نتایج جستجو برای: fractional di erential systems
تعداد نتایج: 1483759 فیلتر نتایج به سال:
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir. Di erential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES) ). It is shown that the success of such attacks on an r-round c...
Continuous system dynamics can be described by possibly large systems of di erential equations These can be either ordinary di erential equations ODEs or contain algebraic constraints as well to form di erential and algebraic equations DAEs Complex systems such as aircraft often operate in di erent modes of continuous operation and when mode changes occur the continuous dynamics change abruptly...
In the last decades, fractional diierential equations have become more and more popular among scientists and daring engineers in order to model various stable physical phenomena with anomalous decay, say that are not of exponential type. Moreover in discrete-time series analysis, so-called fractional ARMA models have been proposed in the literature in order to model stochastic processes, the au...
"In this paper we investigate the existence of solutions initial value problems (IVP for short), partial hyperbolic functional and neutral differential inclusions fractional order involving Caputo derivative with finite delay by using nonlinear alternative Frigon type multivalued admissible contraction in Frechet spaces."
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines speci c methods for analyzing power consumption measurements to nd secret keys from tamper resistant devices. We also discuss approaches for building cryptosyst...
We propose a new technique called Di erential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions and it combines features from previously known collision attacks and Di erential Power Analysis. It captures more general leakage features and can be applied to algorithmic collisions as well as implementation speci c collisions...
|This paper presents the investigations in the electric performance of di¬erential signalling transmission lines used for high speed integrated circuits (IC’s) and boards by using the parallelized nite-di¬erence time-domain (FDTD) method. The FDTD method is rstly parallelized with single-program multipledata (SPMD) architecture using the MPI protocol and experimentally validated. The key el...
In this work we consider the problem of control of mechanical systems subject to unilateral constraints. Impulsive forces arise whenever the constraints become active and these forces give rise to nonsmooth dynamics. The dynamics of the system is de ned by a set of di erential equations with discontinuous righthand side using Hamilton's equations of motion. A nonlinear transformation is applied...
We analyze the security of the SEED block cipher against di erential attacks. SEED is a 16-round Feistel cipher developed by the Korea Information Security Agency. The SEED proposers estimated their cipher against di erential cryptanalysis in a self-estimation document and found a six-round di erential characteristic with probability 2 130 . We present an improved method of examining the di ere...
Observers are usually formulated as explicit systems of di erential equations and implemented using standard ODE solvers. In this paper, we show that there can be advantages in formulating the observer as a DAE (Di erential-Algebraic Equation). We review the general idea of DAE observer design of [10]. We give two special normal forms for which DAE observer design yields an observer with linear...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید