Results 41 to 50 of about 40,553 (242)

Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions

open access: yesJournal of Mathematical Cryptology, 2021
There are many cryptographic applications of Boolean functions. Recently, research has been done on monomial rotation symmetric (MRS) functions which have useful cryptographic properties.
Reid Elizabeth M.
doaj   +1 more source

Circular‐Polarization‐Sensitive Organic Photodetectors with a Chiral Nanopatterned Electrode Inverse‐Designed by Genetic Algorithm

open access: yesAdvanced Functional Materials, EarlyView.
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park   +3 more
wiley   +1 more source

On the confusion coefficient of Boolean functions

open access: yesJournal of Mathematical Cryptology, 2021
The notion of the confusion coefficient is a property that attempts to characterize confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between the confusion coefficient and the
Zhou Yu   +4 more
doaj   +1 more source

Intrinsic Nanopore‐Assisted SnP2S6 Memristors With Ti Ion Dynamics for Compact Logic‐In‐Memory Hardware

open access: yesAdvanced Functional Materials, EarlyView.
Tin hexathiophosphate memristors leverage intrinsic nanopores together with a guided filament formation strategy to regulate titanium ion motion and switching behavior. The devices support reliable nonvolatile memory and reconfigurable logic‐in‐memory, demonstrating 14 Boolean logic functions in a single cell.
Thaw Tint Te Tun   +7 more
wiley   +1 more source

Study of relationships between correlation-immunity and balanceness based on Boolean functions

open access: yesTongxin xuebao, 2010
E-derivative and derivative were introduced to deeply study internal structure of Boolean function,and analyzed the cryptographic properties of Boolean function,which was a new subject in cryptology.The relationships between correlation-immunity and ...
LI Wei-wei
doaj   +2 more sources

On extremal elements and the cardinality of the set of continuously differentiable convex extensions of a Boolean function

open access: yesМоделирование и анализ информационных систем
In this paper we study the existence of the maximal and minimal elements of the set of continuously differentiable convex extensions to $[0,1]^n$ of an arbitrary Boolean function $f_{B}(x_1,x_2,\ldots,x_n)$ and the cardinality of the set of continuously ...
Dostonjon N. Barotov, Ruziboy N. Barotov
doaj   +1 more source

Boolean Curve Fitting with the Aid of Variable-Entered Karnaugh Maps [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2019
The Variable-Entered Karnaugh Map is utilized to grant a simpler view and a visual perspective to Boolean curve fitting (Boolean interpolation); a topic whose inherent complexity hinders its potential applications.
Ali Muhammad Ali Rushdi   +1 more
doaj   +1 more source

Scalable Task Planning via Large Language Models and Structured World Representations

open access: yesAdvanced Robotics Research, EarlyView.
This work efficiently combines graph‐based world representations with the commonsense knowledge in Large Language Models to enhance planning techniques for the large‐scale environments that modern robots will need to face. Planning methods often struggle with computational intractability when solving task‐level problems in large‐scale environments ...
Rodrigo Pérez‐Dattari   +4 more
wiley   +1 more source

BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2019
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean function.
M. Todorova   +4 more
doaj   +1 more source

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy