نتایج جستجو برای: block size decision

تعداد نتایج: 1031019  

2013
Jooyoung Lee

This paper discusses provable security of two types of cascade encryptions. The first construction CE, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with independent keys. The security of CE has been a longstanding open problem until Gaži and Maurer [9] proved its security up to 2κ+min{ n 2 ,κ} query complexity for large cascading length, where κ and n d...

2014
Asli Bay Jialin Huang Serge Vaudenay

MIBS is a 32-round lightweight block cipher with 64-bit block size and two different key sizes, namely 64-bit and 80-bit keys. Bay et al. provided the first impossible differential, differential and linear cryptanalyses of MIBS. Their best attack was a linear attack on the 18-round MIBS-80. In this paper, we significantly improve their attack by discovering more approximations and mounting Herm...

2006
J. P. Morgan Valentin Parvu

Intense combinatorial study of balanced incomplete block designs since the time of Fisher and Yates has led to a great many designs with the same numbers of treatments, blocks, and block size. While the basic analysis does not differentiate among different BIBDs with the same parameters, they do differ in their capacity to withstand loss of experimental material. Competing BIBDs are compared he...

Journal: :Australasian J. Combinatorics 1999
Charles J. Colbourn Alan C. H. Ling

Constructions of balanced sampling plans excluding contiguous units, a class of designs introduced by Hedayat, Rao and Stufken, are given which provide a complete solution to this problem when k = 4.

Journal: :Australasian J. Combinatorics 1996
Margaret Ann Francel Dinesh G. Sarvate

Abstract T emory designs with replication numbers all or all but one of the values in the range 1\(V-1J/(K-l} to 1\(V-l)/(K-2) are studied. It is known that for K=3 and replication numbers all values in the range 1\{V-l) /(K-l J to 1\(V-l }/(K-2J, designs exist if and only if 1\=2. Here we show the uniqueness of such designs. When K=3 and all values in the range 1\(V-l J/(K-l) to 1\(V-l )/(K-2)...

Journal: :Discrete Mathematics 2006
R. A. Bailey Peter J. Cameron Peter Dobcsányi John P. Morgan Leonard H. Soicher

In 2001, the United Kingdom Engineering and Physical Sciences Research Council awarded three of the authors of this paper a grant for “A Web-based resource for design theory”. As the project developed, we have had to face a number of problems, ranging from fundamental questions such as “What is a design?”, through research topics such as “How should the concept of partial balance be extended to...

Journal: :Des. Codes Cryptography 2005
Behruz Tayfeh-Rezaie

In this paper, we use the known recursive construction methods to obtain some new existence results for large sets of t-designs of prime sizes. We also present a new recursive construction which leads to more comprehensive theorems on large sets of sizes two and three. As an application, we show that for infinitely many values of block size, the trivial necessary conditions for the existence of...

Journal: :CoRR 2014
V. S. Usatyuk

This article present a application of Block Korkin---Zolotarev lattice reduction method for Lattice Reduction---Aided decoding under MIMO---channel. We give a upper bound estimate on the lattice reduced by block Korkin---Zolotarev method (BKZ) for different value of the block size and detecting by SIC.

Journal: :Electr. J. Comb. 2011
R. Julian R. Abel Diana Combe Adrian M. Nelson William D. Palmer

There are well known necessary conditions for the existence of a generalized Bhaskar Rao design over a group G, with block size k = 3. We prove that they are sufficient for nilpotent groups G of even order, and in particular for 2-groups. In addition, we prove that they are sufficient for semi-dihedral groups.

Journal: :CoRR 2008
Mark de Berg Shripad Thite

Let X[0..n− 1] and Y [0..m− 1] be two sorted arrays, and define the m × n matrix A by A[j][i] = X[i] + Y [j]. Frederickson and Johnson [7] gave an efficient algorithm for selecting the kth smallest element from A. We show how to make this algorithm IO-efficient. Our cache-oblivious algorithm performs O((m + n)/B) IOs, where B is the block size of memory transfers.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید