نتایج جستجو برای: distinguishing number

تعداد نتایج: 1193552  

Journal: :Electr. J. Comb. 2007
Mark E. Watkins Xiangqian Zhou

The distinguishing number ∆(X) of a graph X is the least positive integer n for which there exists a function f : V (X) → {0, 1, 2, · · · , n−1} such that no nonidentity element of Aut(X) fixes (setwise) every inverse image f−1(k), k ∈ {0, 1, 2, · · · , n − 1}. All infinite, locally finite trees without pendant vertices are shown to be 2distinguishable. A proof is indicated that extends 2-disti...

حاجی اسماعیلی, محمدرضا , متفکر , مصطفی , مروتی , علی اکبر , پاکدل , سعید ,

Non-penetrating injuries have become one of the leading causes of death as the number of accidents involving motor vehicles iscreases every day. Dissection of the descending thoracic aorta is the most dangerous injury in trauma surgeries and because of its numerous clinical presentations it mimics various medical and surgical conditions. Paraplegia is one of its rare presentations and has ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده علوم پایه 1392

let g=(v,e) be a graph with vertex set v and edge set e.for two vertices u,v of g ,the closed interval i[u,v] ,consists of u,v and all vertices lying in some u-v geodesic in g.if s is a set of vertices of g then i[s]is the union of all sets i[u,v]for u,v ? s. if i[s]=v(g) , then s is a geodetic set for g.the geodetic number g(g) is the minimum cardinality of geodetic set.the maximum cardinalit...

Journal: :Discussiones Mathematicae Graph Theory 1997
Mirko Hornák Roman Soták

The point-distinguishing chromatic index of a graph represents the minimum number of colours in its edge colouring such that each vertex is distinguished by the set of colours of edges incident with it. Asymptotic information on jumps of the point-distinguishing chromatic index of Kn,n is found.

Journal: :Random Struct. Algorithms 2002
Paul N. Balister

A proper edge coloring of a simple graph G is called vertex-distinguishing if no two distinct vertices are incident to the same set of colors. We prove that the minimum number of colors required for a vertex-distinguishing coloring of a random graph of order n is almost always equal to the maximum degree ∆(G) of the graph.

2001
Daniel Bleichenbacher Willi Meier

This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 2 words of known key stream and has a time complexity of about 2.

Journal: :IACR Cryptology ePrint Archive 2013
Nasser Ramazani Darmian

Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2. Our analysis in this paper, is based on chosen IV analysis on reduced N-S round of Rabbit though using multi cube tester. For this purpose we show for a...

Journal: :IACR Cryptology ePrint Archive 2016
Tetsu Iwata Kazuhiko Minematsu

At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM, we first point out that GCM-SIV allows a trivial distinguishing attack with about 248 queries, where each query has one plaintext block. This shows the tightness of the security claim and does not...

2010
Darryl W. Schneider Gordon D. LOGAN Darryl W. SCHNEIDER

————— Gordon D. Logan, Vanderbilt University; Darryl W. Schneider, Carnegie Mellon University. This research was supported by grant BCS-0957074 from the National Science Foundation. Correspondence concerning this article should be addressed to Gordon D. Logan, Department of Psychology, Vanderbilt University, Nashville TN 37203, USA. E-mail: gordon.logan@ vanderbilt.edu or to Darryl W. Schneider...

Journal: :IACR Cryptology ePrint Archive 2014
Mridul Nandi

In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom permutation (PRP) blockcipher, and POET [3], based on Almost XOR-Universal (AXU) hash and strong pseudorandom permutation (SPRP), were proposed. Few weeks later, COBRA mode and a simple variant of the original proposal of POET (due to a forging attack [13] on the original proposal) with AES as an underlying blockciph...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید