929 resultados para polynomial identities


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An anonymous membership broadcast scheme is a method in which a sender broadcasts the secret identity of one out of a set of n receivers, in such a way that only the right receiver knows that he is the intended receiver, while the others can not determine any information about this identity (except that they know that they are not the intended ones). In a w-anonymous membership broadcast scheme no coalition of up to w receivers, not containing the selected receiver, is able to determine any information about the identity of the selected receiver. We present two new constructions of w-anonymous membership broadcast schemes. The first construction is based on error-correcting codes and we show that there exist schemes that allow a flexible choice of w while keeping the complexities for broadcast communication, user storage and required randomness polynomial in log n,. The second construction is based on the concept of collision-free arrays, which is introduced in this paper. The construction results in more flexible schemes, allowing trade-offs between different complexities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Firm-customer digital connectedness for effective sensing and responding is a strategic imperative for contemporary competitive firms. This research-in-progress paper conceptualizes and operationalizes the firm-customer mobile digital connectedness of a smart-mobile customer. The empirical investigation focuses on mobile app users and the impact of mobile apps on customer expectations. Based on pilot data collected from 127 customers, we tested hypotheses pertaining to firm-customer mobile digital connectedness and customer expectations. Our test analysis using linear and non-linear postulations reveals those customers raise their expectations as they increase their digital interactions with a firm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recent growth of the coal seam gas industry has increased pressure on regional communities. Debate surrounding the industry is intense and a social licence to operate has yet to be granted to the industry in its entirety. This article presents an analysis of social issues surrounding the coal seam gas industry, making comparisons between two case studies: the Ranger and Jabiluka mines and the Yandicoogina mine. It presents the results of a desktop study, focussed on three topics: community identity; procedural justice and distributive justice, which provides a means for comparison and draws attention to central concerns. It is found that: power imbalances; changing community identities; potentially inequitable distributions of long term benefits and the process to distribute those benefits and negative perceptions of the industry as a whole serve to undermine the provision of a social licence to operate by communities and has the potential to impose significant negative impacts on companies within the industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Woods Bagot 2007 refurbishment of the Qantas and British Airways Bangkok Business lounge in the Survarnabhumi Airport features wall finishes designed by wallpaper designer, Florence Broadhurst (1899-1977) and Thai Silk trader, Jim Thompson (1906-1967). This distinctive selection, which is proclaimed on the airport’s website, of patterned wall surfaces side by side draws attention to their striking similarities and their defining differences . Thompson and Broadhurst would appear to be worlds apart, but here in the airport their work brings them together. Thompson, the son of a wealthy cotton family in America, worked as an architect before joining the army. He moved to Bangkok to start The Thai Silk Company in 1948. Broadhurst was born on a farm in Mt. Perry, Queensland. She began her career as a performance artist, as part of an Australian troupe in Shanghai, moving onto pursue a career in fashion design, catering to the middle and upper classes in London. Upon her return to Australia, Broadhurst started a print design company in 1959. Both Broadhurst and Thompson pursued multiple careers, lived many lives, and died under mysterious circumstances. Broadhurst was murdered in 1977 at her Sydney print warehouse, which remains an unsolved crime. Thompson disappeared in Malaysia in 1967 and his body has never been found. This chapter investigates the parallels between Thompson and Broadhurst and what lead them to design such popular patterns for wall surfaces towards the end of their careers. While neither designer was a household name, their work is familiar to most, seen in the costume and set design of films, on the walls of restaurants and cafes and even in family homes. The reason for the popularity of their patterns has not previously been analysed. However, this chapter suggests that the patterns are intriguing because they contain something of their designers’ identities. It suggests that the coloured surface provides a way of camouflaging and hiding its subjects’ histories, such that Broadhurst and Thompson, consciously or unconsciously, used the patterned surface as a plane in which their past lives could be buried. The revealing nature of the stark white wall, compared with the forgiveness provided by the pattern in which to hide, is elaborated by painter and advocate for polychromatic architecture, Fernand Léger in his essay, “The Wall, The Architect, The Painter (1965).” Léger writes that, “the modern architect has gone too far in his magnificent attempts to cleanse through emptiness,” and that the resultant white walls of modernity create ‘an impalpability of air, of slick, brilliant new surfaces where nothing can be hidden any longer …even shadows don’t dare to enter’. To counter the exposure produced by the white wall, Thompson and Broadhurst designed patterned surfaces that could harbour their personal histories. Broadhurst and Thompson’s works share a number of commonalities in their design production, even though their work in print design commenced a decade apart. Both designers opted to work more with traditional methods of pattern making. Broadhurst used hand-operated screens, and Thompson outsourced work to local weavers and refrained from operating out of a factory. Despite humble beginnings, Broadhurst and Thompson enjoyed international success with their wall patterns being featured in a number of renowned international hotels in Bahrain, Singapore, Sydney, and London in the 1970s and 1980s. Their patterns were also transferred to fabric for soft furnishings and clothing. Thompson’s patterns were used for costumes in films including the King and I and Ben Hur. Broadhurst’s patterns were also widely used by fashion designers and artists, such as Akira Isogowa‘s costume design for Salome, a 1998 production by the Sydney Dance Company. Most recently her print designs have been used by skin illustrator Emma Hack, in a series of works painting female bodies into Broadhurst’s patterns. Hack’s works camouflage the models’ bodies into the patterned surface, assimilating subject and surface, hinting at there being something living within the patterned wall. More than four decades after Broadhurst’s murder and five decades since Thompson’s disappearance, their print designs persist as more than just a legacy. They are applied as surface finishes with the same fervour as when the designs were first released. This chapter argues that the reason for the ongoing celebration of their work is that there is the impalpable presence of the creator in the patterns. It suggests that the patterns blur the boundary between subject and surface.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thin plate spline finite element methods are used to fit a surface to an irregularly scattered dataset [S. Roberts, M. Hegland, and I. Altas. Approximation of a Thin Plate Spline Smoother using Continuous Piecewise Polynomial Functions. SIAM, 1:208--234, 2003]. The computational bottleneck for this algorithm is the solution of large, ill-conditioned systems of linear equations at each step of a generalised cross validation algorithm. Preconditioning techniques are investigated to accelerate the convergence of the solution of these systems using Krylov subspace methods. The preconditioners under consideration are block diagonal, block triangular and constraint preconditioners [M. Benzi, G. H. Golub, and J. Liesen. Numerical solution of saddle point problems. Acta Numer., 14:1--137, 2005]. The effectiveness of each of these preconditioners is examined on a sample dataset taken from a known surface. From our numerical investigation, constraint preconditioners appear to provide improved convergence for this surface fitting problem compared to block preconditioners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The foliage of a plant performs vital functions. As such, leaf models are required to be developed for modelling the plant architecture from a set of scattered data captured using a scanning device. The leaf model can be used for purely visual purposes or as part of a further model, such as a fluid movement model or biological process. For these reasons, an accurate mathematical representation of the surface and boundary is required. This paper compares three approaches for fitting a continuously differentiable surface through a set of scanned data points from a leaf surface, with a technique already used for reconstructing leaf surfaces. The techniques which will be considered are discrete smoothing D2-splines [R. Arcangeli, M. C. Lopez de Silanes, and J. J. Torrens, Multidimensional Minimising Splines, Springer, 2004.], the thin plate spline finite element smoother [S. Roberts, M. Hegland, and I. Altas, Approximation of a Thin Plate Spline Smoother using Continuous Piecewise Polynomial Functions, SIAM, 1 (2003), pp. 208--234] and the radial basis function Clough-Tocher method [M. Oqielat, I. Turner, and J. Belward, A hybrid Clough-Tocher method for surface fitting with application to leaf data., Appl. Math. Modelling, 33 (2009), pp. 2582-2595]. Numerical results show that discrete smoothing D2-splines produce reconstructed leaf surfaces which better represent the original physical leaf.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Environmental Kuznets Curve (EKC) hypothesises an inverse U-shaped relationship between a measure of environmental pollution and per capita income levels. In this study, we apply non-parametric estimation of local polynomial regression (local quadratic fitting) to allow more flexibility in local estimation. This study uses a larger and globally representative sample of many local and global pollutants and natural resources including Biological Oxygen Demand (BOD) emission, CO2 emission, CO2 damage, energy use, energy depletion, mineral depletion, improved water source, PM10, particulate emission damage, forest area and net forest depletion. Copyright © 2009 Inderscience Enterprises Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis extends current understanding in management consulting research by investigating the ways in which management consultants and their clients shaped knowing over the course of nine different consulting engagements. The research illuminates the client experience of using consulting knowledge in organisations, and proposes a theoretical reconceptualisation of knowledge shaping in consulting engagements which incorporates how the knowing client is enacted. The research shows that knowledge shaping activities are planned and enacted to support novelty reduction in consulting engagements; that asymmetries in the structuring of the consultant–client relationship hamper knowledge transformation and the establishment of knowing; and that understanding of how the role identities of consultants and clients are established and maintained over the course of an engagement is integral to understanding knowledge shaping in consulting engagements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a novel scheme for carrying out speaker diarization in an iterative manner. We aim to show that the information obtained through the first pass of speaker diarization can be reused to refine and improve the original diarization results. We call this technique speaker rediarization and demonstrate the practical application of our rediarization algorithm using a large archive of two-speaker telephone conversation recordings. We use the NIST 2008 SRE summed telephone corpora for evaluating our speaker rediarization system. This corpus contains recurring speaker identities across independent recording sessions that need to be linked across the entire corpus. We show that our speaker rediarization scheme can take advantage of inter-session speaker information, linked in the initial diarization pass, to achieve a 30% relative improvement over the original diarization error rate (DER) after only two iterations of rediarization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study reports the construction and reconstruction of identities of new and existing employees during a significant transition phase of a nuclear engineering organization. We followed a group of new and existing employees over the period of three years, during which the organization constructed a greenfield nuclear facility with new generational technologies whilst in parallel, decommissioned the older reactor. This change led to the transfer and integration of existing trade-based employees with the newly recruited, primarily university educated graduates in the new site. Three waves of interview data were collected, in conjunction with the cognitive mapping of social grouping and photo elicitation portrayed the stories of different group of employees who either succeeded or failed at embracing their new professional identity. In contrast with the new recruits who constructed new identities as they join this organization, we identify and report on the number of enabling and disabling factors that influence the process of professional identity construction and reconstruction during gamma change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A series of large-scale photographic collages and videoworks installed in the 2010 The Beauty Of Distance: Songs of Survival in a Precarious Age, Sydney Biennale Cockatoo Island, Sydney (cat.)The work addresses her ongoing interest in feminist strategies for negotiating individual and collective identities, equality,and social activism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A large scale installation over three gallery spaces that addresses Wymans ongoing in exploring feminist strategies for negotiating individual and collective identities, equality, and social activism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A solo exhibiton of painting, photography, collage and fabric sculpture works that continues Wyman's interest in exploring feminist strategies for negotiating individual and collective identities,equallity and social activism. She explores the idea that the clothed body is often the first point of protest and demonstrates how masks and disguises provide collective power and protection in conflict zones.