نتایج جستجو برای: distinguishing number
تعداد نتایج: 1193552 فیلتر نتایج به سال:
The distinguishing number ∆(X) of a graph X is the least positive integer n for which there exists a function f : V (X) → {0, 1, 2, · · · , n−1} such that no nonidentity element of Aut(X) fixes (setwise) every inverse image f−1(k), k ∈ {0, 1, 2, · · · , n − 1}. All infinite, locally finite trees without pendant vertices are shown to be 2distinguishable. A proof is indicated that extends 2-disti...
Non-penetrating injuries have become one of the leading causes of death as the number of accidents involving motor vehicles iscreases every day. Dissection of the descending thoracic aorta is the most dangerous injury in trauma surgeries and because of its numerous clinical presentations it mimics various medical and surgical conditions. Paraplegia is one of its rare presentations and has ...
let g=(v,e) be a graph with vertex set v and edge set e.for two vertices u,v of g ,the closed interval i[u,v] ,consists of u,v and all vertices lying in some u-v geodesic in g.if s is a set of vertices of g then i[s]is the union of all sets i[u,v]for u,v ? s. if i[s]=v(g) , then s is a geodetic set for g.the geodetic number g(g) is the minimum cardinality of geodetic set.the maximum cardinalit...
The point-distinguishing chromatic index of a graph represents the minimum number of colours in its edge colouring such that each vertex is distinguished by the set of colours of edges incident with it. Asymptotic information on jumps of the point-distinguishing chromatic index of Kn,n is found.
A proper edge coloring of a simple graph G is called vertex-distinguishing if no two distinct vertices are incident to the same set of colors. We prove that the minimum number of colors required for a vertex-distinguishing coloring of a random graph of order n is almost always equal to the maximum degree ∆(G) of the graph.
This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 2 words of known key stream and has a time complexity of about 2.
Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2. Our analysis in this paper, is based on chosen IV analysis on reduced N-S round of Rabbit though using multi cube tester. For this purpose we show for a...
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM, we first point out that GCM-SIV allows a trivial distinguishing attack with about 248 queries, where each query has one plaintext block. This shows the tightness of the security claim and does not...
————— Gordon D. Logan, Vanderbilt University; Darryl W. Schneider, Carnegie Mellon University. This research was supported by grant BCS-0957074 from the National Science Foundation. Correspondence concerning this article should be addressed to Gordon D. Logan, Department of Psychology, Vanderbilt University, Nashville TN 37203, USA. E-mail: gordon.logan@ vanderbilt.edu or to Darryl W. Schneider...
In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom permutation (PRP) blockcipher, and POET [3], based on Almost XOR-Universal (AXU) hash and strong pseudorandom permutation (SPRP), were proposed. Few weeks later, COBRA mode and a simple variant of the original proposal of POET (due to a forging attack [13] on the original proposal) with AES as an underlying blockciph...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید