Bayesian System for Differential Cryptanalysis of DES
|
|
- Lorena Curtis
- 5 years ago
- Views:
Transcription
1 Available online at ScienceDirect IERI Procedia 7 (014 ) International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential Crytanalysis of DES A. De Paola a, L. Gagliano, G. Lo Re a a Università degli Studi di Palermo, Viale delle Scienze, ed. 6, Palermo 9018, Italy Abstract This aer rooses a new formalization for the differential crytanalysis of DES (Data Encrytion Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the roosed aroach it is ossible to analyze DES from a novel oint of view, thus aving the way for the develoment of a new class of crytanalysis methods. 014 The Authors. Published by Elsevier B.V. This is an oen access article under the CC BY-NC-ND license 013. Published by Elsevier B.V. (htt://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and eer review under resonsibility of Information Engineering Research Institute Selection and eer review under resonsibility of Information Engineering Research Institute Keywords: Crytograhy; DES; differential crytanalysis; Bayesian Networks; 1. Introduction The DES (Data Encrytion Standard) is a symmetric crytosystem standardized in the 70s for encryting sensitive data. The research about DES led to the modern design of block cihers and the design of several techniques for their crytanalysis. Because of short size DESs key, the algorithm is today considered not adequate for critical alications. However more recent block cihers, like the AES [1], have been designed to make infeasible a brute force attack. Nevertheless, since DES is still used for less sensitive data, and also as building block of Trile DES [], it still very interesting to analyze its vulnerabilities. Several works in the scientific literature have identified and analyzed some of the mains vulnerabilities of the DES. These works Corresonding author. Tel.: ; fax: address: alessandra.deaola@unia.it The Authors. Published by Elsevier B.V. This is an oen access article under the CC BY-NC-ND license (htt://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and eer review under resonsibility of Information Engineering Research Institute doi: /j.ieri
2 16 A. De Paola et al. / IERI Procedia 7 ( 014 ) 15 0 led to the develoment of new crytanalysis techniques; among these, the most romising ones are linear crytanalysis [3] and differential crytanalysis [4]. Although these methods are extremely interesting from a theoretical oint of view, because they contributed to identify serious vulnerabilities of DES, they are not usable in a real attack because of the huge amount of required encrytion oerations, even if it is less than a brute-force attack. This work rooses a feasibility study for the imlementation of the differential crytanalysis [4]. With resect to the classical aroach used for the formalization of such technique, we roose the adotion of Bayesian Networks (BN), an artificial intelligence tool used for dealing with data affected by uncertainty. To the best of our knowledge this aroach is a novelty in the scientific literature. The rest of the aer is structured as follows: Section recalls DES roerties and discusses some related works; Section 3 describes the roosed Bayesian Network for modeling the attack to the S-Box, and then extends the roosed aroach for attacking the whole DES; finally Section 4 states our conclusions and discusses some future works.. DES descrition and related work DES is a symmetric crytosystem that transforms a 64-bit laintext P in a 64-bit cihertext T. A 64-bit key K, actually reduced to a 56-bit key, since 8 bits are used as arity bits, arameterizes the transformation. DES acts on the laintext P through a series of transformations named rounds. The inut to each round is transformed through the alication of the DESs Feistel function, which consists of a sequence of ermutations and substitutions. A 48-bit subkey obtained from K using a scheduling algorithm for subkey generation arameterizes each round. Fig. 1(a) shows the general DES scheme, and Fig. 1(b) shows details of a single round rocessing. (a) (b) (c) Fig. 1. (a) DES general block scheme. (b) Block scheme of the DES s round rocessing. (c) Detailed block diagram of the DES s Feistel Function. For each round =,, 16, the following equations are valid:
3 A. De Paola et al. / IERI Procedia 7 ( 014 ) L R R L 1 1 F( R 1, S K ) (1) namely, P is obtained from P -1 by relacing the left 3-bits half L -1 of P -1 with its right 3-bits half R -1 and by relacing its right half with a nonlinear combination of L -1 and R -1, arameterized by the subkey S K. The core of a round is the Feistel function that contains the only non-linear comonent of DES, the S-Box. In articular, the maing F, exanded in Fig. 1(c), is defined as follows: F ( R 1 1, SK ) P( S( E( R ) SK )) () where E is called exansion function, S is called S-Box, and P is called ermutation. Aroriate tables detailed in [5] define such maings. Domains and codomains of these functions are defined as follows: E : S : P : (3) It is worth noting that E and P are linear maings, while S is the only nonlinear comonent of the algorithm; its goal is erasing the existing relations between the key S K and the laintext. S-Box is the major security comonent of DES and their violation makes the whole encrytion system easily violable. Generally, 6 4 S-Box is not analyzed as a unique block, since it is comosed by eight submas S i :, with i=1,,8. Many works in the literature aim to analyze S-Box. Authors of [6] and [7] roose an analysis of S-Box roerties and consequently some ossible design criteria in block cihers context. On the basis of the roerties discovered, many crytanalysis methods were roosed in the literature to violate the S-Boxes. An algebraic aroach is roosed in [8], which defines the set of criteria for determining the set of non-linear algebraic constraints, which describes the I/O relationshi of the S-Boxes. Exloiting this set of constraints, the whole ciher is described as a system of multivariate non-linear equations. On the contrary, the author of [3] rooses a linear aroximation of S-boxes and of the whole DES, which is valid with some robability; such method is an examle of stochastic attack on the S-Boxes. It has been shown that the distribution of the outut of the S-Box is uniform if the inut is unknown, but exerimentally has been shown that the distribution of I/O differences is not uniform [4]. Taken two different inuts for a given S-Box and assuming that these two inuts are bounded by some known difference, then the robability distribution of the difference between the corresonding outut of the S-Box is not uniform; such imortant roerty reresents a strong system vulnerabilities, and underlies the differential crytanalysis [4]. Authors trace differences through the transformations, discover where the ciher exhibits non-random behavior, and exloit such roerties to recover the secret key. 3. Bayesian networks for differential crytanalysis The Bayesian Networks (BN) [9] are a formalism based on grah theory, exressing relationshis of cause/effect among random variables. In the roosed aroach we model the statistical distribution of I/O differences, discovered in [4], though a BN which allows erforming a diagnostic inference to discover the key. The roosed BN, showed in Fig. (a), uses the original notation reorted in [4]: at round, Si E, Si E indicate the i-th block of six-bits of the outut of the exansion function; Si K is the i-th six-bits block of the
4 18 A. De Paola et al. / IERI Procedia 7 ( 014 ) 15 0 subkey; Si I, Si I are two inuts to i-th S-Box; Si I is the OR between S-Box inuts; while Si O is the OR between S-Box oututs. (a) (b) (c) Fig.. (a) BN for the attack on the i-th S-Box. (b) BN for the attack on the i-th Feistel function. (c) BN for the attack on a 3-round DES. Since the differential crytanalysis is a chosen-laintext attack, it is ossible to assume to know the following evidence: thus, searching the key is equivalent to maximize the following likelihood: Si, (4) E, SiE, SiI, SiO ( ). (5) Through a diagnostic inference it is ossible to evaluate the eq.5. When leading more than one attack, the whole distribution is roortional to the roduct of the single distributions; thus, given the following set of evidences the likelihood can be evaluated as follows: Eq.7 can be solved through a differential aroach. Let us define Si K,,,, (6) 1 M M ( Si ) ( ). (7) K Si K i1 i
5 A. De Paola et al. / IERI Procedia 7 ( 014 ) ,,,, (8) j 1 j then, it follows that ( SiK M ) ( SiK ) ( SiK M 1). (9) The robability density functions of the roosed BN, necessary to erform the robabilistic inference, are exressed as follows: M Si Si Si E 6 1, Si Si, Si Si Si Si I SiI SiE, SiK SiE SiK SiI ; SiI SiI, SiI SiI SiI SiI ; Si Si, Si Si SiSi SiSi O E I E K I K E O K I I ; I ; (10) where is the Kronecker delta and Si(.) is the i-th S-Box. The roosed aroach allows formalizing the attack to the whole Feistel function; nevertheless, since sixbit blocks obtained as outut of the exansion function are not indeendent, it is not ossible to generalize the BN show in Fig. (a). An alternative BN, built following the same method, is shown in Fig. (b), which adots the following notation: Z, Z : inuts to the Feistel function; Z Z Z : difference between inuts; S : 48-bit subkey; K S S : inuts to the S-Box; I, I Y : ermutation of the difference between oututs from the S-Box. Attacking the Feistel function, in a chosen-laintext context imlies that it is ossible to choose two inuts Z and Z, exloiting which it is ossible to comute the inut OR Z, and to observe the difference between oututs Y. Through the diagnostic inference it is ossible to reduce the uncertainty about the 48-bit subkey. The BN can be used also for a forward inference rocess, which extracts samles from the imlicit distribution of Y conditioned to Z. In articular, it is ossible to samle Y, starting from a 48-bit random number for S I, obtained through a random number generator [9], and by alying the following equation: Y S SS EZ P S. (11) The samling technique can be used also for inferring the difference roagation inside the DES, while rocessing two inut P and P. Let P = (L,R) be the OR between inuts P and P, exlicitly decomosed in its left and right arts, T = (l,r) be the OR of ciher outut, I be the OR of inuts to the Feistel function at round -th, O be the OR of oututs from the Feistel function at round -th. The roagation of differences can be modeled through a BN, as shown in Fig(c) for a DES reduced to three round. In order to attack a N-round DES, it is necessary to adot the following algorithm: I I
6 0 A. De Paola et al. / IERI Procedia 7 ( 014 ) 15 0 Get the value I(N-1) by samling successive differences; Get the value IN =r ; Get the value ON l I N 1; Build a subkey histogram by attacking the S-Boxes at last round using the BN in Fig. (a); Once the last round is broken, roceed with the revious one. 4. Conclusions and future work This work demonstrated that the differential crytanalysis of DES can be imlemented through an alternative and novel aroach based on Bayesian Networks. The roosed aroach models a BN for attacking a single S-Box, and it can be extended for attacking the Feistel function, and finally the whole DES. When analyzing the number of airs <laintext, cihertext> required and the comutational comlexity, the roosed aroach is equivalent to the original formulation. Nevertheless the roosed novel oint of view may ave the way for future romising develoments. One of the most romising directions seems to be the exloitation of indeendences among different attack in a arallel imlementation of the robabilistic inference. Moreover, it is ossible to change the method adoted for the samling hase, by erforming an imortance samling that exloits the structure of the BN. Finally, we lan to evaluate alternative methods for erforming efficient inference in Bayesian Networks, such as genetic algorithms [11], even in combination with arallelization [1]. References [1] Daemen J, Rijmen V. The Design of Rijndael. Sringer-Verlag New York, Inc.; 00. [] Coersmith D, Johnson DB, Matyas, SM. A roosed mode for trile-des encrytion. IBM Journal of Research and Develoment. 1996;40():53-6. [3] Matsui M. Linear Crytanalysis Method for DES Ciher. In Advances in Crytology - EUROCRYPT93; Lecture Notes in Comuter Science. 1994; 765: [4] Biham E, Shamir A. Differential crytanalysis of DES-like crytosystems. Journal of Crytology. 1991; 4(1):3-7. [5] National Institute of Standards and Technology. FIPS PUB 46-3: Data Encrytion Standard (DES) [6] Brickell EF, Moore JH, Purtill, MR. Structure in the S-boxes of the DES. In Proceedings on Advances in crytology---crypto 86; Sringer-Verlag; 1987; 3-8. [7] Dawson MH, Tavares SE. An exanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In Proceedings of the 10th annual international conference on Theory and alication of crytograhic techniques - EUROCRYPT91; 1991; Sringer-Verlag; [8] Courtois NT, Bard GV. Algebraic Crytanalysis of the Data Encrytion Standard. Crytograhy and Coding; Lecture Notes in Comuter Science; 007; 4887: [9] Koller D, Friedman N. Probabilistic Grahical Models: Princiles and Techniques Adative Comutation and Machine Learning. The MIT Press; 009. [10] Lo Re G, Milazzo F, Ortolani M. Secure random number generation in wireless sensor networks. 4th International Conference on Security of Information and Networks (SIN 011); 011; [11] Mengshoel OJ. Efficient Bayesian Network Inference: Genetic Algorithms, Stochastic Local Search, and Abstraction Technical Reort. University of Illinois at Urbana-Chamaign, Chamaign, IL, USA. [1] Lo Presti G, Lo Re G, Storniolo P, Urso A. A Grid Enabled Parallel Hybrid Genetic Algorithm for SPN. Comutational Science - ICCS 004; Lecture Notes in Comuter Science. 004; 3036:
Elliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationLattice Attacks on the DGHV Homomorphic Encryption Scheme
Lattice Attacks on the DGHV Homomorhic Encrytion Scheme Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmanenitaj@unicaenfr
More informationEfficient Hardware Architecture of SEED S-box for Smart Cards
JOURNL OF SEMICONDUCTOR TECHNOLOY ND SCIENCE VOL.4 NO.4 DECEMBER 4 37 Efficient Hardware rchitecture of SEED S-bo for Smart Cards Joon-Ho Hwang bstract This aer resents an efficient architecture that otimizes
More informationCryptography Assignment 3
Crytograhy Assignment Michael Orlov orlovm@cs.bgu.ac.il) Yanik Gleyzer yanik@cs.bgu.ac.il) Aril 9, 00 Abstract Solution for Assignment. The terms in this assignment are used as defined in [1]. In some
More informationA Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution
(IJACSA) International Journal of Advanced Comuter Science and Alications, Vol. 4, No., 0 A Block Ciher Involving a Key and a Key Bunch Matrix, Sulemented with Key-Based Permutation and Substitution Dr.
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationUsing a Computational Intelligence Hybrid Approach to Recognize the Faults of Variance Shifts for a Manufacturing Process
Journal of Industrial and Intelligent Information Vol. 4, No. 2, March 26 Using a Comutational Intelligence Hybrid Aroach to Recognize the Faults of Variance hifts for a Manufacturing Process Yuehjen E.
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationSTABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS
STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy
More informationDesign of NARMA L-2 Control of Nonlinear Inverted Pendulum
International Research Journal of Alied and Basic Sciences 016 Available online at www.irjabs.com ISSN 51-838X / Vol, 10 (6): 679-684 Science Exlorer Publications Design of NARMA L- Control of Nonlinear
More informationLearning Sequence Motif Models Using Gibbs Sampling
Learning Sequence Motif Models Using Gibbs Samling BMI/CS 776 www.biostat.wisc.edu/bmi776/ Sring 2018 Anthony Gitter gitter@biostat.wisc.edu These slides excluding third-arty material are licensed under
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Published in Journal of Crytology, 30(2:519 549, 2017. Efficient Crytosystems From 2 k -th Power Residue Symbols Fabrice Benhamouda 1, Javier Herranz 2, Marc Joye 3, and Benoît Libert 4, 1 ES Paris, CRS,
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Efficient Crytosystems From 2 k -th Power Residue Symbols Marc Joye and Benoît Libert Technicolor 975 avenue des Chams Blancs, 35576 Cesson-Sévigné Cedex, France {marc.joye,benoit.libert}@technicolor.com
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationAdvanced Cryptography Midterm Exam
Advanced Crytograhy Midterm Exam Solution Serge Vaudenay 17.4.2012 duration: 3h00 any document is allowed a ocket calculator is allowed communication devices are not allowed the exam invigilators will
More informationSTABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER
STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment
More informationA Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
A Crytanalysis of PRINTciher: The Invariant ubsace Attack Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark {G.Leander,M.A.Abdelraheem,H.Alkhzaimi,E.Zenner}@mat.dtu.dk
More informationBayesian Networks Practice
Bayesian Networks Practice Part 2 2016-03-17 Byoung-Hee Kim, Seong-Ho Son Biointelligence Lab, CSE, Seoul National University Agenda Probabilistic Inference in Bayesian networks Probability basics D-searation
More informationA New and Optimal Chosen-message Attack on RSA-type Cryptosystems
Published in Y. Han, T. Okamoto, and S. Qing, eds, Information and Communications Security (ICICS 97), vol. 1334 of Lecture Notes in Comer Science,. 30-313, Sringer-Verlag, 1997. A New and Otimal Chosen-message
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationEfficient Cryptosystems From 2 k -th Power Residue Symbols
Efficient Crytosystems From k -th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye 3, and Benoît Libert 4, ENS Paris, CNRS, INRIA, and PSL 45 rue d Ulm, 7530 Paris Cedex 06, France fabrice.benhamouda@ens.fr
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informationChapter 1 Fundamentals
Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors
More informationPredicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Predicate Encrytion Suorting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz jkatz@cs.umd.edu Amit Sahai sahai@cs.ucla.edu Brent Waters bwaters@csl.sri.com Abstract Predicate encrytion
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationarxiv:cond-mat/ v2 [cond-mat.str-el] 23 May 2006
Quantum dot with ferromagnetic leads: a densiti-matrix renormaliation grou study C. J. Gaa, M. E. Torio, and J. A. Riera Instituto de Física Rosario, Consejo Nacional de Investigaciones Científicas y Técnicas,
More informationCryptanalysis of Pseudorandom Generators
CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we
More informationGeneralized Coiflets: A New Family of Orthonormal Wavelets
Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University
More informationDamage Identification from Power Spectrum Density Transmissibility
6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationDeveloping A Deterioration Probabilistic Model for Rail Wear
International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationGenetic Algorithms, Selection Schemes, and the Varying Eects of Noise. IlliGAL Report No November Department of General Engineering
Genetic Algorithms, Selection Schemes, and the Varying Eects of Noise Brad L. Miller Det. of Comuter Science University of Illinois at Urbana-Chamaign David E. Goldberg Det. of General Engineering University
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationA SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE
THE 19 TH INTERNATIONAL CONFERENCE ON COMPOSITE MATERIALS A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE K.W. Gan*, M.R. Wisnom, S.R. Hallett, G. Allegri Advanced Comosites
More informationImproved Hidden Vector Encryption with Short Ciphertexts and Tokens
Imroved Hidden Vector Encrytion with Short Cihertexts and Tokens Kwangsu Lee Dong Hoon Lee Abstract Hidden vector encrytion HVE) is a articular kind of redicate encrytion that is an imortant crytograhic
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationEstimating function analysis for a class of Tweedie regression models
Title Estimating function analysis for a class of Tweedie regression models Author Wagner Hugo Bonat Deartamento de Estatística - DEST, Laboratório de Estatística e Geoinformação - LEG, Universidade Federal
More informationFE FORMULATIONS FOR PLASTICITY
G These slides are designed based on the book: Finite Elements in Plasticity Theory and Practice, D.R.J. Owen and E. Hinton, 1970, Pineridge Press Ltd., Swansea, UK. 1 Course Content: A INTRODUCTION AND
More informationPosition Control of Induction Motors by Exact Feedback Linearization *
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8 No Sofia 008 Position Control of Induction Motors by Exact Feedback Linearization * Kostadin Kostov Stanislav Enev Farhat
More informationUNCERTAINLY MEASUREMENT
UNCERTAINLY MEASUREMENT Jan Čaek, Martin Ibl Institute of System Engineering and Informatics, University of Pardubice, Pardubice, Czech Reublic caek@uce.cz, martin.ibl@uce.cz In recent years, a series
More informationFinite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking
Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults
More informationParallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem
Parallel Quantum-insired Genetic Algorithm for Combinatorial Otimization Problem Kuk-Hyun Han Kui-Hong Park Chi-Ho Lee Jong-Hwan Kim Det. of Electrical Engineering and Comuter Science, Korea Advanced Institute
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN, DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM
Int. J. Al. Math. Comut. Sci. 2007 Vol. 17 No. 4 505 513 DOI: 10.2478/v10006-007-0042-z ESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM PRZEMYSŁAW
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationPHYS 301 HOMEWORK #9-- SOLUTIONS
PHYS 0 HOMEWORK #9-- SOLUTIONS. We are asked to use Dirichlet' s theorem to determine the value of f (x) as defined below at x = 0, ± /, ± f(x) = 0, - < x
More informationChurilova Maria Saint-Petersburg State Polytechnical University Department of Applied Mathematics
Churilova Maria Saint-Petersburg State Polytechnical University Deartment of Alied Mathematics Technology of EHIS (staming) alied to roduction of automotive arts The roblem described in this reort originated
More informationLending Direction to Neural Networks. Richard S. Zemel North Torrey Pines Rd. La Jolla, CA Christopher K. I.
Lending Direction to Neural Networks Richard S Zemel CNL, The Salk Institute 10010 North Torrey Pines Rd La Jolla, CA 92037 Christoher K I Williams Deartment of Comuter Science University of Toronto Toronto,
More informationBilinear Entropy Expansion from the Decisional Linear Assumption
Bilinear Entroy Exansion from the Decisional Linear Assumtion Lucas Kowalczyk Columbia University luke@cs.columbia.edu Allison Bisho Lewko Columbia University alewko@cs.columbia.edu Abstract We develo
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More information1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings
Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin School of Mathematics Statistics, Wuhan niversity, Wuhan, Hubei, China, 43007 Abstract: Many identity-based
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationA generalization of Amdahl's law and relative conditions of parallelism
A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationMultilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale
World Alied Sciences Journal 5 (5): 546-552, 2008 ISSN 1818-4952 IDOSI Publications, 2008 Multilayer Percetron Neural Network (MLPs) For Analyzing the Proerties of Jordan Oil Shale 1 Jamal M. Nazzal, 2
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationMULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION
MULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION M. Jabbari Nooghabi, Deartment of Statistics, Faculty of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad-Iran. and H. Jabbari
More informationFinding Shortest Hamiltonian Path is in P. Abstract
Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs
More informationOutline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding
Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift
More informationPROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2)
PROFIT MAXIMIZATION DEFINITION OF A NEOCLASSICAL FIRM A neoclassical firm is an organization that controls the transformation of inuts (resources it owns or urchases into oututs or roducts (valued roducts
More informationON LINEAR COMPLEXITY OF GENERALIZED SHRINKING-MULTIPLEXING GENERATOR
Journal of Basic and Alied Research International 4(1): 8 17, 015 O LIEAR COMPLEXITY OF GEERALIZED SHRIKIG-MULTIPLEXIG GEERATOR ZHAETA. TASHEVA 1* 1 Faculty of Artillery, AAD and CIS, ational Military
More informationUncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics
Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)
More informationLINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL
LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110
More informationTests for Two Proportions in a Stratified Design (Cochran/Mantel-Haenszel Test)
Chater 225 Tests for Two Proortions in a Stratified Design (Cochran/Mantel-Haenszel Test) Introduction In a stratified design, the subects are selected from two or more strata which are formed from imortant
More informationAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
An extended abstract of this aer aears in the Proceedings of the 35th Annual Crytology Conference (CRYPTO 2015), Part I, Rosario ennaro and Matthew Robshaw (Eds.), volume 9215 of Lecture Notes in Comuter
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationModelling a Partly Filled Road Tanker during an Emergency Braking
