Results 81 to 90 of about 1,782,571 (254)

Analysis of the success probability of cube attack

open access: yesTongxin xuebao, 2012
The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic ...
Hai-xin SONG   +3 more
doaj   +2 more sources

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes [PDF]

open access: yes, 2014
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product.
Couvreur, Alain   +2 more
core   +2 more sources

Extending the hyper‐logistic model to the random setting: New theoretical results with real‐world applications

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés   +2 more
wiley   +1 more source

Algebraic and Slide Attacks on KeeLoq [PDF]

open access: yes, 2008
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois   +2 more
openaire   +1 more source

From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama   +2 more
wiley   +1 more source

The Security Weakness of Block Cipher Piccolo against Fault Analysis

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song   +2 more
doaj   +1 more source

A note on an infeasible linearization of some block ciphers

open access: yes, 2017
A block cipher can be easily broken if its encryption functions can be seen as linear maps on a small vector space. Even more so, if its round functions can be seen as linear maps on a small vector space. We show that this cannot happen for the AES. More
Aragona, Riccardo   +2 more
core   +1 more source

Mathematical Analysis and Simulations of a Cancer Model With Interleukins and Delayed Immunotherapy

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT A new system of delayed differential equations for tumor‐immune system interactions is proposed and studied. The system describes the interactions between tumor cells and the immune system at the most aggressive phase of cancer, where tumor cells have developed mechanisms from earlier stages to evade immune responses.
Laid Boudjellal   +2 more
wiley   +1 more source

Experimental realization of a highly secure chaos communication under strong channel noise

open access: yes, 2004
A one-way coupled spatiotemporally chaotic map lattice is used to contruct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better ...
Blahut   +28 more
core   +1 more source

Coexistence, crossover and extirpation in coalescent communities and ecotones

open access: yesOikos, EarlyView.
When two ecological communities come into contact, the strength of their mixing determines whether species coexist, extirpate, or extend their ranges. We present analytical formulas and simulations describing these transitions. Specifically, we derive abundance shifts upon community coalescence, identify the critical mixing strength leading to first ...
Martin Heidelman, Dervis Can Vural
wiley   +1 more source

Home - About - Disclaimer - Privacy