نتایج جستجو برای: stream function

تعداد نتایج: 1264642  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

2004
Willi Meier Enes Pasalic Claude Carlet

Algebraic attacks on LFSR-based stream ciphers recover the secret key by solving an overdefined system of multivariate algebraic equations. They exploit multivariate relations involving key bits and output bits and become very efficient if such relations of low degrees may be found. Low degree relations have been shown to exist for several well known constructions of stream ciphers immune to al...

2007
Roger S. Barga Jonathan Goldstein Mohamed H. Ali Mingsheng Hong

From 06.05. to 11.05.2007, the Dagstuhl Seminar 07191 Event Processing was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put...

Journal: :J. Applied Mathematics 2011
Thanaa El Naqeeb Rudi Schmitz

We consider low-Reynolds-number axisymmetric flow about two spheres using a novel, biharmonic stream function. This enables us to calculate analytically not only the forces, but also the dipole moments stresslets and pressure moments and the associated resistance functions. In this paper the basics properties of axisymmetric flow and the stream function are discussed. Explicit series expansions...

2000
Anne Canteaut Eric Filiol

This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift registers combined by a nonlinear Boolean function. It is shown how to completely recover the different feedback polynomials and the combining function, when the algorithm is totally unknown. This attack only requires...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید