نتایج جستجو برای: fuzzylinear di erential equations

تعداد نتایج: 491917  

1997
Renato Spigler

The semi-implicit Euler discretization method is studied for abstract evolution equations in a Hilbert space H, like _ u = f(t; u; u) ; t 2 (0; T ] ; u(0) = u0, where f(t; ; v) is one-sided Lipschitz and R(I hf(t; ; v)) = H for h > 0 su ciently small, and f(t; u; ) is Lipschitz-continuous. Extension to Banach spaces is then pointed out. Ordinary and partial , di erential and integro-di erential...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...

2005
Helge Kristian Jenssen

We consider di erent situations of blowup in sup norm for hyper bolic equations For scalar conservation laws with a source the asymptotic pro le of the solution close to a blowup point is described in detail Based on an example of Je rey we next show how blowup for ordinary di erential equations can be used to construct examples of blowup for systems of hy perbolic equations Finally we outline ...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...

1998
Jerome P. Gauntlett Neil D. Lambert Peter C. West

The vebrane worldvolume theory in eleven dimensions is known to contain BPS threebrane solitons which can also be interpreted as a vebrane whose worldvolume is wrapped around a Riemann surface. By considering con gurations of intersecting vebranes and hence intersecting threebrane solitons, we determine the Bogomol'nyi equations for more general BPS con gurations. We obtain di erential equation...

2001
R. M. Kiehn

A formal correspondence is established between the curvature theory of generalized implicit hypersurfaces, the classical theory of electromagnetism as expressed in terms of exterior di®erential systems, and thermodynamics. Starting with a generalized implicit surface whose normal ̄eld is represented by an exterior di®erential 1-form, it is possible to deduce the curvature invariants of the impl...

Journal: :Results in nonlinear analysis 2022

Our goal in this paper is to use combined Laplace transform (CLT) and Adomian decomposition method(ADM) (that will be explained section 3), study approximate solutions for non-linear time-fractionalBurger's equation, fractional Burger's Kdv equation the modi?ed theCaputo Conformable derivatives. Comparison between two exact solution made.Here we report that method (LTDM) proved e?cient beused o...

1999
Benjamin Jun

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...

2009
Lejla Batina Benedikt Gierlichs Kerstin Lemke-Rust

We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...

2002
Hitoshi Yanami Takeshi Shimoyama

We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید