نتایج جستجو برای: di erential
تعداد نتایج: 255591 فیلتر نتایج به سال:
Since the advent of Taylor Series, polynomial methods have been used to solve di↵erential equations and learn the properties of di↵erential equations. There are many polynomial methods for solving di↵erential equations and understanding dynamical systems. For example, Taylor polynomials, Chebyshev Polynomials and Adomian Polynomials are used to generate approximate solutions. Automatic di↵erent...
Three schemes for linearizing the transconductance of the basic di erential pair in subthreshold CMOS are examined: 1) multiple asymmetric di erential pairs, 2) source degeneration via symmetric di usors, and 3) source degeneration via a single di usor. Using a maximally at optimizing criterion, the linear range of the basic di erential pair can be increased by four-to-eight times.
We introduce and study the Koszul complex for a Hecke R-matrix. Its cohomologies, called the Berezinian, are used to de ne quantum superdeterminant for a Hecke R-matrix. Their behaviour with respect to Hecke sum of R-matrices is studied. Given a Hecke R-matrix in n-dimensional vector space, we construct a Hecke R-matrix in 2n-dimensional vector space commuting with a di erential. The notion of ...
dae and pdae are systems of ordinary and partial di erential-algebraic equations with constraints. They occur frequently in applications such as constrained multibody mechanics, space-craft control and incompressible uid dynamics. A dae has di erential index r if a minimum of r+1 di erentiations of it are required before no new constraints are obtained. While dae of low di erential index (0 or ...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...
We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...
We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...
In this paper we deene a compositional semantics for a generalized composition operator on logic programs. Static and dynamic inheritance as well as composition by union of clauses can all be obtained by specializing the general operator. The semantics is based on the notion of diierential programs, logic programs annotated with declarations that establish the programs' external interfaces.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید