نتایج جستجو برای: distinguishing number
تعداد نتایج: 1193552 فیلتر نتایج به سال:
A graph G is said to be d-distinguishable if there is a d-coloring of G which no non-trivial automorphism preserves. That is, 9χ : G !f1; : : : ;dg; 8φ 2 Aut(G)nfidg;9v;χ(v) 6= χ(φ(v)): It was conjectured that if jGj> jAut(G)j and the Aut(G) action on G has no singleton orbits, then G is 2-distinguishable. We give an example where this fails. We partially repair the conjecture by showing that w...
We give interpretations of some known key agreement protocols in the framework of category theory and in this way we give a method of constructing of many new key agreement protocols.
In this paper we will provide two linear approximating for the stream cipher Salsa20, the both are probable to form distinguishing attack with about 64 2 blocks of keystream.
Let Σ be a surface. We prove that rigidity indices of graphs which admit a polyhedral embedding in Σ and 5-connected graphs admitting an embedding in Σ are bounded by a constant depending on Σ. Moreover if the Euler characteristic of Σ is negative, then the separation index of graphs admitting a polyhedral embedding in Σ is also bounded. As a side result we show that distinguishing number of bo...
Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...
An exceptional moduli set Residue Number System (RNS) of high element go (DR) can accelerate the execution of very large word-length tedious increases found in applications like open key cryptography. The modulo 2-1 multiplier is normally the noncritical data path among all modulo multipliers in such high-DR RNS multiplier. This planning slack can be abused to diminish the framework region and ...
Secure group communication (SGC) is becoming more popular in the Internet. Burstiness is an important behavior in SGC. Performing bursty operation in one aggregate operation is important for efficiency and scalability. In this paper, we extend the well-known key-tree key management protocol for SGC to situations with bursty user arrival and departure patterns. By using a binary representation t...
A proper edge colouring of a graph G without isolated edges is neighbour-distinguishing if any two adjacent vertices have distinct sets consisting of colours of their incident edges. The neighbour-distinguishing index of G is the minimum number ndi(G) of colours in a neighbour-distinguishing edge colouring of G. According to a conjecture by Zhang, Liu and Wang (2002), ndi(G) ≤ ∆(G) + 2 provided...
Distinguishing patterns represent strong distinguishing knowledge and are very useful for constructing powerful, accurate and robust classifiers. The distinguishing graph patterns(DGPs) are able to capture structure differences between any two categories of graph datasets. Whereas, few previous studies worked on the discovery of DGPs. In this paper, as the first, we study the problem of mining ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید