Results 31 to 40 of about 39,607 (176)
Method of restoring multivariable Boolean function from its derivative
Introduction. Boolean functions of several variables are of paramount importance in the coding theory and cryptography. The compositions of these functions are used in a set of the symmetric cryptosystems; therewith, some error-control codes, such as ...
Alexander V. Mazurenko +1 more
doaj +1 more source
Contractibility of a persistence map preimage [PDF]
AbstractThis work is motivated by the following question in data-driven study of dynamical systems: given a dynamical system that is observed via time series of persistence diagrams that encode topological features of snapshots of solutions, what conclusions can be drawn about solutions of the original dynamical system? We address this challenge in the
Jacek Cyranka +2 more
openaire +3 more sources
Given a set $Y$ of decreasing plane trees and a permutation $\pi$, how many trees in $Y$ have $\pi$ as their postorder? Using combinatorial and geometric constructions, we provide a method for answering this question for certain sets $Y$ and all permutations $\pi$.
openaire +4 more sources
Preimage Attack on BioHashing [PDF]
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying ...
Lacharme, Patrick +2 more
openaire +3 more sources
Meromorphic functions with linearly distributed values and Julia sets of rational functions
If the preimage of a four-point set under a meromorphic function belongs to the real line, then the image of the real line is contained in a circle in the Riemann sphere.
Bergweiler, Walter, Eremenko, Alexandre
core +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
Aggregation and the Structure of Value
ABSTRACT Roughly, the view I call “Additivism” sums up value across time and people. Given some standard assumptions, I show that Additivism follows from two principles. The first says that how lives align in time cannot, in itself, matter. The second says, roughly, that a world cannot be better unless it is better within some period or another.
Weng Kin San
wiley +1 more source
Improving security of lightweith SHA-3 against preimage attacks [PDF]
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass ...
Serhii Onopa, Zbigniew Kotulski
doaj +1 more source
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +3 more sources
Labyrinthine pathways towards supercycle attractors in unimodal maps
We uncover previously unknown properties of the family of periodic superstable cycles in unimodal maps characterized each by a Lyapunov exponent that diverges to minus infinity.
Moyano, L. G., Robledo, A., Silva, D.
core +1 more source

