The Effectiveness of the Linear Hull Effect
|
|
- Robyn Hunter
- 5 years ago
- Views:
Transcription
1 The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England
2 Abstrat There is no linear hull effet in linear ryptanalysis. Introdution Linear ryptanalysis [7] is one of the standard tehniques of assessing the seurity of blok iphers and is based on linear approximations to the plaintext, iphertext and key. In our disussion of linear approximations, we onsider an iterated blok ipher enryption with plaintext p, iphertext and extended key k, where p, and k are binary olumn vetors. We define the extended key k as the onatenation of the the round subkeys derived from the blok ipher key through the key shedule. A linear approximation in its most basi form is usually regarded as a statement of the form α T p = α T P p + αt C = γt k with probability + ǫ γ. The vetors α, α P and α C are known respetively as the overall data mask, the plaintext mask and the iphertext mask, with α T = α T P C αt, and the vetor γ as the key mask. The value ǫ γ is known as the imbalane or orrelation of the linear approximation, and ǫ γ as the bias of the linear approximation. If the linear expression is unbiased, that is ǫ γ 0, then the linear expression an potentially be used to give an estimate of one bit γ T k of key information. The number of plaintext-iphertext pairs required to estimate this key bit to a required auray is proportional to ǫ γ. This is the proedure given by Algorithm of [7]. The more sophistiated Algorithm of [7] uses trial enryptions and deryptions of the outer rounds under various partial subkeys. Under ertain assumptions, the tehnique of Algorithm is equivalent to onstruting a method of distinguishing the distribution of the linear expression α T p + γ T k, whih is zero with probability + ǫ γ, from a uniform distribution [7,8]. As before, the number of plaintext-iphertext pairs required to make this distintion to a required auray is proportional to ǫ γ [7]. The usual method of alulating the probability that suh a single linear expression holds is to use the so-alled Piling-Up Lemma of [7]. However, in the analysis of many blok iphers, suh use of the Piling-Up Lemma an generate a number of linear expressions with the same data mask but differing key masks, that is a key mask set Γ and a olletion of expressions of the form α T p = γ T k with probability + ǫ γ [γ Γ]. The existene of a number of suh unbiased expressions ǫ γ generated by the Piling-Up Lemma appears to be the motivation for the onept of the linear
3 hull of linear expressions introdued by [8]. The linear hull for data mask α is the set of all suh above expressions for different key masks γ. It is asserted by [8] that existene of suh a linear hull ontaining many suh unbiased expressions generally inreases the effiieny of Algorithm of [7]. Furthermore, suh an assertion appears to be generally aepted and widely used in the analysis of blok iphers. For example, a standard referene work on ryptology makes the following statement about the use of the linear hull in ryptanalysis [3]. LINEAR HULLS: Estimating the bias of approximations by onstruting linear harateristis is very onvenient, but in some ases, the value derived in this way diverges signifiantly from the atual bias. The most important ause for this differene is the so-alled linear hull effet, first desribed by Nyberg in 994 [8]. The effet takes plae when the orrelation between plaintext and iphertext bits, desribed by a speifi linear approximation, an be explained by multiple linear harateristis, eah with a non-negligible bias, and eah involving a different set of key bits. Suh a set of linear harateristis with idential input and output masks is alled a linear hull. Depending on the value of the key, the different harateristis will interfere onstrutively or destrutively, or even anel out ompletely. If the set of keys used in different linear harateristis are independent, then this effet might onsiderably redue the average bias of [a single linear] expression, and thus the suess rate of the simple attak desribed above [Algorithm of [7]]. Nyberg s paper [8] shows, however, that the more effiient attaks [Algorithm ] desribed in [7], whih only use the linear approximations as a distinguisher, will typially benefit from the linear hull effet. We show that this so-alled linear hull effet [3, 8] simply does not exist. The Fundamental Probability Our analysis of the linear hull effet is based on the fundamental probability Definition, together with the related onept of the fundamental imbalane Definition. The fundamental probability is a well-defined probability for use in linear ryptanalysis, partiularly in analysing the linear hull effet. Definition. The fundamental probability qk of data mask α for blok ipher enryptions under the fixed extended key k is qk = P k α T p = 0 Definition. The fundamental imbalane of data mask α under fixed key k with fundamental probability qk = + ηk is ηk = P k α T p = 0 P k α T p = = qk.
4 3 Probabilisti Interpretation of the Linear Hull We noted that the fundamental probability Definition is well-defined. However, the probability statements made in the usual definition of a linear hull are not in general well-defined. To demonstrate this, we onsider very arefully the nature of the statements about linear expressions used in the linear hull for a data mask α. In the standard formulation of linear ryptanalysis given in Setion, a linear approximation is defined diretly in terms of a key mask γ, that is a linear approximation is a statement of the form α T p = γ T k with probability + ǫ γ, whih only depends on the key through the value of γ T k. In terms of the fundamental probability for data mask α, we have P k α T p = 0 = + ηk = { + ǫ γ [γ T k = 0] ǫ γ [γ T k = ]. Thus the fundamental imbalane ηk is given in terms of the usual form of the imbalane ǫ γ used in linear ryptanalysis by ηk = γt k ǫ γ. However, for a fixed key k, the fundamental imbalane ηk is learly a onstant. Thus for the above probability to be well-defined, we require γt k ǫ γ to be onstant for all non-trivial key masks γ for fixed k. We now disuss this issue in more detail. The linear hull is usually onsidered to be defined by several probabilisti statements suh as for γ γ p α T = γ T k with probability + ǫ γ p and α T = γ T k with probability + ǫ γ. p Aording to these linear expressions, for a fixed key k, α T has to simultaneously take the value γ T k with probability + ǫ γ and the value γ T k with probability + ǫ γ. This means there are four ases required to evaluate the p fundamental probability P k α T = 0, as given in the following Table. γ T k = 0 γ T k = γ T k = 0 + ǫ γ = + ǫ γ + ǫ γ = ǫ γ γ T k = ǫ γ = + ǫ γ ǫ γ = ǫ γ p P k α T = 0
5 We an therefore dedue that ǫ γ = ǫ γ = 0. Thus the probability statements used in speifying a linear hull are not well-defined if there is more than one unbiased linear approximation in the linear hull. A linear hull in the sense of [3, 8], that is a olletion of several linear expressions eah with a signifiant imbalane or bias, is not a well-defined probabilisti onept. 4 Analogues in Differential Cryptanalysis of Linear Hulls A muh-repeated heuristi justifiation for the linear hull effet is given in [8] by laiming that the use of the linear hull is analogous to the use of the differential [6] in differential ryptanalysis [, ]. However, a detailed examination shows that this analogy is not sustainable. We therefore state the laim of [8] of an analogy between differential and linear ryptanalysis using our notation. We onlude that Algorithm [of [7]] makes in fat use of a family of linear approximate expressions p α P p + α T C + γt k = α T + γ T k where [the data mask] α is fixed but [the key mask] γ varies. This means that the round approximations whih uniquely determine γ and are uniquely determined by γ, an be hosen in all possible ways to form a hain of approximations from α T P p to αt C. Hene there is a lose analog with what is alled differentials in differential ryptanalysis [6]. The key mask γ does indeed determine a series of round data masks with the outer round masks onstrained by α. These data masks give a random proess [4, 5] with a state spae onsisting of two elements {0, }, in for example the manner desribed by [9]. The usual method of analysing this random proess in linear ryptanalysis is to use the Piling-Up Lemma [7], whih is appliable to this random proess if it is a Markov proess [9]. However, whether or not the Piling- Up Lemma is appliable, both states are onsidered by the Piling-Up alulation. Loosely speaking, the Piling-Up Lemma probability alulation may inorretly assign probability to the states if the Markov assumption is not valid, but all probability is assigned. There are no ignored states in linear ryptanalysis, and there is ertainly no missing probability not onsidered by the Piling-Up Lemma waiting to be found. In differential ryptanalysis, a pair of plaintexts is enrypted under the same fixed key. A random proess is derived by taking the differene of those plaintexts at every rounds, so giving a random proess with a state spae of size n. Under the assumption that this differential ryptanalysis random proess is a Markov proess, the differential [6] is alulated by using the produt of the matries of one-step round transition probabilities. The harateristi [, ] is essentially obtained by setting all but one element to 0 in eah of these one-step transition matries and then alulating the produt of these revised matries. A value for
6 a probability alulated using a differential [6] is therefore always at least that of the same value for a probability alulated using a harateristi [, ]. Thus there is a meaningful sense in differential ryptanalysis in whih the differential an be thought of as finding probabilities missed by the harateristi, as the harateristi ignores most of the states in the random proess. The orret analogue of the linear hull in differential ryptanalysis is the enhaned harateristi, onsidered in Setions 5. and 6.5 of []. The enhaned harateristi gives an enhaned differential ryptanalysis random proess in whih the state at any round is the differene between the between the data values at that round as for standard differential ryptanalysis and also a olletion of data values at ertain bit positions. Similarly, in linear ryptanalysis, the simultaneous use of two key masks with the same data mask, really defines sequenes of -dimensional data masks for the inner rounds. This gives rise to a random proess with, in general, a 4-element state spae rather than the -element state spae given by a single key mask. For both the enhaned harateristi in differential ryptanalysis and the linear hull in linear ryptanalysis, the state spae of the underlying random proess state spae is obtained by refining the standard differential ryptanalysis or linear ryptanalysis state spae. The linear hull therefore defines a new enhaned random proess beyond the standard linear ryptanalysis random proess. By ontrast, probability alulations in differential ryptanalysis using either harateristis or differentials are onduted with respet to the same standard differential ryptanalysis random proess. Thus a alulation using a linear hull and a alulation using a differential are fundamentally different in relation to their underlying standard random proess. A differential an find unused probability, whereas a linear hull simply annot. There is no analogue between linear hulls and differentials in the manner laimed by [8]. 5 Data Requirements for the Linear Hull Effet The linear hull effet supposedly redues the number of plaintext-iphertext pairs required to distinguish to a given auray a given distribution from the uniform distribution [3, 8]. Before analysing this laim, we first alulate the data requirements exatly. For a fixed extended key k, the number N k of plaintextiphertext pairs required to use the distinguisher to a required auray is asymptotially inversely proportional to qk [7]. Under the assumption that all extended keys are equally likely, then the mean number over all keys N of plaintext-iphertext pairs required to use the distinguisher to a speified degree of auray is given by N = E[N k ], for some suitably-defined expetation E. If we let K denote the set of extended keys, then the mean number N of plaintext-iphertext pairs required is proportional to [ qk ] = 4 ηk.
7 We now onsider the data requirement for the use of the linear hull given by [8]. The supposed existene of a linear hull effet depends on the assertion that this data requirement an be expressed in terms of a quantity defined by the Fundamental Theorem of [8]. We now examine this assertion. Aordingly, we let rγ, k = + γt k ηk, so rγ, k is the quantity referred to as pa, b, ; k in [8], where a, b refer to the data mask α and refers to the key mask γ. We note that pa, b, ; k is referred to as a probability by [8], but is not in general a well-defined probability Setion 3. The Fundamental Theorem onsiders the quantity ψ given by ψ = rγ, k = 4 ηk = 4 qk. Thus the quantity ψ onsidered by the Fundamental Theorem an be expressed in terms of the above expetation E as [ qk ] ψ = = 4 ηk. The laim for the redution in data omplexity given by the linear hull effet is then based on the assertion that the number N of plaintext-iphertext pairs required to distinguish the distribution from uniform is proportional to ψ, that is to say proportional to [ qk ψ ] = = 4 ηk. We now ompare these two quantities for distinguishing the speified distribution from a uniform distribution. The atual expeted number N of plaintextiphertext pairs and the number given by the appliation of the Fundamental Theorem in the manner of [8] are respetively proportional to [ qk ] [ qk ] and. These two quantities an easily be ompared by using Jensen s inequality [0], whih we state in Lemma. Lemma. Jensen s Inequality. A random variable X and onvex funtion ζ satisfy ζ E[X] E [ζx]. Inversion of the positive real numbers is a onvex funtion, so Jensen s inequality gives [ qk ] [ qk ].
8 The true data requirement is proportional to the left-hand side of the above inequality, whereas the quantity ψ onsidered by the Fundamental Theorem only addresses the right-hand side of this inequality. Thus the Fundamental Theorem an only ever be used to give a lower bound on the data omplexity. We illustrate this point in Examples and. Example. We onsider a linear ryptanalysis for data mask α where the fundamental probability is given by qk = P k α T p = 0 = + γt k ǫ γ + γ T k ǫ γ, where ǫ γ, ǫ γ 0. Thus the fundamental imbalane is given by ηk = γt k ǫ γ + γ T k ǫ γ. The true data requirement to distinguish this distribution from a uniform distribution to a given degree of auray is proportional to [ qk ] = 4 ǫ γ + ǫ γ + ǫ γ ǫ γ = ǫ γ + ǫ γ ǫ γ ǫγ. By ontrast, the approah of [8] based on the Fundamental Theorem asserts that the data requirement is proportional to [ qk ] = ǫγ + ǫ γ + ǫ γ ǫ γ = 4 ǫ γ +. ǫ γ However, ǫ γ + ǫ γ ǫ γ ǫ γ > ǫ, γ + ǫ γ as ǫ γ + ǫ γ > ǫ, γ ǫ γ so an see that [ qk ] [ qk ] >. For this example, we an easily see that the data requirement averaged over all extended keys is always larger than that asserted by the supposed linear hull effet. Example. We onsider the ryptanalysis of Example for a blok ipher where ǫ γ = ǫ γ. Suh a blok ipher would be onsidered to possess a large linear hull effet in the linear hull literature. The fundamental probability qk for data mask α is given by + ǫ γ + ǫ γ [γ T k = γ T k = 0] qk = ǫ γ + ǫ γ [γ T k = γ T k = ] [γ T k γ T k]. Clearly, for any key k kerγ + γ T, that is for half of all the extended keys, the distribution in question is uniform, so by definition is indistinguishable from
9 a uniform distribution. This is refleted in that fat that the true data requirement, proportional to ǫ γ + ǫ γ ǫ γ ǫ γ, is formally infinite. By ontrast, the supposed linear hull effet gives the data requirement as being proportional to ǫ γ + ǫ γ, a finite quantity. For this example, the supposed linear hull effet is effetively asserting that it is possible to distinguish an indistinguishable distribution given by one key beause there exists a distinguishable distribution given by some other key. 6 Conlusions The usual method of quantifying the supposed linear hull effet assumes that expetation and inversion are operations on a random variable whih ommute. Jensen s inequality shows that this assumption is generally inorret. Thus the supposed linear hull effet simply ignores Jensen s inequality, a fundamental result in probability theory and statistial inferene. Furthermore, Jensen s inequality shows that the Fundamental Theorem of [8] an only ever give a lower bound for the data requirement for using a olletion of linear approximations with the same data mask. The linear hull effet, in the usual sense [3, 8] of always improving the average effiieny of Algorithm of [7], is an illusion. Referenes. E. Biham and A. Shamir. Differential Cryptanalysis of the DES-like Cryptosystems. Journal of Cryptology, 4:3 7, 99.. E. Biham and A. Shamir. Differential Cryptanalysis of the Data Enryption Standard. Springer Verlag, A. Biryukov and C. De Cannière. Linear Cryptanalysis for Blok Ciphers. In H.C. Van Tilborg, editor, Enylopedia of Cryptography and Seurity, pages Springer, D.R. Cox and H.D. Miller. The Theory of Stohasti Proesses. Chapman and Hall, G.R. Grimmett and D.R. Stirzaker. Probability and Random Proesses. Oxford University Press, X. Lai, J.L. Massey, and S. Murphy. Markov Ciphers and Differential Cryptanalysis. In D.W. Davies, editor, Advanes in Cryptology EUROCRYPT 99, volume 547 of LNCS, pages Springer Verlag, M. Matsui. Linear Cryptanalysis for the DES Cipher. In T. Helleseth, editor, Advanes in Cryptology EUROCRYPT 993, volume 765 of LNCS, pages Springer Verlag, K. Nyberg. Linear Approximation of Blok Ciphers. In A. De Santis, editor, Advanes in Cryptology EUROCRYPT 94, volume 950 of LNCS, pages Springer Verlag, S. Murphy and F. Piper and M. Walker and P. Wild. Maximum Likelihood Estimation for Blok Cipher Keys. Tehnial Report RHUL-MA-006-3, Royal Holloway University of London, S.D. Silvey. Statistial Analysis. Chapman and Hall, 975.
Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationA variant of Coppersmith s Algorithm with Improved Complexity and Efficient Exhaustive Search
A variant of Coppersmith s Algorithm with Improved Complexity and Effiient Exhaustive Searh Jean-Sébastien Coron 1, Jean-Charles Faugère 2, Guénaël Renault 2, and Rina Zeitoun 2,3 1 University of Luxembourg
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationOptimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach
Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)
More informationMaximum Entropy and Exponential Families
Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It
More informationBäcklund Transformations: Some Old and New Perspectives
Bäklund Transformations: Some Old and New Perspetives C. J. Papahristou *, A. N. Magoulas ** * Department of Physial Sienes, Helleni Naval Aademy, Piraeus 18539, Greee E-mail: papahristou@snd.edu.gr **
More informationINTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 4, 2012
INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume, No 4, 01 Copyright 010 All rights reserved Integrated Publishing servies Researh artile ISSN 0976 4399 Strutural Modelling of Stability
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationCase I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1
MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationRobust Recovery of Signals From a Structured Union of Subspaces
Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling
More informationLikelihood-confidence intervals for quantiles in Extreme Value Distributions
Likelihood-onfidene intervals for quantiles in Extreme Value Distributions A. Bolívar, E. Díaz-Franés, J. Ortega, and E. Vilhis. Centro de Investigaión en Matemátias; A.P. 42, Guanajuato, Gto. 36; Méxio
More informationA simple expression for radial distribution functions of pure fluids and mixtures
A simple expression for radial distribution funtions of pure fluids and mixtures Enrio Matteoli a) Istituto di Chimia Quantistia ed Energetia Moleolare, CNR, Via Risorgimento, 35, 56126 Pisa, Italy G.
More informationError Bounds for Context Reduction and Feature Omission
Error Bounds for Context Redution and Feature Omission Eugen Bek, Ralf Shlüter, Hermann Ney,2 Human Language Tehnology and Pattern Reognition, Computer Siene Department RWTH Aahen University, Ahornstr.
More informationApplication of the Dyson-type boson mapping for low-lying electron excited states in molecules
Prog. Theor. Exp. Phys. 05, 063I0 ( pages DOI: 0.093/ptep/ptv068 Appliation of the Dyson-type boson mapping for low-lying eletron exited states in moleules adao Ohkido, and Makoto Takahashi Teaher-training
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More information23.1 Tuning controllers, in the large view Quoting from Section 16.7:
Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output
More informationAssessing the Performance of a BCI: A Task-Oriented Approach
Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,
More informationAn I-Vector Backend for Speaker Verification
An I-Vetor Bakend for Speaker Verifiation Patrik Kenny, 1 Themos Stafylakis, 1 Jahangir Alam, 1 and Marel Kokmann 2 1 CRIM, Canada, {patrik.kenny, themos.stafylakis, jahangir.alam}@rim.a 2 VoieTrust, Canada,
More informationUPPER-TRUNCATED POWER LAW DISTRIBUTIONS
Fratals, Vol. 9, No. (00) 09 World Sientifi Publishing Company UPPER-TRUNCATED POWER LAW DISTRIBUTIONS STEPHEN M. BURROUGHS and SARAH F. TEBBENS College of Marine Siene, University of South Florida, St.
More informationSupplementary Materials
Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationEinstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk
Einstein s Three Mistakes in Speial Relativity Revealed Copyright Joseph A. Rybzyk Abstrat When the evidene supported priniples of eletromagneti propagation are properly applied, the derived theory is
More informationAverage Rate Speed Scaling
Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.
More informationTHE TWIN PARADOX A RELATIVISTIC DOMAIN RESOLUTION
THE TWIN PARADOX A RELATIVISTIC DOMAIN RESOLUTION Peter G.Bass P.G.Bass www.relativitydomains.om January 0 ABSTRACT This short paper shows that the so alled "Twin Paradox" of Speial Relativity, is in fat
More informationNon-Markovian study of the relativistic magnetic-dipole spontaneous emission process of hydrogen-like atoms
NSTTUTE OF PHYSCS PUBLSHNG JOURNAL OF PHYSCS B: ATOMC, MOLECULAR AND OPTCAL PHYSCS J. Phys. B: At. Mol. Opt. Phys. 39 ) 7 85 doi:.88/953-75/39/8/ Non-Markovian study of the relativisti magneti-dipole spontaneous
More informationarxiv: v1 [physics.gen-ph] 5 Jan 2018
The Real Quaternion Relativity Viktor Ariel arxiv:1801.03393v1 [physis.gen-ph] 5 Jan 2018 In this work, we use real quaternions and the basi onept of the final speed of light in an attempt to enhane the
More informationSensitivity Analysis in Markov Networks
Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores
More informationPerturbation Analyses for the Cholesky Factorization with Backward Rounding Errors
Perturbation Analyses for the holesky Fatorization with Bakward Rounding Errors Xiao-Wen hang Shool of omputer Siene, MGill University, Montreal, Quebe, anada, H3A A7 Abstrat. This paper gives perturbation
More informationarxiv:cond-mat/ v1 [cond-mat.stat-mech] 16 Aug 2004
Computational omplexity and fundamental limitations to fermioni quantum Monte Carlo simulations arxiv:ond-mat/0408370v1 [ond-mat.stat-meh] 16 Aug 2004 Matthias Troyer, 1 Uwe-Jens Wiese 2 1 Theoretishe
More informationREFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS. 1. Introduction
Version of 5/2/2003 To appear in Advanes in Applied Mathematis REFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS MATTHIAS BECK AND SHELEMYAHU ZACKS Abstrat We study the Frobenius problem:
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More informationarxiv: v2 [math.pr] 9 Dec 2016
Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First
More informationWave Propagation through Random Media
Chapter 3. Wave Propagation through Random Media 3. Charateristis of Wave Behavior Sound propagation through random media is the entral part of this investigation. This hapter presents a frame of referene
More information3 Tidal systems modelling: ASMITA model
3 Tidal systems modelling: ASMITA model 3.1 Introdution For many pratial appliations, simulation and predition of oastal behaviour (morphologial development of shorefae, beahes and dunes) at a ertain level
More informationSymmetric Cryptanalytic Techniques. Sean Murphy ショーン マーフィー Royal Holloway
Symmetric Cryptanalytic Techniques Sean Murphy ショーン マーフィー Royal Holloway Block Ciphers Encrypt blocks of data using a key Iterative process ( rounds ) Modified by Modes of Operation Data Encryption Standard
More informationArray Design for Superresolution Direction-Finding Algorithms
Array Design for Superresolution Diretion-Finding Algorithms Naushad Hussein Dowlut BEng, ACGI, AMIEE Athanassios Manikas PhD, DIC, AMIEE, MIEEE Department of Eletrial Eletroni Engineering Imperial College
More informationModeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems
009 9th IEEE International Conferene on Distributed Computing Systems Modeling Probabilisti Measurement Correlations for Problem Determination in Large-Sale Distributed Systems Jing Gao Guofei Jiang Haifeng
More informationThe Hanging Chain. John McCuan. January 19, 2006
The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a
More informationThe Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge
The Conept of Mass as Interfering Photons, and the Originating Mehanism of Gravitation D.T. Froedge V04 Formerly Auburn University Phys-dtfroedge@glasgow-ky.om Abstrat For most purposes in physis the onept
More informationLOGISTIC REGRESSION IN DEPRESSION CLASSIFICATION
LOGISIC REGRESSIO I DEPRESSIO CLASSIFICAIO J. Kual,. V. ran, M. Bareš KSE, FJFI, CVU v Praze PCP, CS, 3LF UK v Praze Abstrat Well nown logisti regression and the other binary response models an be used
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationTest of General Relativity Theory by Investigating the Conservation of Energy in a Relativistic Free Fall in the Uniform Gravitational Field
Test of General Relatiity Theory by Inestigating the Conseration of Energy in a Relatiisti Free Fall in the Uniform Graitational Field By Jarosla Hyneek 1 Abstrat: This paper inestigates the General Relatiity
More informationA NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM
NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum
More informationarxiv:gr-qc/ v2 6 Feb 2004
Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this
More information22.54 Neutron Interactions and Applications (Spring 2004) Chapter 6 (2/24/04) Energy Transfer Kernel F(E E')
22.54 Neutron Interations and Appliations (Spring 2004) Chapter 6 (2/24/04) Energy Transfer Kernel F(E E') Referenes -- J. R. Lamarsh, Introdution to Nulear Reator Theory (Addison-Wesley, Reading, 1966),
More informationOrdered fields and the ultrafilter theorem
F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF
More informationUTC. Engineering 329. Proportional Controller Design. Speed System. John Beverly. Green Team. John Beverly Keith Skiles John Barker.
UTC Engineering 329 Proportional Controller Design for Speed System By John Beverly Green Team John Beverly Keith Skiles John Barker 24 Mar 2006 Introdution This experiment is intended test the variable
More informationIntegration of the Finite Toda Lattice with Complex-Valued Initial Data
Integration of the Finite Toda Lattie with Complex-Valued Initial Data Aydin Huseynov* and Gusein Sh Guseinov** *Institute of Mathematis and Mehanis, Azerbaijan National Aademy of Sienes, AZ4 Baku, Azerbaijan
More informationOn the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION
5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.
More informationThe gravitational phenomena without the curved spacetime
The gravitational phenomena without the urved spaetime Mirosław J. Kubiak Abstrat: In this paper was presented a desription of the gravitational phenomena in the new medium, different than the urved spaetime,
More informationRESEARCH ON RANDOM FOURIER WAVE-NUMBER SPECTRUM OF FLUCTUATING WIND SPEED
The Seventh Asia-Paifi Conferene on Wind Engineering, November 8-1, 9, Taipei, Taiwan RESEARCH ON RANDOM FORIER WAVE-NMBER SPECTRM OF FLCTATING WIND SPEED Qi Yan 1, Jie Li 1 Ph D. andidate, Department
More information7 Max-Flow Problems. Business Computing and Operations Research 608
7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates
More informationThe universal model of error of active power measuring channel
7 th Symposium EKO TC 4 3 rd Symposium EKO TC 9 and 5 th WADC Workshop nstrumentation for the CT Era Sept. 8-2 Kosie Slovakia The universal model of error of ative power measuring hannel Boris Stogny Evgeny
More informationGluing Potential Energy Surfaces with Rare Event Simulations
This is an open aess artile published under an ACS AuthorChoie Liense, whih permits opying and redistribution of the artile or any adaptations for non-ommerial purposes. pubs.as.org/jctc Gluing Potential
More informationCONDITIONAL CONFIDENCE INTERVAL FOR THE SCALE PARAMETER OF A WEIBULL DISTRIBUTION. Smail Mahdi
Serdia Math. J. 30 (2004), 55 70 CONDITIONAL CONFIDENCE INTERVAL FOR THE SCALE PARAMETER OF A WEIBULL DISTRIBUTION Smail Mahdi Communiated by N. M. Yanev Abstrat. A two-sided onditional onfidene interval
More informationAn Adaptive Optimization Approach to Active Cancellation of Repeated Transient Vibration Disturbances
An aptive Optimization Approah to Ative Canellation of Repeated Transient Vibration Disturbanes David L. Bowen RH Lyon Corp / Aenteh, 33 Moulton St., Cambridge, MA 138, U.S.A., owen@lyonorp.om J. Gregory
More informationWavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013
Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it
More informationAnalysis of discretization in the direct simulation Monte Carlo
PHYSICS OF FLUIDS VOLUME 1, UMBER 1 OCTOBER Analysis of disretization in the diret simulation Monte Carlo iolas G. Hadjionstantinou a) Department of Mehanial Engineering, Massahusetts Institute of Tehnology,
More informationMulti-version Coding for Consistent Distributed Storage of Correlated Data Updates
Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed
More informationUse of prior information in the form of interval constraints for the improved estimation of linear regression models with some missing responses
Journal of Statistial Planning and Inferene 136 (2006) 2430 2445 www.elsevier.om/loate/jspi Use of prior information in the form of interval onstraints for the improved estimation of linear regression
More informationQuantum secret sharing without entanglement
Quantum seret sharing without entanglement Guo-Ping Guo, Guang-Can Guo Key Laboratory of Quantum Information, University of Siene and Tehnology of China, Chinese Aademy of Sienes, Hefei, Anhui, P.R.China,
More informationarxiv:physics/ v1 [physics.class-ph] 8 Aug 2003
arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy
More informationJAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01
JAST 05 M.U.C. Women s College, Burdwan ISSN 395-353 -a peer reviewed multidisiplinary researh journal Vol.-0, Issue- 0 On Type II Fuzzy Parameterized Soft Sets Pinaki Majumdar Department of Mathematis,
More informationA Spatiotemporal Approach to Passive Sound Source Localization
A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,
More informationThe ESO method revisited
Noname manusript No. (will be inserted by the editor) The ESO method revisited Kazem Ghabraie the date of reeipt and aeptane should be inserted later Abstrat This paper examines the evolutionary strutural
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationCounting Idempotent Relations
Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their
More informationA Functional Representation of Fuzzy Preferences
Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong
More informationSingular Event Detection
Singular Event Detetion Rafael S. Garía Eletrial Engineering University of Puerto Rio at Mayagüez Rafael.Garia@ee.uprm.edu Faulty Mentor: S. Shankar Sastry Researh Supervisor: Jonathan Sprinkle Graduate
More informationRemark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.
Leture Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the funtion V ( x ) to be positive definite. ost often, our interest will be to show that x( t) as t. For that we will need
More informationProbabilistic Graphical Models
Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)
More informationTaste for variety and optimum product diversity in an open economy
Taste for variety and optimum produt diversity in an open eonomy Javier Coto-Martínez City University Paul Levine University of Surrey Otober 0, 005 María D.C. Garía-Alonso University of Kent Abstrat We
More informationComputer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationImprovements in the Modeling of the Self-ignition of Tetrafluoroethylene
Exerpt from the Proeedings of the OMSOL onferene 010 Paris Improvements in the Modeling of the Self-ignition of Tetrafluoroethylene M. Bekmann-Kluge 1 *,. errero 1, V. Shröder 1, A. Aikalin and J. Steinbah
More informationAdvanced Computational Fluid Dynamics AA215A Lecture 4
Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas
More informationPrivately Constraining and Programming PRFs, the LWE Way
Privately Constraining and Programming PRFs, the LWE Way Chris Peikert Sina Shiehian January 10, 2018 Abstrat Constrained pseudorandom funtions allow for delegating onstrained seret keys that let one ompute
More informationLECTURE NOTES FOR , FALL 2004
LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationOn scaling laws at the phase transition of systems with divergent order parameter and/or internal length : the example of DNA denaturation
On saling laws at the phase transition of systems with divergent order parameter and/or internal length : the example of DNA denaturation Sahin BUYUKDAGLI and Mar JOYEUX (a) Laboratoire de Spetrométrie
More informationUNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS. V. N. Matveev and O. V. Matvejev
UNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS V. N. Matveev and O. V. Matvejev Joint-Stok Company Sinerta Savanoriu pr., 159, Vilnius, LT-315, Lithuania E-mail: matwad@mail.ru Abstrat
More informationAdvances in Radio Science
Advanes in adio Siene 2003) 1: 99 104 Copernius GmbH 2003 Advanes in adio Siene A hybrid method ombining the FDTD and a time domain boundary-integral equation marhing-on-in-time algorithm A Beker and V
More informationBetter Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Better Seurity for Deterministi Publi-Key Enryption: The Auxiliary-Input Setting Zvika Brakerski Gil Segev Abstrat Deterministi publi-key enryption, introdued by Bellare, Boldyreva, and O Neill CRYPTO
More informationPredicting the confirmation time of Bitcoin transactions
Prediting the onfirmation time of Bitoin transations D.T. Koops Korteweg-de Vries Institute, University of Amsterdam arxiv:189.1596v1 [s.dc] 21 Sep 218 September 28, 218 Abstrat We study the probabilisti
More informationBreakdown of the Special Theory of Relativity as Proven by Synchronization of Clocks
Breakdown of the Speial Theory of Relativity as Proven by Synhronization of Cloks Koshun Suto Koshun_suto19@mbr.nifty.om Abstrat In this paper, a hypothetial preferred frame of referene is presumed, and
More informationScalable Positivity Preserving Model Reduction Using Linear Energy Functions
Salable Positivity Preserving Model Redution Using Linear Energy Funtions Sootla, Aivar; Rantzer, Anders Published in: IEEE 51st Annual Conferene on Deision and Control (CDC), 2012 DOI: 10.1109/CDC.2012.6427032
More informationDetermination of the reaction order
5/7/07 A quote of the wee (or amel of the wee): Apply yourself. Get all the eduation you an, but then... do something. Don't just stand there, mae it happen. Lee Iaoa Physial Chemistry GTM/5 reation order
More informationIMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION
09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE
More informationMulticomponent analysis on polluted waters by means of an electronic tongue
Sensors and Atuators B 44 (1997) 423 428 Multiomponent analysis on polluted waters by means of an eletroni tongue C. Di Natale a, *, A. Maagnano a, F. Davide a, A. D Amio a, A. Legin b, Y. Vlasov b, A.
More informationProbabilistic and nondeterministic aspects of Anonymity 1
MFPS XX1 Preliminary Version Probabilisti and nondeterministi aspets of Anonymity 1 Catusia Palamidessi 2 INRIA and LIX Éole Polytehnique, Rue de Salay, 91128 Palaiseau Cedex, FRANCE Abstrat Anonymity
More informationGeneral solution to a higher-order linear difference equation and existence of bounded solutions
Stević Advanes in Differene Equations 2017 2017:377 DOI 101186/s13662-017-1432-7 R E S E A R C H Open Aess General solution to a higher-order linear differene equation and existene of bounded solutions
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationReliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems
Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,
More informationQCLAS Sensor for Purity Monitoring in Medical Gas Supply Lines
DOI.56/sensoren6/P3. QLAS Sensor for Purity Monitoring in Medial Gas Supply Lines Henrik Zimmermann, Mathias Wiese, Alessandro Ragnoni neoplas ontrol GmbH, Walther-Rathenau-Str. 49a, 7489 Greifswald, Germany
More informationSeismic dip estimation based on the two-dimensional Hilbert transform and its application in random noise attenuation a
Seismi dip estimation based on the two-dimensional Hilbert transform and its appliation in random noise attenuation a a Published in Applied Geophysis, 1, 55-63 (Marh 015) Cai Liu, Changle Chen, Dian Wang,
More informationFNSN 2 - Chapter 11 Searches and limits
FS 2 - Chapter 11 Searhes and limits Paolo Bagnaia last mod. 19-May-17 11 Searhes and limits 1. Probability 2. Searhes and limits 3. Limits 4. Maximum likelihood 5. Interpretation of results methods ommonly
More informationMeasuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach
Measuring & Induing Neural Ativity Using Extraellular Fields I: Inverse systems approah Keith Dillon Department of Eletrial and Computer Engineering University of California San Diego 9500 Gilman Dr. La
More informationRelativity in Classical Physics
Relativity in Classial Physis Main Points Introdution Galilean (Newtonian) Relativity Relativity & Eletromagnetism Mihelson-Morley Experiment Introdution The theory of relativity deals with the study of
More information