Results 31 to 40 of about 39,607 (176)

Method of restoring multivariable Boolean function from its derivative

open access: yesAdvanced Engineering Research, 2017
Introduction. Boolean functions of several variables are of paramount importance in the coding theory and cryptography. The compositions of these functions are used in a set of the symmetric cryptosystems; therewith, some error-control codes, such as ...
Alexander V. Mazurenko   +1 more
doaj   +1 more source

Contractibility of a persistence map preimage [PDF]

open access: yesJournal of Applied and Computational Topology, 2020
AbstractThis work is motivated by the following question in data-driven study of dynamical systems: given a dynamical system that is observed via time series of persistence diagrams that encode topological features of snapshots of solutions, what conclusions can be drawn about solutions of the original dynamical system? We address this challenge in the
Jacek Cyranka   +2 more
openaire   +3 more sources

Postorder Preimages

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2017
Given a set $Y$ of decreasing plane trees and a permutation $\pi$, how many trees in $Y$ have $\pi$ as their postorder? Using combinatorial and geometric constructions, we provide a method for answering this question for certain sets $Y$ and all permutations $\pi$.
openaire   +4 more sources

Preimage Attack on BioHashing [PDF]

open access: yesProceedings of the 10th International Conference on Security and Cryptography, 2013
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying ...
Lacharme, Patrick   +2 more
openaire   +3 more sources

Meromorphic functions with linearly distributed values and Julia sets of rational functions

open access: yes, 2008
If the preimage of a four-point set under a meromorphic function belongs to the real line, then the image of the real line is contained in a circle in the Riemann sphere.
Bergweiler, Walter, Eremenko, Alexandre
core   +1 more source

Cryptanalysis of Haraka

open access: yesIACR Transactions on Symmetric Cryptology, 2016
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj   +1 more source

Aggregation and the Structure of Value

open access: yesNoûs, EarlyView.
ABSTRACT Roughly, the view I call “Additivism” sums up value across time and people. Given some standard assumptions, I show that Additivism follows from two principles. The first says that how lives align in time cannot, in itself, matter. The second says, roughly, that a world cannot be better unless it is better within some period or another.
Weng Kin San
wiley   +1 more source

Improving security of lightweith SHA-3 against preimage attacks [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass ...
Serhii Onopa, Zbigniew Kotulski
doaj   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

Labyrinthine pathways towards supercycle attractors in unimodal maps

open access: yes, 2007
We uncover previously unknown properties of the family of periodic superstable cycles in unimodal maps characterized each by a Lyapunov exponent that diverges to minus infinity.
Moyano, L. G., Robledo, A., Silva, D.
core   +1 more source

Home - About - Disclaimer - Privacy