976 resultados para algebraic lattice


Relevância:

10.00% 10.00%

Publicador:

Resumo:

At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

High-energy synchrotron in situ X-ray powder diffraction has been used to elucidate the mechanism of the hydriding phase transformation in a LaNi5 model hydrogen storage intermetallic in real time. The transformation proceeds at 10 °C via the transient growth of an interfacial phase, the γ phase, with lattice parameters intermediate between those of the α (dilute solid solution) and β (concentrated hydride) phases. The γ phase forms to partially accommodate the 24% change in unit cell volume between the α and β phases during hydriding and dehydriding. The α, γ and β phases coexist at the nanoscopic level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the problem of position regulation of a class of underactuated rigid-body vehicles that operate within a gravitational field and have fully-actuated attitude. The control objective is to regulate the vehicle position to a manifold of dimension equal to the underactuation degree. We address the problem using Port-Hamiltonian theory, and reduce the associated matching PDEs to a set of algebraic equations using a kinematic identity. The resulting method for control design is constructive. The point within the manifold to which the position is regulated is determined by the action of the potential field and the geometry of the manifold. We illustrate the performance of the controller for an unmanned aerial vehicle with underactuation degree two-a quadrotor helicopter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The basic principles and equations are developed for elementary finance, based on the concept of compound interest. The five quantities of interest in such problems are present value, future value, amount of periodic payment, number of periods and the rate of interest per period. We consider three distinct means of computing each of these five quantities in Excel 2007: (i) use of algebraic equations, (ii) by recursive schedule and the Goal Seek facility, and (iii) use of Excel's intrinsic financial functions. The paper is intended to be used as the basis for a lesson plan and contains many examples and solved problems. Comment is made regarding the relative difficulty of each approach, and a prominent theme is the systematic use of more than one method to increase student understanding and build confidence in the answer obtained. Full instructions to build each type of model are given and a complete set of examples and solutions may be downloaded (Examples.xlsx and Solutions.xlsx).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report studies an algebraic equation whose solution gives the image system of a source of light as seen by an observer inside a reflecting spherical surface. The equation is looked at numerically using GeoGebra. Under the hypothesis that our galaxy is enveloped by a reflecting interface this becomes a possible model for many mysterious extra galactic observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-boxes for stream or block ciphers, were recently introduced. They are related to a divide-and-conquer approach to algebraic attacks by conditional or unconditional equations. Classical resiliency turns out to be a special case of extended resiliency and as such requires more conditions to be satisfied. In particular, the algebraic degrees of classically resilient S-boxes are restricted to lower values. In this paper, extended immunity and extended resiliency of S-boxes are studied and many characterisations and properties of such S-boxes are established. The new criteria are shown to be necessary and sufficient for resistance against the divide-and-conquer algebraic attacks by conditional or unconditional equations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article elucidates and analyzes the fundamental underlying structure of the renormalization group (RG) approach as it applies to the solution of any differential equation involving multiple scales. The amplitude equation derived through the elimination of secular terms arising from a naive perturbation expansion of the solution to these equations by the RG approach is reduced to an algebraic equation which is expressed in terms of the Thiele semi-invariants or cumulants of the eliminant sequence { Zi } i=1 . Its use is illustrated through the solution of both linear and nonlinear perturbation problems and certain results from the literature are recovered as special cases. The fundamental structure that emerges from the application of the RG approach is not the amplitude equation but the aforementioned algebraic equation. © 2008 The American Physical Society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ferromagnetism in graphene is fascinating, but it is still a big challenge for practical applications due to the weak magnetization. In order to enhance the magnetization, here, we design plasma-enabled graphene nanopetals with ultra-long defective edges of up to 105 m/g, ultra-dense lattice vacancies, and hydrogen chemisorptions. The designed graphene nanopetals display robust ferromagnetism with large saturation magnetization of up to 2 emu/g at 5 K and 1.2 emu/g at room temperatures. This work identifies the plasma-enabled graphene nanopetals as a promising candidate for graphene-based magnetic devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The highly unusual structural and electronic properties of the α-phase of (Si1-xCx)3N4 are determined by density functional theory (DFT) calculations using the Generalized Gradient Approximation (GGA). The electronic properties of α-(Si 1-xCx)3N4 are found to be very close to those of α-C3N4. The bandgap of α-(Si 1-xCx)3N4 significantly decreases as C atoms are substituted by Si atoms (in most cases, smaller than that of either α-Si3N4 or α-C3N4) and attains a minimum when the ratio of C to Si is close to 2. On the other hand, the bulk modulus of α-(Si1-xCx)3N 4 is found to be closer to that of α-Si3N 4 than of α-C3N4. Plasma-assisted synthesis experiments of CNx and SiCN films are performed to verify the accuracy of the DFT calculations. TEM measurements confirm the calculated lattice constants, and FT-IR/XPS analysis confirms the formation and lengths of C-N and Si-N bonds. The results of DFT calculations are also in a remarkable agreement with the experiments of other authors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Structural stability, electronic, and optical properties of InN under high pressure are studied using the first-principles calculations. The lattice constants and electronic band structure are found consistent with the available experimental and theoretical values. The pressure of the wurtzite-to-rocksalt structural transition is 13.4 GPa, which is in an excellent agreement with the most recent experimental values. The optical characteristics reproduce the experimental data thus justifying the feasibility of our theoretical predictions of the optical properties of InN at high pressures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The results of a study on the influence of the nonparabolicity of the free carriers dispersion law on the propagation of surface polaritons (SPs) located near the interface between an n-type semiconductor and a metal arc reported. The semiconductor plasma is assumed to be warm and nonisothermal. The nonparabolicity of the electron dispersion law has two effects. The first one is associated with nonlinear self-interaction of the SPs. The nonlinear dispersion equation and the nonlinear Schrodinger equation for the amplitude of the SP envelope are obtained. The nonlinear evolution of the SP is studied on the base of the above mentioned equations. The second effect results in third harmonics generation. Analysis shows that these third harmonics may appear as a pure surface polariton, a pseudosurface polariton, or a superposition of a volume wave and a SP depending on the wave frequency, electron density and lattice dielectric constant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.