A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent [PDF]
In this paper, we present a new technique for Matsui's algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present. We apply our method to the key recovery attack on 5-round Serpent and demonstrate that our attack is ...
Joo Yeon Cho +2 more
openaire +1 more source
A new characterization of group action-based perfect nonlinearity
International audienceThe left-regular multiplication is explicitly embedded in the notion of perfect nonlinearity. But there exist many other group actions.
Poinsot, Laurent
core +3 more sources
A Survey of Cellular Automata: Types, Dynamics, Non-uniformity and Applications
Cellular automata (CAs) are dynamical systems which exhibit complex global behavior from simple local interaction and computation. Since the inception of cellular automaton (CA) by von Neumann in 1950s, it has attracted the attention of several ...
Bhattacharjee, Kamalika +3 more
core +1 more source
Tensor decompositions for learning latent variable models [PDF]
This work considers a computationally and statistically efficient parameter estimation method for a wide class of latent variable models---including Gaussian mixture models, hidden Markov models, and latent Dirichlet allocation---which exploits a certain
Anandkumar, Anima +4 more
core +5 more sources
Reconfigurable Systems: A Potential Solution to the von Neumann Bottleneck [PDF]
The difficulty of overcoming the disparity between processor speeds and data access speeds, a condition known as the von Neumann bottleneck, has been a source of consternation for computer hardware developers for many years.
Miller, Damian L
core
Confidentiality-Preserving Publish/Subscribe: A Survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Felber, Pascal +3 more
core +1 more source
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing [PDF]
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013).
Kusen, Ema, Strembeck, Mark
core
ParadisEO-MO-GPU: a Framework for Parallel GPU-based Local Search Metaheuristics [PDF]
International audienceIn this paper, we propose a pioneering framework called ParadisEO-MO-GPU for the reusable design and implementation of parallel local search metaheuristics (S- Metaheuristics) on Graphics Processing Units (GPU).
Boufaras, Karima +3 more
core +2 more sources
Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization. [PDF]
Shankar DD, Azhakath AS.
europepmc +1 more source
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. [PDF]
Chang X +4 more
europepmc +1 more source

