نتایج جستجو برای: مدل arx

تعداد نتایج: 120915  

Journal: :J. Mathematical Cryptology 2013
Rebecca E. Field Brant C. Jones

We introduce a truncated addition operation on pairs of N-bit binary numbers that interpolates between ordinary addition mod 2 N and bitwise addition in (Z/2Z) N. We use truncated addition to analyze hash functions that are built from the bit operations add, rotate, and xor, such as Blake, Skein, and Cubehash. Any ARX algorithm can be approximated by replacing ordinary addition with truncated a...

2013
Adel Abdurahman

Three-tank (3T) system is the most representative didactical equipment used as a bench mark system for system modeling, identification and control. A real target representing 3T system has been used for generating data that is used for developing a linear model based on autoregressive exogenous (ARX) method, and neuro-fuzzy (NF) network technique. The developed models have been used as an inter...

Journal: :Social Science Research Network 2022

Journal: :IACR Cryptology ePrint Archive 2015
Dmitry Khovratovich Ivica Nikolic Josef Pieprzyk Przemyslaw Sokolowski Ron Steinfeld

Rotational cryptanalysis is a probabilistic attack applicable to word oriented designs that use (almost) rotation-invariant constants. It is believed that the success probability of rotational cryptanalysis against ciphers and functions based on modular additions, rotations and XORs, can be computed only by counting the number of additions. We show that this simple formula is incorrect due to t...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2018

Journal: :International Journal of Aerospace Engineering 2018

1993
P. LINDSKOG B. WAHLBERG

FIR, ARX or AR model structures can be used to describe many industrial processes. Simple linear regression techniques can be applied to estimate such models from experimental data. However, for low signal to noise ratios in combination with transfer function poles and noise model zeros close to the unit circle, a large number of model parameters are needed to generate adequate models. The Kaut...

2015
Yangkun Xu Zhixin Miao

In this paper, least square estimation (LSE)-based synchronous generator model identification is carried out. The synchronous generator model including electromechanical dynamics and primary frequency control is first expressed by continuous-time AutoRegressive with eXogenous (ARX) models. The high-order derivatives in a continuous ARX model are approximated by expressions in terms of discrete-...

2004
Wallace E. Larimore

Over the last two decades, the canonical variate analysis method for subspace system identification has been widely applied. A number of these applications have demonstrated near maximum likelihood accuracy of the adaptx CVA subspace algorithm in large samples with unknown feedback. The critical step in the algorithm is the use of an ARX model estimated by conditional maximum likelihood to remo...

2012
Vesselin Velichkov Nicky Mouha Christophe De Cannière Bart Preneel

Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید