نتایج جستجو برای: distinguishing number

تعداد نتایج: 1193552  

Journal: :Electr. J. Comb. 1998
Alexander Russell Ravi Sundaram

A graph G is said to be d-distinguishable if there is a d-coloring of G which no non-trivial automorphism preserves. That is, 9χ : G !f1; : : : ;dg; 8φ 2 Aut(G)nfidg;9v;χ(v) 6= χ(φ(v)): It was conjectured that if jGj> jAut(G)j and the Aut(G) action on G has no singleton orbits, then G is 2-distinguishable. We give an example where this fails. We partially repair the conjecture by showing that w...

Journal: :CoRR 2011
Nick Inassaridze Manuel Ladra Tamaz Kandelaki

We give interpretations of some known key agreement protocols in the framework of category theory and in this way we give a method of constructing of many new key agreement protocols.

2005
Li An-Ping

In this paper we will provide two linear approximating for the stream cipher Salsa20, the both are probable to form distinguishing attack with about 64 2 blocks of keystream.

Journal: :Graphs and Combinatorics 2010
Gasper Fijavz Bojan Mohar

Let Σ be a surface. We prove that rigidity indices of graphs which admit a polyhedral embedding in Σ and 5-connected graphs admitting an embedding in Σ are bounded by a constant depending on Σ. Moreover if the Euler characteristic of Σ is negative, then the separation index of graphs admitting a polyhedral embedding in Σ is also bounded. As a side result we show that distinguishing number of bo...

Journal: :IACR Cryptology ePrint Archive 2005
Souradyuti Paul Bart Preneel

Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...

2017
G Siddartha K Chaitanya

An exceptional moduli set Residue Number System (RNS) of high element go (DR) can accelerate the execution of very large word-length tedious increases found in applications like open key cryptography. The modulo 2-1 multiplier is normally the noncritical data path among all modulo multipliers in such high-DR RNS multiplier. This planning slack can be abused to diminish the framework region and ...

2002
Xukai Zou Byrav Ramamurthy Spyros S. Magliveras

Secure group communication (SGC) is becoming more popular in the Internet. Burstiness is an important behavior in SGC. Performing bursty operation in one aggregate operation is important for efficiency and scalability. In this paper, we extend the well-known key-tree key management protocol for SGC to situations with bursty user arrival and departure patterns. By using a binary representation t...

Journal: :Journal of Graph Theory 2014
Mirko Hornák Danjun Huang Wei-Fan Wang

A proper edge colouring of a graph G without isolated edges is neighbour-distinguishing if any two adjacent vertices have distinct sets consisting of colours of their incident edges. The neighbour-distinguishing index of G is the minimum number ndi(G) of colours in a neighbour-distinguishing edge colouring of G. According to a conjecture by Zhang, Liu and Wang (2002), ndi(G) ≤ ∆(G) + 2 provided...

2008
Zhiping Zeng Jianyong Wang Lizhu Zhou

Distinguishing patterns represent strong distinguishing knowledge and are very useful for constructing powerful, accurate and robust classifiers. The distinguishing graph patterns(DGPs) are able to capture structure differences between any two categories of graph datasets. Whereas, few previous studies worked on the discovery of DGPs. In this paper, as the first, we study the problem of mining ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید