نتایج جستجو برای: fuzzylinear di erential equations
تعداد نتایج: 491917 فیلتر نتایج به سال:
The semi-implicit Euler discretization method is studied for abstract evolution equations in a Hilbert space H, like _ u = f(t; u; u) ; t 2 (0; T ] ; u(0) = u0, where f(t; ; v) is one-sided Lipschitz and R(I hf(t; ; v)) = H for h > 0 su ciently small, and f(t; u; ) is Lipschitz-continuous. Extension to Banach spaces is then pointed out. Ordinary and partial , di erential and integro-di erential...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...
We consider di erent situations of blowup in sup norm for hyper bolic equations For scalar conservation laws with a source the asymptotic pro le of the solution close to a blowup point is described in detail Based on an example of Je rey we next show how blowup for ordinary di erential equations can be used to construct examples of blowup for systems of hy perbolic equations Finally we outline ...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...
The vebrane worldvolume theory in eleven dimensions is known to contain BPS threebrane solitons which can also be interpreted as a vebrane whose worldvolume is wrapped around a Riemann surface. By considering con gurations of intersecting vebranes and hence intersecting threebrane solitons, we determine the Bogomol'nyi equations for more general BPS con gurations. We obtain di erential equation...
A formal correspondence is established between the curvature theory of generalized implicit hypersurfaces, the classical theory of electromagnetism as expressed in terms of exterior di®erential systems, and thermodynamics. Starting with a generalized implicit surface whose normal ̄eld is represented by an exterior di®erential 1-form, it is possible to deduce the curvature invariants of the impl...
Our goal in this paper is to use combined Laplace transform (CLT) and Adomian decomposition method(ADM) (that will be explained section 3), study approximate solutions for non-linear time-fractionalBurger's equation, fractional Burger's Kdv equation the modi?ed theCaputo Conformable derivatives. Comparison between two exact solution made.Here we report that method (LTDM) proved e?cient beused o...
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...
We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...
We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید