A Bridge of Bits

نویسنده

  • Norman Margolus
چکیده

Cellular Automata are discrete physics-like systems that can be exactly simulated by digital hardware. These systems can incorporate many realistic physical constraints and still be capable of performing digital computation. Such systems bridge the boundary between physical models and computational models, and so can play a central role in investigating the relevance of physical ideas to the theory and practice of computation, and computational ideas to the construction and use of physical models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

A Low Complexity Forward Error Correction for PAPR reduction in OFDM Systems

In this paper, a Peak to Average Power Ratio (PAPR) reduction technique in Orthogonal Frequency Division Multiplexing (OFDM) systems is proposed. This technique uses error correction capability of channel coding to reduce the PAPR.The coded bits at the input of OFDM modulator are separated into two groups of the Most Significant Bits (MSB) and the LeastSignificant Bits (LSB). The bits are mappe...

متن کامل

Strong Secrecy for Wireless Channels

Recent theoretical a potential to signifi information-theoreti concerns, which we community that a s bits from a block o protected data. Even information bits can information-theoreti weak notion of secre ultimate secrecy ra namely one which b bridge the existing security, we present criterion. As in the formulation. The ex

متن کامل

The Effect of Sucking Ice Bits on Nausea and Vomiting During Chemotherapy in Patients with Breast Cancer

Objective Cancer disease and its treatment methods affect the quality of life of those suffering from breast cancer. Nausea and vomiting are frequent side-effects of chemotherapy. Nowadays, complementary therapies are used along with routine treatments to control this disease. This study aimed to evaluate the effect of sucking ice bits with plain water on nausea and vomiting during chemotherapy...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002