A Bridge of Bits
نویسنده
چکیده
Cellular Automata are discrete physics-like systems that can be exactly simulated by digital hardware. These systems can incorporate many realistic physical constraints and still be capable of performing digital computation. Such systems bridge the boundary between physical models and computational models, and so can play a central role in investigating the relevance of physical ideas to the theory and practice of computation, and computational ideas to the construction and use of physical models.
منابع مشابه
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملA Low Complexity Forward Error Correction for PAPR reduction in OFDM Systems
In this paper, a Peak to Average Power Ratio (PAPR) reduction technique in Orthogonal Frequency Division Multiplexing (OFDM) systems is proposed. This technique uses error correction capability of channel coding to reduce the PAPR.The coded bits at the input of OFDM modulator are separated into two groups of the Most Significant Bits (MSB) and the LeastSignificant Bits (LSB). The bits are mappe...
متن کاملStrong Secrecy for Wireless Channels
Recent theoretical a potential to signifi information-theoreti concerns, which we community that a s bits from a block o protected data. Even information bits can information-theoreti weak notion of secre ultimate secrecy ra namely one which b bridge the existing security, we present criterion. As in the formulation. The ex
متن کاملThe Effect of Sucking Ice Bits on Nausea and Vomiting During Chemotherapy in Patients with Breast Cancer
Objective Cancer disease and its treatment methods affect the quality of life of those suffering from breast cancer. Nausea and vomiting are frequent side-effects of chemotherapy. Nowadays, complementary therapies are used along with routine treatments to control this disease. This study aimed to evaluate the effect of sucking ice bits with plain water on nausea and vomiting during chemotherapy...
متن کاملImpossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002