12 resultados para Embedded derivative
em Bulgarian Digital Mathematics Library at IMI-BAS
Resumo:
We consider the existence and uniqueness problem for partial differential-functional equations of the first order with the initial condition for which the right-hand side depends on the derivative of unknown function with deviating argument.
Resumo:
The paper is devoted to the study of the Cauchy problem for a nonlinear differential equation of complex order with the Caputo fractional derivative. The equivalence of this problem and a nonlinear Volterra integral equation in the space of continuously differentiable functions is established. On the basis of this result, the existence and uniqueness of the solution of the considered Cauchy problem is proved. The approximate-iterative method by Dzjadyk is used to obtain the approximate solution of this problem. Two numerical examples are given.
Resumo:
2000 Mathematics Subject Classification: 35A15, 44A15, 26A33
Resumo:
2000 Mathematics Subject Classification: 26A33, 33C60, 44A15, 35K55
Resumo:
Mathematics Subject Classification: 26A33, 34A37.
Resumo:
2000 Math. Subject Classification: 26A33; 33E12, 33E30, 44A15, 45J05
Resumo:
Mathematics Subject Classification: 33D60, 33E12, 26A33
Resumo:
AMS Subj. Classification: MSC2010: 11F72, 11M36, 58J37
Resumo:
Mathematics Subject Classification 2010: 35M10, 35R11, 26A33, 33C05, 33E12, 33C20.
Resumo:
2000 Mathematics Subject Classification: 14B05, 32S25.
Resumo:
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes. The experiments with a backtracking search algorithm performing this kind of attack against modified DES/Triple-DES in ECB mode show that the unknown plaintext can be recovered with a small amount of uncertainty and this algorithm is highly efficient both in time and memory costs for plaintext sources with relatively low entropy. Our investigations demonstrate once again that modifications resulting to S-boxes which still satisfy some design criteria may lead to very weak ciphers. ACM Computing Classification System (1998): E.3, I.2.7, I.2.8.