Proceedings of the World Congress on Engineering and Comuter Science 217 Vol II, October 25-27, 217, San Francisco, USA Modelling a Partly Filled Road Tanker during an Emergency Braking Frank Otremba,
More informationOn Doob s Maximal Inequality for Brownian Motion
Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t
More informationPredicate Privacy in Encryption Systems
Predicate Privacy in Encrytion Systems Emily Shen MIT eshen@csail.mit.edu Elaine Shi CMU/PARC eshi@arc.com December 24, 2008 Brent Waters UT Austin bwaters@cs.utexas.edu Abstract Predicate encrytion is
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationA Unified 2D Representation of Fuzzy Reasoning, CBR, and Experience Based Reasoning
University of Wollongong Research Online Faculty of Commerce - aers (Archive) Faculty of Business 26 A Unified 2D Reresentation of Fuzzy Reasoning, CBR, and Exerience Based Reasoning Zhaohao Sun University
More informationBayesian Networks for Modeling and Managing Risks of Natural Hazards
[National Telford Institute and Scottish Informatics and Comuter Science Alliance, Glasgow University, Set 8, 200 ] Bayesian Networks for Modeling and Managing Risks of Natural Hazards Daniel Straub Engineering
More informationAvailable online at ScienceDirect. Procedia Engineering 102 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 1 (15 ) 3 38 The 7th World Congress on Particle Technology (WCPT7) Characterization of Colloidal Particles using Electrical
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationModeling Business Cycles with Markov Switching Arma (Ms-Arma) Model: An Application on Iranian Business Cycles
Modeling Business Cycles with Markov Switching Arma (Ms-Arma) Model: An Alication on Iranian Business Cycles Morteza Salehi Sarbijan 1 Faculty Member in School of Engineering, Deartment of Mechanics, Zabol
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationA Parallel Algorithm for Minimization of Finite Automata
A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this
More informationBayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis
HIPAD LAB: HIGH PERFORMANCE SYSTEMS LABORATORY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING AND EARTH SCIENCES Bayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis Why use metamodeling
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationMorphological Operations on Matrix-Valued Images
Morhological Oerations on Matrix-Valued Images Bernhard Burgeth, Martin Welk, Christian Feddern, and Joachim Weickert Mathematical Image Analysis Grou Faculty of Mathematics and Comuter Science, Bldg.
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationScaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling
Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering
More informationarxiv: v2 [quant-ph] 2 Aug 2012
Qcomiler: quantum comilation with CSD method Y. G. Chen a, J. B. Wang a, a School of Physics, The University of Western Australia, Crawley WA 6009 arxiv:208.094v2 [quant-h] 2 Aug 202 Abstract In this aer,
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationAN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES. 1. Introduction
J. Al. Math. & Comuting Vol. 20(2006), No. 1-2,. 485-489 AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES BYEONG-KWEON OH, KIL-CHAN HA AND JANGHEON OH Abstract. In this aer, we slightly
More informationMULTIVARIATE STATISTICAL PROCESS OF HOTELLING S T CONTROL CHARTS PROCEDURES WITH INDUSTRIAL APPLICATION
Journal of Statistics: Advances in heory and Alications Volume 8, Number, 07, Pages -44 Available at htt://scientificadvances.co.in DOI: htt://dx.doi.org/0.864/jsata_700868 MULIVARIAE SAISICAL PROCESS
More informationApproximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels
Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,
More informationA New GP-evolved Formulation for the Relative Permittivity of Water and Steam
ew GP-evolved Formulation for the Relative Permittivity of Water and Steam S. V. Fogelson and W. D. Potter rtificial Intelligence Center he University of Georgia, US Contact Email ddress: sergeyf1@uga.edu
More informationGeneralized analysis method of engine suspensions based on bond graph modeling and feedback control theory
Generalized analysis method of ine susensions based on bond grah modeling and feedback ntrol theory P.Y. RICHARD *, C. RAMU-ERMENT **, J. BUION *, X. MOREAU **, M. LE FOL *** *Equie Automatique des ystèmes
More information