
lem
en
tatio
n
o
f
n
o
v
el
en
cr
y
p
ti
o
n
ar
ch
itectu
r
e
u
s
in
g
m
ix
co
l
u
m
n
with
n
o
v
el
a
d
d
er
is
p
r
esen
ted
.
T
h
e
m
ain
s
tep
s
in
clu
d
ed
in
t
h
is
p
r
o
ce
s
s
ar
e
s
-
b
o
x
,
s
h
if
t
r
o
ws,
m
ix
co
lu
m
n
,
in
v
er
s
e
m
ix
co
lu
m
n
,
in
v
e
r
t
s
h
if
t r
o
ws,
in
v
er
s
e
S
-
b
o
x
.
Usi
n
g
a
s
u
b
s
titu
tio
n
tab
le
(
S
-
b
o
x
)
,
t
h
e
s
u
b
b
y
tes
tr
an
s
f
o
r
m
atio
n
is
a
n
o
n
-
lin
ea
r
b
y
te
r
e
p
lace
m
e
n
t
th
at
w
o
r
k
s
i
n
d
ep
e
n
d
en
tly
o
n
ev
e
r
y
b
y
te
in
t
h
e
State.
T
h
i
s
n
ew
ad
d
er
th
at
is
b
ein
g
p
r
esen
ted
is
u
s
ed
to
o
p
er
ate
th
e
m
ix
co
lu
m
n
. I
t a
p
p
ea
r
s
to
b
e
a
tr
ee
’
s
s
tr
u
ctu
r
e
u
s
ed
t
o
ca
r
r
y
o
u
t th
e
m
i
x
co
lu
m
n
o
p
er
atio
n
.
T
h
e
m
ix
co
lu
m
n
’
s
r
ev
er
s
e
p
r
o
ce
d
u
r
e
is
k
n
o
wn
as
th
e
in
v
er
s
e
m
ix
co
l
u
m
n
.
T
h
e
tr
an
s
f
o
r
m
atio
n
o
f
s
h
if
t
r
o
ws
is
in
v
er
s
ely
r
e
p
r
esen
ted
b
y
I
n
v
s
h
if
t
r
o
ws
.
T
h
r
o
u
g
h
th
is
all
s
tep
s
,
th
e
i
n
f
o
r
m
atio
n
is
m
o
r
e
s
ec
u
r
ed
co
m
p
a
r
ed
to
o
th
er
a
p
p
r
o
ac
h
es.
T
h
e
p
er
f
o
r
m
an
ce
o
f
p
r
esen
ted
ap
p
r
o
ac
h
is
m
ea
s
u
r
ed
i
n
ter
m
s
o
f
to
tal
d
elay
,
lo
g
ic
d
elay
,
an
d
r
o
u
te
d
elay
.
C
o
m
p
ar
ed
to
ea
r
l
ier
ap
p
r
o
ac
h
es,
p
r
esen
te
d
n
o
v
el
E
A
h
as v
er
y
les
s
r
o
u
te
d
elay
,
lo
g
ic
d
ela
y
an
d
t
o
tal
d
elay
.
As
a
r
esu
lt,
s
p
ee
d
is
m
o
r
e.
Hen
ce
,
th
is
ap
p
r
o
ac
h
h
as
p
r
o
v
id
e
d
h
ig
h
s
p
ee
d
an
d
m
o
r
e
s
ec
u
r
ity
to
th
e
d
ata.
I
n
f
u
tu
r
e
,
h
y
b
r
id
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
s
tan
d
ar
d
will
b
e
im
p
lem
en
ted
with
th
is
n
o
v
el
e
n
cr
y
p
tio
n
s
tr
u
ctu
r
e
f
o
r
p
r
o
v
id
i
n
g
m
o
r
e
s
ec
u
r
ity
with
in
less
tim
e.
RE
F
E
R
E
NC
E
S
[
1
]
Y
.
N
.
A
.
T
a
h
e
r
,
K
.
A
.
A
m
e
e
n
,
a
n
d
A
.
M
.
F
a
k
h
r
u
d
e
e
n
,
“
A
n
e
f
f
i
c
i
e
n
t
h
y
b
r
i
d
t
e
c
h
n
i
q
u
e
f
o
r
messa
g
e
e
n
c
r
y
p
t
i
o
n
u
s
i
n
g
c
a
e
sar
c
i
p
h
e
r
a
n
d
d
e
o
x
y
r
i
b
o
n
u
c
l
e
i
c
a
c
i
d
st
e
g
a
n
o
g
r
a
p
h
y
,
”
I
n
d
o
n
e
s
i
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
ri
c
a
l
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
E
EC
S
)
,
v
o
l
.
2
8
,
n
o
.
2
,
p
p
.
1
0
9
6
–
1
1
0
4
,
N
o
v
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s.
v
2
8
.
i
2
.
p
p
1
0
9
6
-
1
1
0
4
.
[
2
]
A
.
A
.
Y
a
ss
i
n
,
A
.
M
.
R
a
s
h
i
d
,
A
.
J.
Y
a
ssi
n
,
a
n
d
H
.
A
l
a
sa
d
i
,
“
A
n
o
v
e
l
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
sc
h
e
m
e
b
a
se
d
o
n
D
C
T
t
r
a
n
sf
o
r
m
a
n
d
D
N
A
seq
u
e
n
c
e
,
”
I
n
d
o
n
e
s
i
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
ri
c
a
l
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
I
J
EEC
S
)
,
v
o
l
.
2
1
,
n
o
.
3
,
p
p
.
1
4
5
5
-
1
4
6
4
,
M
a
r
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
2
1
.
i
3
.
p
p
1
4
5
5
-
1
4
6
4
.
[
3
]
R
.
V
e
r
m
a
a
n
d
J.
D
h
i
m
a
n
,
“
I
mp
l
e
men
t
a
t
i
o
n
o
f
i
mp
r
o
v
e
d
c
r
y
p
t
o
g
r
a
p
h
y
a
l
g
o
r
i
t
h
m,”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
T
e
c
h
n
o
l
o
g
y
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
1
4
,
n
o
.
2
,
p
p
.
4
5
-
5
3
,
A
p
r
.
2
0
2
2
,
d
o
i
:
1
0
.
5
8
1
5
/
i
j
i
t
c
s
.
2
0
2
2
.
0
2
.
0
4
.
[
4
]
B
.
E
.
H
.
H
.
H
a
m
o
u
d
a
,
“
C
o
m
p
a
r
a
t
i
v
e
st
u
d
y
o
f
d
i
f
f
e
r
e
n
t
c
r
y
p
t
o
g
r
a
p
h
i
c
a
l
g
o
r
i
t
h
ms
,
”
J
o
u
r
n
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
S
e
c
u
r
i
t
y
,
v
o
l
.
11
,
n
o
.
3
,
p
p
.
1
3
8
-
1
4
8
,
J
u
l
.
2
0
2
0
,
d
o
i
:
1
0
.
4
2
3
6
/
j
i
s.
2
0
2
0
.
1
1
3
0
0
9
.
[
5
]
L.
Y
a
n
g
,
Y
.
L
i
u
,
X
.
S
.
Y
a
n
g
,
T.
G
u
o
,
a
n
d
Z
.
L
i
a
n
g
, “
A
s
e
c
u
r
e
c
l
u
st
e
r
i
n
g
p
r
o
t
o
c
o
l
w
i
t
h
f
u
z
z
y
t
r
u
st
e
v
a
l
u
a
t
i
o
n
a
n
d
o
u
t
l
i
e
r
d
e
t
e
c
t
i
o
n
f
o
r
i
n
d
u
st
r
i
a
l
w
i
r
e
l
e
ss
se
n
so
r
n
e
t
w
o
r
k
s
,
”
N
e
t
w
o
rki
n
g
a
n
d
I
n
t
e
r
n
e
t
Arc
h
i
t
e
c
t
u
r
e
,
a
r
X
i
v
:
2
2
0
7
.
0
9
9
3
6
,
2
0
2
2
,
d
o
i
:
1
0
.
4
8
5
5
0
/
a
r
X
i
v
.
2
2
0
7
.
0
9
9
3
6
.
[
6
]
K
.
S
u
d
h
a
k
a
r
,
S
.
G
o
w
s
i
k
a
a
,
G
.
K
a
r
i
sh
ma
,
a
n
d
K
.
P
o
n
r
a
g
a
v
i
,
“
A
n
e
f
f
i
c
i
e
n
t
c
r
y
p
t
o
g
r
a
p
h
y
V
LSI
d
e
si
g
n
f
o
r
d
a
t
a
se
c
u
r
i
t
y
,
”
i
n
Pro
c
e
e
d
i
n
g
s
-
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
Ap
p
l
i
e
d
Art
i
f
i
c
i
a
l
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
C
o
m
p
u
t
i
n
g
,
I
C
AAI
C
2
0
2
2
,
I
EEE,
M
a
y
2
0
2
2
,
p
p
.
1
3
8
1
-
1
3
8
6
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
A
A
I
C
5
3
9
2
9
.
2
0
2
2
.
9
7
9
3
2
5
0
.
[
7
]
V.
M
.
S
.
G
r
a
c
i
a
.
R
.
F
.
C
a
r
a
p
i
a
,
C
.
R
.
M
a
r
q
u
e
z
,
B
.
L.
B
e
n
o
s
o
,
a
n
d
C
.
A
.
J
.
V
a
z
q
u
e
z
,
“
I
ma
g
e
s
e
n
c
r
y
p
t
i
o
n
u
s
in
g
A
ES
a
n
d
v
a
r
i
a
b
l
e
p
e
r
m
u
t
a
t
i
o
n
s
,
”
C
ry
p
t
o
g
r
a
p
h
y
a
n
d
S
e
c
ur
i
ty
,
2
0
1
4
,
d
o
i
:
1
0
.
4
8
5
5
0
/
a
r
X
i
v
.
1
4
0
9
.
5
4
9
1
.
[
8
]
Y
.
T.
T
e
n
g
,
W
.
L.
C
h
i
n
,
D
.
K
.
C
h
a
n
g
,
P
.
Y
.
C
h
e
n
,
a
n
d
P
.
W
.
C
h
e
n
,
“
V
LSI
a
r
c
h
i
t
e
c
t
u
r
e
o
f
s
-
b
o
x
w
i
t
h
h
i
g
h
a
r
e
a
e
f
f
i
c
i
e
n
c
y
b
a
se
d
o
n
c
o
m
p
o
s
i
t
e
f
i
e
l
d
a
r
i
t
h
me
t
i
c
,
”
I
EE
E
Ac
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
2
7
2
1
–
2
7
2
8
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
1
.
3
1
3
9
0
4
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
41
,
No
.
3
,
Ma
r
ch
20
2
6
:
1
1
3
4
-
1
1
4
0
1140
[
9
]
S
.
H
a
r
b
,
M
.
O
.
A
h
ma
d
,
a
n
d
M
.
N
.
S
.
S
w
a
my
,
“
A
h
i
g
h
-
s
p
e
e
d
F
P
G
A
i
m
p
l
e
me
n
t
a
t
i
o
n
o
f
A
ES f
o
r
l
a
r
g
e
sc
a
l
e
e
m
b
e
d
d
e
d
s
y
st
e
ms a
n
d
i
t
s
a
p
p
l
i
c
a
t
i
o
n
s,
”
i
n
2
0
2
2
1
3
t
h
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
I
n
f
o
rm
a
t
i
o
n
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
S
y
s
t
e
m
s
,
I
C
I
C
S
2
0
2
2
,
I
EEE,
Ju
n
.
2
0
2
2
,
p
p
.
5
9
-
6
4
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
I
C
S
5
5
3
5
3
.
2
0
2
2
.
9
8
1
1
1
4
0
.
[1
0
]
K
.
V
i
v
e
k
,
M
.
R
.
K
a
l
e
,
V
.
S
.
K
.
T
h
o
t
a
k
u
r
a
,
a
n
d
K
.
S
u
s
h
ma
,
“
A
n
e
f
f
i
c
i
e
n
t
t
r
i
p
l
e
-
l
a
y
e
r
e
d
a
n
d
d
o
u
b
l
e
s
e
c
u
r
e
d
c
r
y
p
t
o
g
r
a
p
h
y
t
e
c
h
n
i
q
u
e
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s
,
”
i
n
2
0
2
1
I
E
E
E
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
D
i
s
t
r
i
b
u
t
e
d
C
o
m
p
u
t
i
n
g
,
VL
S
I
,
El
e
c
t
r
i
c
a
l
C
i
r
c
u
i
t
s
a
n
d
R
o
b
o
t
i
c
s
,
D
I
S
C
O
V
ER
2
0
2
1
-
Pr
o
c
e
e
d
i
n
g
s
,
I
E
EE
,
N
o
v
.
2
0
2
1
,
p
p
.
1
1
7
-
1
2
2
.
d
o
i
:
1
0
.
1
1
0
9
/
D
I
S
C
O
V
E
R
5
2
5
6
4
.
2
0
2
1
.
9
6
6
3
6
7
4
.
[1
1
]
C
.
A
r
u
l
M
u
r
u
g
a
n
,
P
.
K
a
r
t
h
i
g
a
i
k
u
mar
,
a
n
d
S
.
S
a
t
h
y
a
P
r
i
y
a
,
“
F
P
G
A
i
m
p
l
e
m
e
n
t
a
t
i
o
n
o
f
h
a
r
d
w
a
r
e
a
r
c
h
i
t
e
c
t
u
r
e
w
i
t
h
A
ES
e
n
c
r
y
p
t
o
r
u
si
n
g
s
u
b
-
p
i
p
e
l
i
n
e
d
S
-
b
o
x
t
e
c
h
n
i
q
u
e
s
f
o
r
c
o
mp
a
c
t
a
p
p
l
i
c
a
t
i
o
n
s,
”
A
u
t
o
m
a
t
i
k
a
,
v
o
l
.
6
1
,
n
o
.
4
,
p
p
.
6
8
2
-
6
9
3
,
O
c
t
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
8
0
/
0
0
0
5
1
1
4
4
.
2
0
2
0
.
1
8
1
6
3
8
8
.
[1
2
]
D
.
K
o
d
z
o
,
M
.
H
o
d
o
w
u
,
D
.
R
.
K
o
r
d
a
,
a
n
d
E.
D
a
n
s
o
A
n
so
n
g
,
“
A
n
e
n
h
a
n
c
e
me
n
t
o
f
d
a
t
a
se
c
u
r
i
t
y
i
n
c
l
o
u
d
c
o
mp
u
t
i
n
g
w
i
t
h
a
n
i
mp
l
e
m
e
n
t
a
t
i
o
n
o
f
a
t
w
o
-
l
e
v
e
l
c
r
y
p
t
o
g
r
a
p
h
i
c
t
e
c
h
n
i
q
u
e
,
u
s
i
n
g
A
ES
a
n
d
E
C
C
a
l
g
o
r
i
t
h
m,”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
ri
n
g
Re
se
a
rc
h
&
T
e
c
h
n
o
l
o
g
y
(
I
J
E
RT)
,
v
o
l
.
9
,
n
o
.
M
a
r
c
h
2
0
2
1
,
p
p
.
2
2
7
8
-
0
1
8
1
,
2
0
2
0
,
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
:
/
/
w
w
w
.
i
j
e
r
t
.
o
r
g
[1
3
]
N
.
M
a
n
i
k
a
n
d
a
n
,
R
.
M
u
t
h
a
i
a
h
,
Y
.
T
e
e
k
a
r
a
m
a
n
,
R
.
K
u
p
p
u
sam
y
,
a
n
d
A
.
R
a
d
h
a
k
r
i
s
h
n
a
n
,
“
A
n
o
v
e
l
r
a
n
d
o
m
e
r
r
o
r
a
p
p
r
o
x
i
m
a
t
e
a
d
d
e
r
-
b
a
s
e
d
l
i
g
h
t
w
e
i
g
h
t
me
d
i
c
a
l
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
s
c
h
e
me
f
o
r
se
c
u
r
e
r
e
m
o
t
e
mo
n
i
t
o
r
i
n
g
o
f
h
e
a
l
t
h
d
a
t
a
,
”
S
e
c
u
ri
t
y
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
rks
,
v
o
l
.
2
0
2
1
,
p
p
.
1
-
1
4
,
N
o
v
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
1
/
3
5
7
0
9
0
4
.
[1
4
]
B
.
S
w
a
t
h
i
,
M
.
O
.
V
.
P
.
K
u
mar
,
D
.
G
.
M
.
S
h
e
e
b
a
,
M
.
K
i
r
a
n
,
a
n
d
Y
.
S
.
R
e
d
d
y
,
“
A
n
Ef
f
i
c
i
e
n
t
V
LSI
D
e
si
g
n
o
f
A
ES
c
r
y
p
t
o
g
r
a
p
h
y
i
n
memo
r
y
i
mp
l
e
m
e
n
t
a
t
i
o
n
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
Re
c
e
n
t
T
e
c
h
n
o
l
o
g
y
a
n
d
E
n
g
i
n
e
e
r
i
n
g
(
I
J
RTE)
,
v
o
l
.
8
,
n
o
.
4
,
p
p
.
1
7
9
6
-
1
8
0
1
,
N
o
v
.
2
0
1
9
,
d
o
i
:
1
0
.
3
5
9
4
0
/
i
j
r
t
e
.
c
6
1
8
8
.
1
1
8
4
1
9
.
[1
5
]
F
.
N
o
o
r
b
a
s
h
a
,
K
.
S
u
n
d
a
r
T
e
j
a
,
B
.
E
n
d
r
e
d
d
y
,
N
.
A
d
i
d
e
l
a
,
a
n
d
C
.
N
a
g
a
P
a
v
a
n
K
u
m
a
r
,
“
I
m
p
l
e
m
e
n
t
a
t
i
o
n
o
f
c
r
y
p
t
o
g
r
a
p
h
y
a
l
g
o
r
i
t
h
m
w
i
t
h
a
d
d
e
r
s
a
n
d
s
u
b
t
r
a
c
t
o
r
,
”
I
n
d
i
a
n
J
o
u
r
n
a
l
o
f
S
c
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
0
,
n
o
.
4
,
J
a
n
.
2
0
1
7
,
d
o
i
:
1
0
.
1
7
4
8
5
/
i
j
s
t
/
2
0
1
7
/
v
1
0
i
4
/
1
1
0
6
6
7
.
[
16
]
T.
S
h
e
n
,
F
.
W
a
n
g
,
K
.
C
h
e
n
,
K
.
W
a
n
g
,
a
n
d
B
.
L
i
,
“
Ef
f
i
c
i
e
n
t
l
e
v
e
l
e
d
(
mu
l
t
i
)
i
d
e
n
t
i
t
y
-
b
a
se
d
f
u
l
l
y
h
o
m
o
m
o
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
sch
e
mes,
”
I
E
EE
A
c
c
e
ss
,
v
o
l
.
7
,
p
p
.
7
9
2
9
9
-
7
9
3
1
0
,
2
0
1
9
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
E
S
S
.
2
0
1
9
.
2
9
2
2
6
8
5
.
[
17
]
Y
.
K
e
,
M
.
Q
.
Z
h
a
n
g
,
J.
L
i
u
,
T.
T
.
S
u
,
a
n
d
X
.
Y
.
Y
a
n
g
,
“
F
u
l
l
y
h
o
mo
mo
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
e
n
c
a
p
s
u
l
a
t
e
d
d
i
f
f
e
r
e
n
c
e
e
x
p
a
n
s
i
o
n
f
o
r
r
e
v
e
r
s
i
b
l
e
d
a
t
a
h
i
d
i
n
g
i
n
e
n
c
r
y
p
t
e
d
d
o
ma
i
n
,
”
I
EE
E
T
ra
n
s
a
c
t
i
o
n
s
o
n
C
i
rc
u
i
t
s
a
n
d
S
y
s
t
e
m
s
f
o
r
V
i
d
e
o
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
3
0
,
n
o
.
8
,
p
p
.
2
3
5
3
-
2
3
6
5
,
A
u
g
.
2
0
2
0
,
d
o
i
:
1
0
.
1
1
0
9
/
T
C
S
V
T.
2
0
1
9
.
2
9
6
3
3
9
3
.
[
18
]
H
.
N
.
A
l
maj
e
d
a
n
d
A
.
S
.
A
l
m
o
g
r
e
n
,
“
S
E
-
En
c
:
a
s
e
c
u
r
e
a
n
d
e
f
f
i
c
i
e
n
t
e
n
c
o
d
i
n
g
sc
h
e
m
e
u
s
i
n
g
e
l
l
i
p
t
i
c
c
u
r
v
e
c
r
y
p
t
o
g
r
a
p
h
y
,
”
I
EEE
A
c
c
e
ss
,
v
o
l
.
7
,
p
p
.
1
7
5
8
6
5
-
1
7
5
8
7
8
,
2
0
1
9
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
1
9
.
2
9
5
7
9
4
3
.
[
19
]
A
.
C
.
M
e
r
t
,
E.
O
z
t
u
r
k
,
a
n
d
E.
S
a
v
a
s,
“
D
e
si
g
n
a
n
d
i
m
p
l
e
me
n
t
a
t
i
o
n
o
f
e
n
c
r
y
p
t
i
o
n
/
d
e
c
r
y
p
t
i
o
n
a
r
c
h
i
t
e
c
t
u
r
e
s
f
o
r
B
F
V
h
o
m
o
mo
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
s
c
h
e
me
,
”
I
EEE
T
ra
n
s
a
c
t
i
o
n
s
o
n
V
e
ry
L
a
r
g
e
S
c
a
l
e
I
n
t
e
g
r
a
t
i
o
n
(
VLS
I
)
S
y
s
t
e
m
s
,
v
o
l
.
2
8
,
n
o
.
2
,
p
p
.
3
5
3
-
3
6
2
,
F
e
b
.
2
0
2
0
,
d
o
i
:
1
0
.
1
1
0
9
/
TV
LSI
.
2
0
1
9
.
2
9
4
3
1
2
7
.
[2
0
]
C
.
Li
u
,
Y
.
Zh
a
n
g
,
J.
X
u
,
J
.
Zh
a
o
,
a
n
d
S
.
X
i
a
n
g
,
“
En
s
u
r
i
n
g
t
h
e
s
e
c
u
r
i
t
y
a
n
d
p
e
r
f
o
r
m
a
n
c
e
o
f
I
o
T
c
o
mm
u
n
i
c
a
t
i
o
n
b
y
i
m
p
r
o
v
i
n
g
e
n
c
r
y
p
t
i
o
n
a
n
d
d
e
c
r
y
p
t
i
o
n
w
i
t
h
t
h
e
l
i
g
h
t
w
e
i
g
h
t
c
i
p
h
e
r
u
B
l
o
c
k
,
”
I
EE
E
S
y
s
t
e
m
s
J
o
u
rn
a
l
,
v
o
l
.
1
6
,
n
o
.
4
,
p
p
.
5
4
8
9
-
5
5
0
0
,
D
e
c
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
JS
Y
S
T
.
2
0
2
2
.
3
1
4
0
8
5
0
.
[2
1
]
H
.
D
o
u
e
t
a
l
.
,
“
D
y
n
a
m
i
c
s
e
a
r
c
h
a
b
l
e
s
y
mm
e
t
r
i
c
e
n
c
r
y
p
t
i
o
n
w
i
t
h
st
r
o
n
g
se
c
u
r
i
t
y
a
n
d
r
o
b
u
s
t
n
e
ss,
”
I
EEE
T
ra
n
s
a
c
t
i
o
n
s
o
n
I
n
f
o
rm
a
t
i
o
n
F
o
re
n
si
c
s
a
n
d
S
e
c
u
ri
t
y
,
v
o
l
.
1
9
,
p
p
.
2
3
7
0
-
2
3
8
4
,
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
T
I
F
S
.
2
0
2
4
.
3
3
5
0
3
3
0
.
[2
2
]
B
.
Q
i
n
,
R
.
H
.
D
e
n
g
,
S
.
L
i
u
,
a
n
d
S
.
M
a
,
“
A
t
t
r
i
b
u
t
e
-
b
a
s
e
d
e
n
c
r
y
p
t
i
o
n
w
i
t
h
e
f
f
i
c
i
e
n
t
v
e
r
i
f
i
a
b
l
e
o
u
t
so
u
r
c
e
d
d
e
c
r
y
p
t
i
o
n
,
”
I
EEE
T
r
a
n
s
a
c
t
i
o
n
s
o
n
I
n
f
o
rm
a
t
i
o
n
F
o
re
n
si
c
s
a
n
d
S
e
c
u
ri
t
y
,
v
o
l
.
1
0
,
n
o
.
7
,
p
p
.
1
3
8
4
-
1
3
9
3
,
J
u
l
.
2
0
1
5
,
d
o
i
:
1
0
.
1
1
0
9
/
TI
F
S
.
2
0
1
5
.
2
4
1
0
1
3
7
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Ra
d
h
a
Ap
p
ise
tty
wo
rk
in
g
a
s
a
n
a
ss
istan
t
p
ro
fe
ss
o
r
in
t
h
e
De
p
a
rtme
n
t
o
f
El
e
c
tro
n
ics
a
n
d
C
o
m
m
u
n
ica
ti
o
n
En
g
in
e
e
rin
g
a
t
Un
iv
e
rsit
y
Co
ll
e
g
e
o
f
E
n
g
i
n
e
e
rin
g
,
Na
ra
sa
ra
o
p
e
t.
S
h
e
is p
u
rs
u
in
g
h
e
r
P
h
.
D.
i
n
t
h
e
field
o
f
lo
w
p
o
we
r
VLS
I
at
Ko
n
e
ru
Lak
sh
m
a
iah
Ed
u
c
a
ti
o
n
F
o
u
n
d
a
ti
o
n
,
Va
d
d
e
sw
a
ra
m
,
G
u
n
tu
r,
A
n
d
h
ra
P
ra
d
e
sh
,
I
n
d
i
a
.
He
r
a
re
a
o
f
i
n
tere
st
is
VLS
I
d
e
sig
n
.
S
h
e
c
a
n
b
e
c
o
n
tac
te
d
a
t
e
m
a
il
:
re
e
th
u
.
a
@g
m
a
il
.
c
o
m
.
Dr
.
Mu
n
u
sw
a
m
y
S
iv
a
K
u
m
a
r
is
wo
rk
i
n
g
a
s
a
n
a
ss
o
c
iate
p
ro
fe
ss
o
r
in
De
p
a
rtme
n
t
o
f
El
e
c
tro
n
ics
a
n
d
Co
m
m
u
n
ica
ti
o
n
En
g
in
e
e
rin
g
,
Ko
n
e
ru
Lak
sh
m
a
iah
Ed
u
c
a
ti
o
n
F
o
u
n
d
a
ti
o
n
.
He
c
o
m
p
lete
d
h
is
P
h
.
D.
in
t
h
e
fiel
d
o
f
lo
w
-
p
o
we
r
VLS
I
fro
m
G
u
lb
a
rg
a
U
n
iv
e
rsit
y
in
2
0
1
6
.
S
imilarly
,
h
e
h
a
s
c
o
m
p
lete
d
h
is
m
a
ste
r'
s
in
th
e
fiel
d
o
f
V
L
S
I
fro
m
Bh
a
ra
th
Un
i
v
e
rsity
a
t
Ch
e
n
n
a
i
i
n
2
0
0
5
.
He
h
a
s
p
u
b
l
ish
e
d
m
o
re
th
a
n
6
0
p
a
p
e
rs,
2
P
a
ten
ts,
h
is
H
-
I
n
d
e
x
is
1
5
,
&
Cit
a
ti
o
n
s
a
re
m
o
re
th
a
n
3
7
1
+
.
He
is
a
re
v
iew
e
r
fo
r
se
v
e
ra
l
jo
u
r
n
a
ls.
In
a
d
d
it
io
n
t
o
th
e
p
a
p
e
rs,
h
e
h
a
d
c
o
m
p
lete
d
o
n
e
g
o
v
e
r
n
m
e
n
t
-
fu
n
d
e
d
p
ro
jec
t.
In
tere
ste
d
re
se
a
rc
h
a
re
a
:
M
EM
S
-
m
o
d
e
ll
in
g
,
fa
b
rica
ti
o
n
a
n
d
c
h
a
ra
c
teriz
a
ti
o
n
,
lo
w
p
o
we
r
VLS
I
,
a
n
ten
n
a
s
,
a
n
d
fil
ters
.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
m
siv
a
k
u
m
a
r@k
lu
n
iv
e
rsit
y
.
i
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.