Results 81 to 90 of about 1,782,571 (254)
Analysis of the success probability of cube attack
The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic ...
Hai-xin SONG +3 more
doaj +2 more sources
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes [PDF]
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product.
Couvreur, Alain +2 more
core +2 more sources
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés +2 more
wiley +1 more source
Algebraic and Slide Attacks on KeeLoq [PDF]
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois +2 more
openaire +1 more source
From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama +2 more
wiley +1 more source
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song +2 more
doaj +1 more source
A note on an infeasible linearization of some block ciphers
A block cipher can be easily broken if its encryption functions can be seen as linear maps on a small vector space. Even more so, if its round functions can be seen as linear maps on a small vector space. We show that this cannot happen for the AES. More
Aragona, Riccardo +2 more
core +1 more source
Mathematical Analysis and Simulations of a Cancer Model With Interleukins and Delayed Immunotherapy
ABSTRACT A new system of delayed differential equations for tumor‐immune system interactions is proposed and studied. The system describes the interactions between tumor cells and the immune system at the most aggressive phase of cancer, where tumor cells have developed mechanisms from earlier stages to evade immune responses.
Laid Boudjellal +2 more
wiley +1 more source
Experimental realization of a highly secure chaos communication under strong channel noise
A one-way coupled spatiotemporally chaotic map lattice is used to contruct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better ...
Blahut +28 more
core +1 more source
Coexistence, crossover and extirpation in coalescent communities and ecotones
When two ecological communities come into contact, the strength of their mixing determines whether species coexist, extirpate, or extend their ranges. We present analytical formulas and simulations describing these transitions. Specifically, we derive abundance shifts upon community coalescence, identify the critical mixing strength leading to first ...
Martin Heidelman, Dervis Can Vural
wiley +1 more source

