نتایج جستجو برای: route

تعداد نتایج: 68491  

Journal: :IACR Cryptology ePrint Archive 2011
Ming Duan Xuejia Lai

Keccak is one of the five hash functions selected for the final round of the SHA-3 competition and its inner primitive is a permutation called Keccakf . In this paper, we find that for the inverse of the only one nonlinear transformation of Keccak-f , the algebraic degrees of any output coordinate and of the product of any two output coordinates are both 3 and also 2 less than its size 5. Combi...

Journal: :IACR Cryptology ePrint Archive 2015
Santanu Sarkar

In Asiacrypt 2010, Knellwolf, Meier and Naya-Plasencia proposed distinguishing attacks on Grain v1 when (i) Key Scheduling process is reduced to 97 rounds using 2 chosen IVs and (ii) Key Scheduling process is reduced to 104 rounds using 2 chosen IVs. Using similar idea, Banik obtained a new distinguisher for 105 rounds. In this paper, we show similar approach can work for 106 rounds. We present...

Journal: :IJSIR 2011
Pawel Paduch Krzysztof Sapiecha

This paper presents a new algorithm for solving the generalized watchman problem. It is the problem of mobile robot operators that must find the shortest route for the robot to see the whole area with many obstructions. The algorithm adapts the well-known ant algorithm to the new problem. An experiment where the algorithm is applied to an area containing more than 10 obstructions is described. ...

1981
ABBAS A. EL GAMAL ZAHIR A. SYED

A stochastic model for interconnections in integrated circuits composed of unequal size logic blocks separated by routing channels is described. An algorithm, based on the model, is given for estimating channel widths and chip area. The effectiveness of the algorithm is tested through an example. Applications of the model to placement and routing of integrated circuits are discussed.

2007
François Macé François-Xavier Standaert Jean-Jacques Quisquater

ion Layers logic transistor layout physical L L L L e.g. Hamming weight assumption e.g. single gates simulation e.g. post place and route simulations e.g. actual measurements implementation protocol algorithm Circuit abstraction levels ⇔ useful for a simulation based approach Limit due to : Going deeper in the abstraction levels ⇒ different amount of information due to more realistic scenarios....

2012
Tao Liu Hirofumi Saito Misato Oi Matthew Pelowski

Social facilitation and social support literature, diverging with regards to increasing versus decreasing of an individual’s tension, apprehend different aspects of “the presence of others.” To examine the neural correlates of social presence effects, whether “the presence of others” increases or decreases an individual’s tension, we measured prefrontal activation while participants performed a...

2008
Serge Vaudenay

Cryptography often meets the problem of distinguishing distributions. In this paper we review techniques from hypothesis testing to express the advantage of the best distinguisher limited to a given number of samples. We link it with the Chernoff information and provide a useful approximation based on the squared Euclidean distance. We use it to extend linear cryptanalysis to groups with order ...

2006
Kaisa Nyberg Johan Wallén

In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we also find a new linear distinguisher with bias 2−86.9 that is significantly stronger than the previously found ones by Watanabe et al. (2003) and makes it possible to distinguish the output keystream of SNOW 2.0 of lengt...

2015
Jérémy Jean Ivica Nikolic

We introduce internal differential boomerang distinguisher as a combination of internal differentials and classical boomerang distinguishers. The new boomerangs can be successful against cryptographic primitives having high-probability round-reduced internal differential characteristics. The internal differential technique, which follow the evolution of differences between parts of the state, i...

Journal: :IACR Cryptology ePrint Archive 2012
Sébastien Tiran Philippe Maurine

Magnitude Squared Coherence is a signal processing tool that indicates how well two time domain signals match one with the other by tracking linear dependencies in their spectral decomposition. This paper introduces different ways of using the Magnitude Squared Coherence for Side Channel Analysis. This distinguisher has several advantages over well-known distinguishers.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید