نتایج جستجو برای: di erential

تعداد نتایج: 255591  

2012
Stephen Lucas

Since the advent of Taylor Series, polynomial methods have been used to solve di↵erential equations and learn the properties of di↵erential equations. There are many polynomial methods for solving di↵erential equations and understanding dynamical systems. For example, Taylor polynomials, Chebyshev Polynomials and Adomian Polynomials are used to generate approximate solutions. Automatic di↵erent...

1995
Paul M. Furth Andreas G. Andreou

Three schemes for linearizing the transconductance of the basic di erential pair in subthreshold CMOS are examined: 1) multiple asymmetric di erential pairs, 2) source degeneration via symmetric di usors, and 3) source degeneration via a single di usor. Using a maximally at optimizing criterion, the linear range of the basic di erential pair can be increased by four-to-eight times.

1998
V. LYUBASHENKO A. SUDBERY

We introduce and study the Koszul complex for a Hecke R-matrix. Its cohomologies, called the Berezinian, are used to de ne quantum superdeterminant for a Hecke R-matrix. Their behaviour with respect to Hecke sum of R-matrices is studied. Given a Hecke R-matrix in n-dimensional vector space, we construct a Hecke R-matrix in 2n-dimensional vector space commuting with a di erential. The notion of ...

1995
Gregory J. Reid Ping Lin Allan D. Wittkopf

dae and pdae are systems of ordinary and partial di erential-algebraic equations with constraints. They occur frequently in applications such as constrained multibody mechanics, space-craft control and incompressible uid dynamics. A dae has di erential index r if a minimum of r+1 di erentiations of it are required before no new constraints are obtained. While dae of low di erential index (0 or ...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key block ciphers that are based on iterating a cryptographically weak function r times e g the round Data Encryption Standard DES It is shown that the success of such attacks on an r round cipher depend...

1991
Xuejia Lai James L. Massey Sean Murphy

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...

1999
Benjamin Jun

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...

2009
Lejla Batina Benedikt Gierlichs Kerstin Lemke-Rust

We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...

2002
Hitoshi Yanami Takeshi Shimoyama

We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...

1993
A Bossi M Bugliesi M Gabbrielli G Levi M C Meo

In this paper we deene a compositional semantics for a generalized composition operator on logic programs. Static and dynamic inheritance as well as composition by union of clauses can all be obtained by specializing the general operator. The semantics is based on the notion of diierential programs, logic programs annotated with declarations that establish the programs' external interfaces.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید