Provable Security Against a Dierential Attack? Aarhus University, DK-8000 Aarhus C.
|
|
- Marshall Tucker
- 6 years ago
- Views:
Transcription
1 Provable Security Against a Dierential Attack Kaisa Nyberg and Lars Ramkilde Knudsen Aarus University, DK-8000 Aarus C. Abstract. Te purpose of tis paper is to sow tat tere exist DESlike iterated cipers, wic are provably resistant against dierential attacks. Te main result on te security of a DES-like ciper wit independent round keys is Teorem 1, wic gives an upper bound to te probability of s-round dierentials, as dened in [4] and tis upper bound depends only on te round function of te iterated ciper. Moreover, it is sown tat tere exist functions suc tat te probabilities of differentials are less tan or equal to 2 3,n, were n is te lengt of te plaintext block. We also sow a prototype of an iterated block ciper, wic is compatible wit DES and as proven security against dierential attacks. Key words. DES-like cipers, Dierential cryptanalysis, Almost perfect nonlinear permutations, Markov Cipers. 1 Introduction A DES-like ciper is a block ciper based on iterating a function, called F, several times. Eac iteration is called a round. Te input to eac round is divided into two alves. Te rigt alf is fed into F togeter wit a round key derived from akey scedule algoritm. Te output of F is added (modulo 2) to te left alf of te input and te two alves are swapped except for te last round. Te plaintext is te input to te rst round and te cipertext is te output of te last round. In [1] E. Biam and A. Samir introduced dierential cryptanalysis of DESlike cipers. In teir attacks tey make use of caracteristics, wic describe te beaviour of input and output dierences for some number of consecutive rounds. Te probability of a one-round caracteristic is te conditional probability tat given a certain dierence in te inputs to te round we get a certain dierence in te outputs of te round. Lai and Massey [4] observed tat for te success of dierential cryptanalysis it may not be necessary to x te values of input and output dierences for te intermediate rounds in a caracteristic. Tey introduced te notion of dierentials. Te probability of an s-round dierential is te conditional probability tat given an input dierence at te rst round, te output dierence at te s't round will be some xed value. Note tat A preliminary version of tis paper was presented in te rump session at Crypto '92 and will appear in te proceedings. Te work of te autor on tis project is supported by MATINE Board, Finland.
2 te probability of an s-round dierential wit input dierence A and output dierence B is te sum of te probabilities of all s-round caracteristics wit input dierence A and output dierence B. For s 2 te probabilities for a dierential and for te corresponding caracteristic are equal, but in general te probabilities for dierentials will be iger. In order to make a successful attack on a DES-like iterated ciper by dierential cryptanalysis te existence of good caracteristics is sucient. On te oter and to prove security against dierential attacks for DES-like iterated cipers we must ensure tat tere is no dierential wit a probability ig enoug to enable successful attacks. 2 Resistance against dierential attacks A DES-like iterated ciper wit block size 2n and wit r rounds is dened as follows. Let f : GF (2) m! GF (2) n ; m n E : GF (2) n! GF (2) m ; an ane expansion mapping and let K =(K 1 ;K 2 ; :::; K r ), were K i 2 GF (2) m, be te r round keys. Te round function (in te i't round) F : GF (2) n GF (2) m! GF (2) n is ten dened F (X; K i )=f(e(x) +K i ), were '+' is te bitwise addition modulo 2. Given a plaintext X =(X L ;X R ) and a key K =(K 1 ;K 2 ;:::;K r ) te cipertext Y =(Y L ;Y R ) is computed in r rounds. Set X L (0) = X L and X R (0) = X R and compute for i =1; 2; :::; r X L (i) =X R (i, 1) X R (i) =F ((X R (i, 1);K i )+X L (i, 1) X(i) =(X L (i);x R (i)) Set Y L = X R (r) andy R = X L (r). Te dierence between two n-bit blocks is dened as X = X + X An s-round caracteristic is an (s+1)-tuple ((0); (1); :::; (s)) considered as te possible values of (X(0); X(1);:::; X(s)); wereas an s-round dierential is a pair((0);(s)) considered as te possible values of (X(0);X(s)) [1, 4]. To prove resistance against dierential cryptanalysis we need to nd te best dierentials, so for te remainder of tis paper we consider only dierentials. Dierential attacks use s-round dierentials to pus forward te information of a xed input dierence at te rst round to te s't round independently of te used key. In tis paper we will sow tatitispossibletocoose te
3 round function so tat no single dierential is useful. Given a plaintext pair X; X,cosen by te cryptanalyst and r independent uniformly random round keys K 1 ;K 2 ; :::; K r, unknown to te cryptanalyst, te dierential may ormay not old. It is natural to measure te rate of success for te cryptanalyst by te probability of te dierential taken over te distributions of X and K. Te probability of a one-round dierential (X(0) = ; X(1) = ) is P (X(1) = j X(0) = ) wic by te property of Markov cipers, as dened in [4], is equal to P (X(1) = j X(0) = ; X = ) for all values of X, if te round key K is uniformly distributed. Hence te probability of a one round dierential is independent of te distribution of X and is taken over te distribution of K. Assuming tat te round keys K 1 ;K 2 ; :::; K r are mutually independent it follows tat te probability of an s-round caracteristic is te product of te probabilities of te individual rounds. Ten te probability of an s-round dierential equals (see also [4]) P (X(s) =(s) j X(0) = (0)) = X X (1) (2) :::: X sy (s,1) i=1 P (X(i) =(i) j X(i, 1) = (i, 1)) We denote by p max te igest probability for a non-trivial one-round dierential acievable by te cryptanalyst, i.e. p max = max max R6=0P (X(1) = j X(0) = ) were R is te rigt alfof. We sall sow in Sect. 3 tat te round function of a DES-like ciper can be cosen in suc away tat p max is small. Teorem 1 It is assumed tat in a DES-like ciper wit f : GF (2) m! GF (2) n te round keys are independent and uniformly random. Ten te probability of an s-round dierential, s 4, is less tan or equal to 2p 2 max. Proof: We sall rst give te proof for s = 4, i.e. P (X(4) = j X(0) = ) 2p 2 max for any ; (6= 0).Let L, R and L, R be te left and rigt alves of and. We denote by X R (i) te rigt input dierences at te i't round, see Figure 1. Let! denote tat, in order for te s-round dierential (; ) tooccur,itis necessary tat inputs to F wit dierence lead to outputs wit dierence. We split te proof into cases were L = 0 and L 6=0. Note tat wen L = 0 ten R 6= 0, oterwise L = R = L = R = 0, wic is of no use in dierential cryptanalysis. Similarly if L = 0 ten R 6=0.
4 X L(0) = L X R(0) = R F ( (( ( (((( ( (((( ( ( ((( F X R(1) ( (( ( (((( ( (((( ( ( ((( F X R(2) ( (( ( (((( ( (((( ( ( ((( F X R(3) = L ( (( ( (((( ( (((( ( ( ((( X L(4) = L X R(4) = R Fig. 1. Te four round dierential 1. L =0.Ten clearly X R (2) = R 6=0.IfX R (1) = 0 ten X R (2) = R = R 6= 0. It ten follows tat R = R! L in te rst round and X R (2) = R! 0 in te tird round, bot combinations wit probability at most p max.ifx R (1) 6= 0 ten it follows tat for any given X R (1) te second round must be X R (1)! R + R and te tird round must be X R (2) = R! X R (1), bot combinations wit probability atmostp max.we obtain P (X(4) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X R(1) = P (X X R (1) = 0 j X(0) = ) P (X(4) = j X(0) = ; X R (1) = 0) + P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X R(1)6=0 p 2 max + X X R(1)6=0 P (X R (1) j X(0) = ) p 2 max
5 2p 2 max since P X R(1)6=0 P (X R(1) j X(0) = ) L 6=0.We consider rst te 3-round dierential obtained by xing X R (1). We obtain P (X(4) X = j X(0) = ; X R (1)) = P (X R (2) j X(0) = ; X R (1)) X R(2) P (X(4) = j X(0) = ; X R (1);X R (2)) = P (X R (2) = 0 j X(0) = ; X R (1)) P (X(4) X = j X(0) = ; X R (1);X R (2) = 0) + P (X R (2) j X(0) = ; X R (1)) X R(2)6=0 p max p max + 2p 2 max P (X(4) = j X(0) = ; X R (1);X R (2)) X X R(2)6=0 P (X R (2) j X(0) = ; X R (1)) p 2 max Te above sows tat Teorem 1 olds for s-round dierentials for s 3if L 6= 0. In te rst inequality we used tat if X R (2) = 0 ten X R (1) 6= 0, since oterwise L = R =0.Now P (X(4) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X X R(1) X R(1) 2p 2 max Let now s>4. Ten P (X R (1) j X(0) = ) 2p 2 max P (X(s) X =jx(0) = ) = P (X(s, 4) j X(0) = ) P (X(s) =jx(0) = ; X(s, 4)) X(s,4) Since we assumed tat te round keys are independent and uniformly random it follows from te proof for s = 4 tat P (X(s) = j X(0) = ; X(s, 4)) = P (X(s) = j X(s, 4)) 2p 2 max Tus P (X(s) = j X(0) = ) 2p 2 max. 2 If f is a permutation, Teorem 1 can be proved for s 3. It comes from te fact tat to ave equal outputs of one round we must ave equal inputs.
6 Teorem 2 It is assumed tat te function f in a DES-like ciper is a permutation and tat te round keys are independent and uniformly random. Ten te probability of an s-round dierential for s 3 is less tan or equal to 2p 2 max. Proof: We give te proof for s = 3. Te general case can ten be proved like in te preceding teorem. Again we separate between two cases and use te same notation as before. 1. L =0.Ten X R (0) = R 6= 0, oterwise dierent inputs would ave to yield equal outputs in te second round, but tat is not possible, since f is a permutation. Te dierence in te inputs at te rst round is R 6=0andte dierence in te inputs at te second round is R 6=0,tus P (X(3) = j X(0) = ) p 2 max. 2. L 6=0.Like in te proof of Teorem 1 we split into cases were X R (1) is zero or not. Note tat if X R (1)=0) L 6= 0 oterwise R! L =0) R =0.We obtain P (X(3) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(3) = j X(0) = ; X R (1)) X R(1) = P (X X R (1) = 0 j X(0) = ) P (X(3) = j X(0) = ; X R (1) = 0) + P (X R (1) j X(0) = ) P (X(3) = j X(0) = ; X R (1)) X R(1)6=0 p 2 max + X X R(1)6=0 P (X R (1) j X(0) = ) p 2 max 2p 2 max 2 3 Almost perfect nonlinear permutations First we sow tat te maximum probability p max of a one-round dierential as an upperbound tat can be expressed in terms of te function f. Let Ten p f = max bmax a6=0 P (f(y + a)+f(y )=b): p max = max max R6=0P (X(1) = j X(0) = ) = max max R6=0P ( L + f(e(x + R )+K)+f(E(X)+K) = R ) p f ; were we ave assumed tat E is ane and denoted K + E(X) by Y.IfK is uniformly distributed ten so is Y. For a mapping f : GF (2) m! GF (2) n te lower bound for p f is 2,n. Mappings attaining tis lower bound were investigated in [7], were tey are called
7 perfect nonlinear generalizing te denition of perfect nonlinearity given for Boolean functions in [6]. It was sown in [7] tat perfect nonlinear mappings from GF (2) m! GF (2) n only exist for m even and m 2n. Hence tey can be adapted for use in DES-like cipers only wit expansion mappings tat double te block lengt. If te round function of a DES-like ciper does not involve any expansion, i.e. in te case wen f : GF (2) m! GF (2) n is a permutation, te trivial lower bound for p f is 2 1,n, since ten te dierence f(x + w)+f(x) obtains alf of te values in GF (2) n twice and never te oter alf of te values. We sall call te permutations wit p f =2 1,n almost perfect nonlinear. Te purpose of tis section is to sow tat suc permutations exist. For unexplained terminology we refer to [5]. Let m = nd, were n is odd. In [8] permutations f of GF (2 m )=GF (2 d ) n were constructed to satisfy te following property: (P) Every nonzero linear combination of te components of f is a nondegenerate quadratic form x t Cx in n indeterminates over GF (2 d ) wit rank(c+c t )= n, 1: It follows immediately from te denition tat te coordinate functions of a permutation wit (P) are complete, tat is, depend on all input variables. Te main result of tis section is te following teorem. Teorem 3 Let f : GF (2 d ) n! GF (2 d ) n, n odd, be apermutation satisfying (P). Ten p f =2d(1,n). Our proof of te teorem is based on te following tree lemmata concerning properties of linear structures of quadratic forms. Recall tat a linear structure w of f : F n! F, F a eld, is a vector in F n suc tat f(x + w) +f(x) is constant asx varies. Te linear structures of a quadratic form f(x) =x t Ax in n indeterminates over GF (2 d ) wit rank(a+a t )=n,1 form a one-dimensional linear subspace of GF (2 d ) n (see [8], Prop. 3). For a quadratic form f and every xed w te function f(x + w)+f(x) ofx is ane or constant. From tis we get te rst lemma. Lemma 1 Let w 2 GF (2 d ) n be not a linear structure of f : GF (2 d ) n! GF (2 d );f(x) =x t Ax. Ten te function f(x + w) +f(x) of x is balanced, i.e. obtains eac value in GF (2 d ) equally many times. Lemma 2 Let f(x) = x t Ax be a quadratic form in n indeterminates over GF (2) suc tat rank(a + A t )=n, 1. Ten f is nondegenerate if and only if f(w) 6= 0 for te nonzero linear structures w of f (see also Lemma 4.1. in [3]). Proof: Let '(x 1 ;:::;x n )=x 1 x 2 + :::+ x n,2 x n,1 + x 2 n
8 = 0 or 1, be te quadratic forms to wic all quadratic forms f(x) =x t Ax wit rank(a + A t )=n, 1 are equivalent (see [5], C.6.2). It means tat tere is a linear transformation T of coordinates suc tat f(x) ='(Tx). Ten w is a linear structure of f if and only if Tw =(0; 0;:::;0;a), were a 2 GF (2 d ). Ten f is nondegenerate if and only if ' is nondegenerate wic is true if and only if =1.But = 1 if and only if f(w) ='(Tw) ='(0;:::;0;a)=a 2 6=0 for a 6= 0: 2 Lemma 3 Let f : GF (2 d ) n! GF (2 d ) n beapermutation wit property (P). Ten every nonzero w 2 GF (2 d ) n is a linear structure of a nonzero linear combination of te components of f. Proof: Let u be a nonzero vector in GF (2 d ) n and let w 2 GF (2 d ) n be a nonzero linear structure of u f. Ten w, 2 GF (2 d ) are te linear structures of cu f, c 2 GF (2 d ). Hence it suces to sow tat if u 1 f and u 2 f sare a nonzero linear structure ten tere is c 2 GF (2 d ) suc tat u 1 = cu 2. Let w be a nonzero linear structure of u 1 f and u 2 f. Ten w is also te linear structure of (c 1 u 1 + c 2 u 2 ) f ; for all c 1 ;c 2 2 GF (2 d ): Since u 1 f and u 2 f are nondegenerate it follows from Lemma 2 tat u 1 f(w) 6= 0 and u 2 f(w) 6= 0: Hence tere exists c 6= 0 suc tat cu 1 f(w) =u 2 f(w) or, wat is te same, (cu 1 + u 2 ) f(w) =0: If cu 1 6= u 2,ten(cu 1 + u 2 ) f is nondegenerate wic cannot be true by Lemma 2. Consequently cu 1 = u 2. 2 Now Teorem 3 is a consequence of te following Teorem 4 Let f =(f 1 ;f 2 ;:::;f n ): GF (2 d ) n! GF (2 d ) n beapermutation tat satises (P). Ten for every xed nonzero dierence w 2 GF (2 d ) n of te inputs to f, te dierences of te outputs lie in an ane yperplane of GF (2 d ) n and are uniformly distributed tere. Proof: Let w be a nonzero input dierence for f. Ten by Lemma 3 tere is v 2 GF (2 d ) n, v 6= 0, suc tat w is te linear structure of vf and by Lemma 2 v f(x + w)+v f(x) =v f(w) 6= 0 for all x 2 GF (2 d ) n.we denote b 0 = v f(w): Let u 1 ;:::;u n,1 be linearly independent vectors in GF (2 d ) n suc tat v 62 spanfu 1 ;:::;u n,1 g: Ten by Lemma 1 for every u 2 spanfu 1 ;:::;u n,1 g te function x 7! u f(x + w)+u f(x)
9 obtains eac value in GF (2 d ) equally many times. Consequently (see [5]), for every (b 1 ;:::;b n,1 ) 2 GF (2 d ) n,1, te system of equations u i f(x + w)+u i f(x) =b i ;i=1;:::;n, 1; as 2 d solutions x 2 GF (2 d ) n. Hence te system of n equations: (2) u i f(x + w)+u i f(x) =b i ;i=1;:::;n, 1; v f(x + w)+v f(x) =b as 2 d solutions if b = b 0 and no solutions if b 6= b 0 : Every system of n equations f i (x + w)+f i (x) =a i ;i=1; 2;:::;n is a linear transformation of (2), from wic te claim follows. 2 By a similar argumentation one can prove te following generalization of Teorem 3. Teorem 5 Let f be apermutation in GF (2 d ) n, n odd, wit property (P ) and let f 1 ;:::;f n be te components of f wit respect to some arbitrary xed basis over GF (2 d ).Let l n and set =(f 1 ;f 2 ;:::;f l ). Ten p =2d(1,l). From te results of Section 2 we now obtain Teorem 6 Assume tat in a DES-like ciper te function f is a mapping from GF (2) nd to GF (2) ld, n l, obtained fromapermutation in GF (2 d ) n wit (P) by discarding n, l output coordinates. Ten p f =2d(1,l). Moreover, if n>l, ten te probability of every r-round dierential, r 4, is less tan or equal to 2 2d(1,l)+1, assuming tat te round keys are uniformly random and independent. If n = l, te probability of every r-round dierential, r 3, is less tan or equal to 2 2d(1,l)+1. 4 Class of permutations wit property (P) In tis section we sow tat te permutations f(x) =x 2k +1 in GF (2 nd ) wit k =0modd, gcd(k; n) = 1, and n odd, ave property (P), wen considered as permutations of GF (2 d ) n. Let 1 ; :::; P n be a basis in GF (2 nd )over GF (2 d )and 1 ; :::; n be its dual basis. n Let x = i=1 x i i ;x i 2 GF (2 d ). Ten te i't component f i (x) off(x) wit respect to te basis 1 ;:::; n is f i (x) =Tr( i x 2k +1 ) = Tr( i ( = = j=1 l=1 j=1 l=1 j=1 x j j )( l=1 x l l ) 2k ) Tr( i j 2k l )x j x l Tr( i j ( i l ) 2k )x j x l
10 were i 2 GF (2 nd )issuc tat 2k +1 i = i ;i=1; 2; :::; n: Now it is straigtforward to ceck tat Tr( i j ( i l ) 2k ) 2 GF (2 d )isteentry on te j't row and l't column in te matrix A i = B t i Rk B i were B i = 0 B i 1 i 2 i n ( i 1 ) 2 ( i 2 ) 2 ( i n ) ( i 1 ) 2n,1 ( i 2 ) 2n,1 ( i n ) 2n,1 is a n n regular matrix over GF (2 nd ) and R = 0 B is te cyclic sift for wic rank(r k +(R k ) t )=n, 1ifgcd(k; n) = 1. Ten also x t Rx is nondegenerate. Consequently, and f i (x) =x t A i x 1 C C A 1 C C A rank(a i + A t i)=rank(b t i(r k +(R k ) t )B i )=rank(r k +(R k ) t )=n, 1 over GF (2 nd ). Tus rank(a i + A t i )=n, 1alsoover GF (2d ), since te rank does not decrease wen going to a subeld and it cannot be n. By te linearity of te trace function te same olds for every nonzero linear combination of te components f i of f : Tis completes te proof of property (P) for f. 5 A prototype of a DES-like ciper for encryption Let g(x) = x 3 in GF (2 33 ). Tere are several ecient ways of implementing tis power polynomial and eac of tem suggest a coice of a basis in GF (2 33 ). Let us x a basis and discard one output coordinate. Ten we ave a function f : GF (2) 33! GF (2) 32 : Te 64-bit plaintext block is divided into two 32-bit alves L and R. Te plaintext expansion is an ane mapping E : GF (2) 32! GF (2) 33 : Eac round take a 32 bit input and a 33 bit key. Te round function is LkR 7! R k L + f(e(r)+k): In [2] E. Biam and A. Samir introduced an improved dierential attack on 16-round DES. Tis means, tat in general for an r-round DES-like ciper te existence of an (r, 2)-round dierential wit a suciently ig probability may enable a successful dierential attack. From Teorem 6 we ave tat every four and ve round dierential of tis block ciper as probability less tan or equal to 2,61. Terefore we suggest at least six rounds for te block ciper. All round
11 keys sould be independent, terefore we need at least 198 key bits. More examples of permutations f for wic p max is low can be found in [9]. Te examples include te inverses of x 7! x 2k +1 and te mappings x 7! x,1, wose coordinate functions are of iger nonlinear order tan quadratic. 6 Acknowledgements We would like to tank D. Coppersmit and an anonymous referee for comments tat improved te paper. References 1. E. Biam, A. Samir. Dierential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4 No E. Biam, A. Samir. Dierential Cryptanalysis of te full 16-round DES. Tecnical Report # 708, Tecnion - Israel Institute of Tecnology. 3. P. Camion, C. Carlet, P. Carpin, N. Sendrier. On Correlation-immune functions. Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science 576, Springer-Verlag, 1992, pp X. Lai, J. L. Massey, S. Murpy. Markov Cipers and Dierential Cryptanalysis. Advances in Cryptology - Eurocrypt '91. Lecture Notes in Computer Science 547, Springer-Verlag, 1992, pp R. Lidl, H. Niederreiter. Finite Fields. Encyclopedia of Matematics and its applications, Vol. 20. Addison-Wesley, Reading, Massacusetts, W. Meier, O. Staelbac. Nonlinearity criteria for cryptograpic functions. Advances in Cryptology - Eurocrypt '89. Lecture Notes in Computer Science, 434, Springer-Verlag, 1990, pp K. Nyberg. Perfect nonlinear S-boxes. Advances in Cryptology - Proceedings of Eurocrypt '91. Lecture Notes in Computer Science 547, Springer Verlag, 1991, pp K. Nyberg. On te construction of igly nonlinear permutations. Advances in Cryptology - Eurocrypt '92. Lecture Notes in Computer Science, 658, Springer- Verlag, 1993, pp K. Nyberg. Dierentially uniform mappings for cryptograpy. Proceedings of Eurocrypt '93 (to appear). Tis article was processed using te LaT E X macro package wit LLNCS style
Effect of the Dependent Paths in Linear Hull
1 Effect of te Dependent Pats in Linear Hull Zenli Dai, Meiqin Wang, Yue Sun Scool of Matematics, Sandong University, Jinan, 250100, Cina Key Laboratory of Cryptologic Tecnology and Information Security,
More informationMA455 Manifolds Solutions 1 May 2008
MA455 Manifolds Solutions 1 May 2008 1. (i) Given real numbers a < b, find a diffeomorpism (a, b) R. Solution: For example first map (a, b) to (0, π/2) and ten map (0, π/2) diffeomorpically to R using
More informationWell known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,
More informationThe total error in numerical differentiation
AMS 147 Computational Metods and Applications Lecture 08 Copyrigt by Hongyun Wang, UCSC Recap: Loss of accuracy due to numerical cancellation A B 3, 3 ~10 16 In calculating te difference between A and
More informationExercises for numerical differentiation. Øyvind Ryan
Exercises for numerical differentiation Øyvind Ryan February 25, 2013 1. Mark eac of te following statements as true or false. a. Wen we use te approximation f (a) (f (a +) f (a))/ on a computer, we can
More informationContinuity and Differentiability Worksheet
Continuity and Differentiability Workseet (Be sure tat you can also do te grapical eercises from te tet- Tese were not included below! Typical problems are like problems -3, p. 6; -3, p. 7; 33-34, p. 7;
More informationMath 161 (33) - Final exam
Name: Id #: Mat 161 (33) - Final exam Fall Quarter 2015 Wednesday December 9, 2015-10:30am to 12:30am Instructions: Prob. Points Score possible 1 25 2 25 3 25 4 25 TOTAL 75 (BEST 3) Read eac problem carefully.
More informationlecture 26: Richardson extrapolation
43 lecture 26: Ricardson extrapolation 35 Ricardson extrapolation, Romberg integration Trougout numerical analysis, one encounters procedures tat apply some simple approximation (eg, linear interpolation)
More informationDifferentiation in higher dimensions
Capter 2 Differentiation in iger dimensions 2.1 Te Total Derivative Recall tat if f : R R is a 1-variable function, and a R, we say tat f is differentiable at x = a if and only if te ratio f(a+) f(a) tends
More informationMath 102 TEST CHAPTERS 3 & 4 Solutions & Comments Fall 2006
Mat 102 TEST CHAPTERS 3 & 4 Solutions & Comments Fall 2006 f(x+) f(x) 10 1. For f(x) = x 2 + 2x 5, find ))))))))) and simplify completely. NOTE: **f(x+) is NOT f(x)+! f(x+) f(x) (x+) 2 + 2(x+) 5 ( x 2
More informationUniversity Mathematics 2
University Matematics 2 1 Differentiability In tis section, we discuss te differentiability of functions. Definition 1.1 Differentiable function). Let f) be a function. We say tat f is differentiable at
More informationComplexity of Decoding Positive-Rate Reed-Solomon Codes
Complexity of Decoding Positive-Rate Reed-Solomon Codes Qi Ceng 1 and Daqing Wan 1 Scool of Computer Science Te University of Oklaoma Norman, OK73019 Email: qceng@cs.ou.edu Department of Matematics University
More informationOrder of Accuracy. ũ h u Ch p, (1)
Order of Accuracy 1 Terminology We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, wic can be for instance te grid size or time step in a numerical
More informationSolutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014
Solutions to te Multivariable Calculus and Linear Algebra problems on te Compreensive Examination of January 3, 24 Tere are 9 problems ( points eac, totaling 9 points) on tis portion of te examination.
More informationDK-2800 Lyngby, Denmark, Mercierlaan 94, B{3001 Heverlee, Belgium,
The Interpolation Attack on Block Ciphers? Thomas Jakobsen 1 and Lars R. Knudsen 2 1 Department of Mathematics, Building 303, Technical University of Denmark, DK-2800 Lyngby, Denmark, email:jakobsen@mat.dtu.dk.
More information3.4 Worksheet: Proof of the Chain Rule NAME
Mat 1170 3.4 Workseet: Proof of te Cain Rule NAME Te Cain Rule So far we are able to differentiate all types of functions. For example: polynomials, rational, root, and trigonometric functions. We are
More informationhold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies
Dierential cryptanalysis o eistel ciphers and dierentially uniorm mappings Anne Canteaut INRIA Projet codes Domaine de Voluceau BP 105 78153 Le Chesnay Cedex rance Abstract In this paper we study the round
More informationMathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative
Matematics 5 Workseet 11 Geometry, Tangency, and te Derivative Problem 1. Find te equation of a line wit slope m tat intersects te point (3, 9). Solution. Te equation for a line passing troug a point (x
More informationPrecalculus Test 2 Practice Questions Page 1. Note: You can expect other types of questions on the test than the ones presented here!
Precalculus Test 2 Practice Questions Page Note: You can expect oter types of questions on te test tan te ones presented ere! Questions Example. Find te vertex of te quadratic f(x) = 4x 2 x. Example 2.
More informationVolume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households
Volume 29, Issue 3 Existence of competitive equilibrium in economies wit multi-member ouseolds Noriisa Sato Graduate Scool of Economics, Waseda University Abstract Tis paper focuses on te existence of
More informationHOMEWORK HELP 2 FOR MATH 151
HOMEWORK HELP 2 FOR MATH 151 Here we go; te second round of omework elp. If tere are oters you would like to see, let me know! 2.4, 43 and 44 At wat points are te functions f(x) and g(x) = xf(x)continuous,
More informationConsider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx.
Capter 2 Integrals as sums and derivatives as differences We now switc to te simplest metods for integrating or differentiating a function from its function samples. A careful study of Taylor expansions
More informationRecent Progress in the Integration of Poisson Systems via the Mid Point Rule and Runge Kutta Algorithm
Recent Progress in te Integration of Poisson Systems via te Mid Point Rule and Runge Kutta Algoritm Klaus Bucner, Mircea Craioveanu and Mircea Puta Abstract Some recent progress in te integration of Poisson
More informationQuantum Numbers and Rules
OpenStax-CNX module: m42614 1 Quantum Numbers and Rules OpenStax College Tis work is produced by OpenStax-CNX and licensed under te Creative Commons Attribution License 3.0 Abstract Dene quantum number.
More information1. Consider the trigonometric function f(t) whose graph is shown below. Write down a possible formula for f(t).
. Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd, periodic function tat as been sifted upwards, so we will use
More informationChapter 4: Numerical Methods for Common Mathematical Problems
1 Capter 4: Numerical Metods for Common Matematical Problems Interpolation Problem: Suppose we ave data defined at a discrete set of points (x i, y i ), i = 0, 1,..., N. Often it is useful to ave a smoot
More informationNumerical Differentiation
Numerical Differentiation Finite Difference Formulas for te first derivative (Using Taylor Expansion tecnique) (section 8.3.) Suppose tat f() = g() is a function of te variable, and tat as 0 te function
More information1 Lecture 13: The derivative as a function.
1 Lecture 13: Te erivative as a function. 1.1 Outline Definition of te erivative as a function. efinitions of ifferentiability. Power rule, erivative te exponential function Derivative of a sum an a multiple
More informationSection 3.1: Derivatives of Polynomials and Exponential Functions
Section 3.1: Derivatives of Polynomials and Exponential Functions In previous sections we developed te concept of te derivative and derivative function. Te only issue wit our definition owever is tat it
More informationSymmetry Labeling of Molecular Energies
Capter 7. Symmetry Labeling of Molecular Energies Notes: Most of te material presented in tis capter is taken from Bunker and Jensen 1998, Cap. 6, and Bunker and Jensen 2005, Cap. 7. 7.1 Hamiltonian Symmetry
More information2.3 Algebraic approach to limits
CHAPTER 2. LIMITS 32 2.3 Algebraic approac to its Now we start to learn ow to find its algebraically. Tis starts wit te simplest possible its, and ten builds tese up to more complicated examples. Fact.
More information1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point
MA00 Capter 6 Calculus and Basic Linear Algebra I Limits, Continuity and Differentiability Te concept of its (p.7 p.9, p.4 p.49, p.55 p.56). Limits Consider te function determined by te formula f Note
More informationPolynomial Interpolation
Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximatinga function fx, wose values at a set of distinct points x, x, x,, x n are known, by a polynomial P x suc
More informationMVT and Rolle s Theorem
AP Calculus CHAPTER 4 WORKSHEET APPLICATIONS OF DIFFERENTIATION MVT and Rolle s Teorem Name Seat # Date UNLESS INDICATED, DO NOT USE YOUR CALCULATOR FOR ANY OF THESE QUESTIONS In problems 1 and, state
More informationInf sup testing of upwind methods
INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING Int. J. Numer. Met. Engng 000; 48:745 760 Inf sup testing of upwind metods Klaus-Jurgen Bate 1; ;, Dena Hendriana 1, Franco Brezzi and Giancarlo
More information64 IX. The Exceptional Lie Algebras
64 IX. Te Exceptional Lie Algebras IX. Te Exceptional Lie Algebras We ave displayed te four series of classical Lie algebras and teir Dynkin diagrams. How many more simple Lie algebras are tere? Surprisingly,
More informationLECTURE 14 NUMERICAL INTEGRATION. Find
LECTURE 14 NUMERCAL NTEGRATON Find b a fxdx or b a vx ux fx ydy dx Often integration is required. However te form of fx may be suc tat analytical integration would be very difficult or impossible. Use
More informationCHAPTER (A) When x = 2, y = 6, so f( 2) = 6. (B) When y = 4, x can equal 6, 2, or 4.
SECTION 3-1 101 CHAPTER 3 Section 3-1 1. No. A correspondence between two sets is a function only if eactly one element of te second set corresponds to eac element of te first set. 3. Te domain of a function
More informationSubdifferentials of convex functions
Subdifferentials of convex functions Jordan Bell jordan.bell@gmail.com Department of Matematics, University of Toronto April 21, 2014 Wenever we speak about a vector space in tis note we mean a vector
More informationExam 1 Review Solutions
Exam Review Solutions Please also review te old quizzes, and be sure tat you understand te omework problems. General notes: () Always give an algebraic reason for your answer (graps are not sufficient),
More informationComplexity of Decoding Positive-Rate Primitive Reed-Solomon Codes
1 Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes Qi Ceng and Daqing Wan Abstract It as been proved tat te maximum likeliood decoding problem of Reed-Solomon codes is NP-ard. However,
More information4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these.
Mat 11. Test Form N Fall 016 Name. Instructions. Te first eleven problems are wort points eac. Te last six problems are wort 5 points eac. For te last six problems, you must use relevant metods of algebra
More informationPacking polynomials on multidimensional integer sectors
Pacing polynomials on multidimensional integer sectors Luis B Morales IIMAS, Universidad Nacional Autónoma de México, Ciudad de México, 04510, México lbm@unammx Submitted: Jun 3, 015; Accepted: Sep 8,
More informationSolution. Solution. f (x) = (cos x)2 cos(2x) 2 sin(2x) 2 cos x ( sin x) (cos x) 4. f (π/4) = ( 2/2) ( 2/2) ( 2/2) ( 2/2) 4.
December 09, 20 Calculus PracticeTest s Name: (4 points) Find te absolute extrema of f(x) = x 3 0 on te interval [0, 4] Te derivative of f(x) is f (x) = 3x 2, wic is zero only at x = 0 Tus we only need
More informationarxiv: v1 [math.dg] 4 Feb 2015
CENTROID OF TRIANGLES ASSOCIATED WITH A CURVE arxiv:1502.01205v1 [mat.dg] 4 Feb 2015 Dong-Soo Kim and Dong Seo Kim Abstract. Arcimedes sowed tat te area between a parabola and any cord AB on te parabola
More informationFinding and Using Derivative The shortcuts
Calculus 1 Lia Vas Finding and Using Derivative Te sortcuts We ave seen tat te formula f f(x+) f(x) (x) = lim 0 is manageable for relatively simple functions like a linear or quadratic. For more complex
More informationSection 15.6 Directional Derivatives and the Gradient Vector
Section 15.6 Directional Derivatives and te Gradient Vector Finding rates of cange in different directions Recall tat wen we first started considering derivatives of functions of more tan one variable,
More informationAnalytic Functions. Differentiable Functions of a Complex Variable
Analytic Functions Differentiable Functions of a Complex Variable In tis capter, we sall generalize te ideas for polynomials power series of a complex variable we developed in te previous capter to general
More informationThe Complexity of Computing the MCD-Estimator
Te Complexity of Computing te MCD-Estimator Torsten Bernolt Lerstul Informatik 2 Universität Dortmund, Germany torstenbernolt@uni-dortmundde Paul Fiscer IMM, Danisc Tecnical University Kongens Lyngby,
More information1 + t5 dt with respect to x. du = 2. dg du = f(u). du dx. dg dx = dg. du du. dg du. dx = 4x3. - page 1 -
Eercise. Find te derivative of g( 3 + t5 dt wit respect to. Solution: Te integrand is f(t + t 5. By FTC, f( + 5. Eercise. Find te derivative of e t2 dt wit respect to. Solution: Te integrand is f(t e t2.
More informationLecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines
Lecture 5 Interpolation II Introduction In te previous lecture we focused primarily on polynomial interpolation of a set of n points. A difficulty we observed is tat wen n is large, our polynomial as to
More informationMath 1241 Calculus Test 1
February 4, 2004 Name Te first nine problems count 6 points eac and te final seven count as marked. Tere are 120 points available on tis test. Multiple coice section. Circle te correct coice(s). You do
More information(a) At what number x = a does f have a removable discontinuity? What value f(a) should be assigned to f at x = a in order to make f continuous at a?
Solutions to Test 1 Fall 016 1pt 1. Te grap of a function f(x) is sown at rigt below. Part I. State te value of eac limit. If a limit is infinite, state weter it is or. If a limit does not exist (but is
More informationMath 1210 Midterm 1 January 31st, 2014
Mat 110 Midterm 1 January 1st, 01 Tis exam consists of sections, A and B. Section A is conceptual, wereas section B is more computational. Te value of every question is indicated at te beginning of it.
More informationPOLYNOMIAL AND SPLINE ESTIMATORS OF THE DISTRIBUTION FUNCTION WITH PRESCRIBED ACCURACY
APPLICATIONES MATHEMATICAE 36, (29), pp. 2 Zbigniew Ciesielski (Sopot) Ryszard Zieliński (Warszawa) POLYNOMIAL AND SPLINE ESTIMATORS OF THE DISTRIBUTION FUNCTION WITH PRESCRIBED ACCURACY Abstract. Dvoretzky
More informationTaylor Series and the Mean Value Theorem of Derivatives
1 - Taylor Series and te Mean Value Teorem o Derivatives Te numerical solution o engineering and scientiic problems described by matematical models oten requires solving dierential equations. Dierential
More informationLecture XVII. Abstract We introduce the concept of directional derivative of a scalar function and discuss its relation with the gradient operator.
Lecture XVII Abstract We introduce te concept of directional derivative of a scalar function and discuss its relation wit te gradient operator. Directional derivative and gradient Te directional derivative
More informationb 1 A = bh h r V = pr
. Te use of a calculator is not permitted.. All variables and expressions used represent real numbers unless oterwise indicated.. Figures provided in tis test are drawn to scale unless oterwise indicated..
More informationSome Review Problems for First Midterm Mathematics 1300, Calculus 1
Some Review Problems for First Midterm Matematics 00, Calculus. Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd,
More informationLecture 21. Numerical differentiation. f ( x+h) f ( x) h h
Lecture Numerical differentiation Introduction We can analytically calculate te derivative of any elementary function, so tere migt seem to be no motivation for calculating derivatives numerically. However
More informationContinuity. Example 1
Continuity MATH 1003 Calculus and Linear Algebra (Lecture 13.5) Maoseng Xiong Department of Matematics, HKUST A function f : (a, b) R is continuous at a point c (a, b) if 1. x c f (x) exists, 2. f (c)
More informationMaterial for Difference Quotient
Material for Difference Quotient Prepared by Stepanie Quintal, graduate student and Marvin Stick, professor Dept. of Matematical Sciences, UMass Lowell Summer 05 Preface Te following difference quotient
More informationWYSE Academic Challenge 2004 Sectional Mathematics Solution Set
WYSE Academic Callenge 00 Sectional Matematics Solution Set. Answer: B. Since te equation can be written in te form x + y, we ave a major 5 semi-axis of lengt 5 and minor semi-axis of lengt. Tis means
More informationMath 212-Lecture 9. For a single-variable function z = f(x), the derivative is f (x) = lim h 0
3.4: Partial Derivatives Definition Mat 22-Lecture 9 For a single-variable function z = f(x), te derivative is f (x) = lim 0 f(x+) f(x). For a function z = f(x, y) of two variables, to define te derivatives,
More informationUNIVERSITY OF MANITOBA DEPARTMENT OF MATHEMATICS MATH 1510 Applied Calculus I FIRST TERM EXAMINATION - Version A October 12, :30 am
DEPARTMENT OF MATHEMATICS MATH 1510 Applied Calculus I October 12, 2016 8:30 am LAST NAME: FIRST NAME: STUDENT NUMBER: SIGNATURE: (I understand tat ceating is a serious offense DO NOT WRITE IN THIS TABLE
More informationA classical particle with spin realized
A classical particle wit spin realized by reduction of a nonlinear nonolonomic constraint R. Cusman D. Kemppainen y and J. Sniatycki y Abstract 1 In tis paper we describe te motion of a nonlinear nonolonomically
More information1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist
Mat 1120 Calculus Test 2. October 18, 2001 Your name Te multiple coice problems count 4 points eac. In te multiple coice section, circle te correct coice (or coices). You must sow your work on te oter
More informationINTRODUCTION AND MATHEMATICAL CONCEPTS
Capter 1 INTRODUCTION ND MTHEMTICL CONCEPTS PREVIEW Tis capter introduces you to te basic matematical tools for doing pysics. You will study units and converting between units, te trigonometric relationsips
More informationContinuity and Differentiability of the Trigonometric Functions
[Te basis for te following work will be te definition of te trigonometric functions as ratios of te sides of a triangle inscribed in a circle; in particular, te sine of an angle will be defined to be te
More informationThe derivative function
Roberto s Notes on Differential Calculus Capter : Definition of derivative Section Te derivative function Wat you need to know already: f is at a point on its grap and ow to compute it. Wat te derivative
More informationDifferentially uniform mappings for cryptography
Differentially uniform mappings for cryptography KAISA NYBERG* Institute of Computer Technology, Vienna Technical University Abstract. This work is motivated by the observation that in DES-like ciphexs
More informationEfficient algorithms for for clone items detection
Efficient algoritms for for clone items detection Raoul Medina, Caroline Noyer, and Olivier Raynaud Raoul Medina, Caroline Noyer and Olivier Raynaud LIMOS - Université Blaise Pascal, Campus universitaire
More informationDIGRAPHS FROM POWERS MODULO p
DIGRAPHS FROM POWERS MODULO p Caroline Luceta Box 111 GCC, 100 Campus Drive, Grove City PA 1617 USA Eli Miller PO Box 410, Sumneytown, PA 18084 USA Clifford Reiter Department of Matematics, Lafayette College,
More informationALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU. A. Fundamental identities Throughout this section, a and b denotes arbitrary real numbers.
ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU A. Fundamental identities Trougout tis section, a and b denotes arbitrary real numbers. i) Square of a sum: (a+b) =a +ab+b ii) Square of a difference: (a-b)
More informationBlanca Bujanda, Juan Carlos Jorge NEW EFFICIENT TIME INTEGRATORS FOR NON-LINEAR PARABOLIC PROBLEMS
Opuscula Matematica Vol. 26 No. 3 26 Blanca Bujanda, Juan Carlos Jorge NEW EFFICIENT TIME INTEGRATORS FOR NON-LINEAR PARABOLIC PROBLEMS Abstract. In tis work a new numerical metod is constructed for time-integrating
More informationFunction Composition and Chain Rules
Function Composition and s James K. Peterson Department of Biological Sciences and Department of Matematical Sciences Clemson University Marc 8, 2017 Outline 1 Function Composition and Continuity 2 Function
More informationHow to Find the Derivative of a Function: Calculus 1
Introduction How to Find te Derivative of a Function: Calculus 1 Calculus is not an easy matematics course Te fact tat you ave enrolled in suc a difficult subject indicates tat you are interested in te
More informationMath 312 Lecture Notes Modeling
Mat 3 Lecture Notes Modeling Warren Weckesser Department of Matematics Colgate University 5 7 January 006 Classifying Matematical Models An Example We consider te following scenario. During a storm, a
More informationf a h f a h h lim lim
Te Derivative Te derivative of a function f at a (denoted f a) is f a if tis it exists. An alternative way of defining f a is f a x a fa fa fx fa x a Note tat te tangent line to te grap of f at te point
More informationOn convexity of polynomial paths and generalized majorizations
On convexity of polynomial pats and generalized majorizations Marija Dodig Centro de Estruturas Lineares e Combinatórias, CELC, Universidade de Lisboa, Av. Prof. Gama Pinto 2, 1649-003 Lisboa, Portugal
More informationThe Derivative as a Function
Section 2.2 Te Derivative as a Function 200 Kiryl Tsiscanka Te Derivative as a Function DEFINITION: Te derivative of a function f at a number a, denoted by f (a), is if tis limit exists. f (a) f(a + )
More informationMAT 145. Type of Calculator Used TI-89 Titanium 100 points Score 100 possible points
MAT 15 Test #2 Name Solution Guide Type of Calculator Used TI-89 Titanium 100 points Score 100 possible points Use te grap of a function sown ere as you respond to questions 1 to 8. 1. lim f (x) 0 2. lim
More informationMATH 155A FALL 13 PRACTICE MIDTERM 1 SOLUTIONS. needs to be non-zero, thus x 1. Also 1 +
MATH 55A FALL 3 PRACTICE MIDTERM SOLUTIONS Question Find te domain of te following functions (a) f(x) = x3 5 x +x 6 (b) g(x) = x+ + x+ (c) f(x) = 5 x + x 0 (a) We need x + x 6 = (x + 3)(x ) 0 Hence Dom(f)
More informationPolynomial Functions. Linear Functions. Precalculus: Linear and Quadratic Functions
Concepts: definition of polynomial functions, linear functions tree representations), transformation of y = x to get y = mx + b, quadratic functions axis of symmetry, vertex, x-intercepts), transformations
More information7.1 Using Antiderivatives to find Area
7.1 Using Antiderivatives to find Area Introduction finding te area under te grap of a nonnegative, continuous function f In tis section a formula is obtained for finding te area of te region bounded between
More informationMore on generalized inverses of partitioned matrices with Banachiewicz-Schur forms
More on generalized inverses of partitioned matrices wit anaciewicz-scur forms Yongge Tian a,, Yosio Takane b a Cina Economics and Management cademy, Central University of Finance and Economics, eijing,
More informationSolving Generalized Small Inverse Problems
Solving Generalized Small Inverse Problems Noboru Kuniiro Te University of Tokyo, Japan kuniiro@k.u-tokyo.ac.jp Abstract. We introduce a generalized small inverse problem (GSIP) and present an algoritm
More information= 0 and states ''hence there is a stationary point'' All aspects of the proof dx must be correct (c)
Paper 1: Pure Matematics 1 Mark Sceme 1(a) (i) (ii) d d y 3 1x 4x x M1 A1 d y dx 1.1b 1.1b 36x 48x A1ft 1.1b Substitutes x = into teir dx (3) 3 1 4 Sows d y 0 and states ''ence tere is a stationary point''
More information1 (10) 2 (10) 3 (10) 4 (10) 5 (10) 6 (10) Total (60)
First Name: OSU Number: Last Name: Signature: OKLAHOMA STATE UNIVERSITY Department of Matematics MATH 2144 (Calculus I) Instructor: Dr. Matias Sculze MIDTERM 1 September 17, 2008 Duration: 50 minutes No
More information5.1 introduction problem : Given a function f(x), find a polynomial approximation p n (x).
capter 5 : polynomial approximation and interpolation 5 introduction problem : Given a function f(x), find a polynomial approximation p n (x) Z b Z application : f(x)dx b p n(x)dx, a a one solution : Te
More informationReflection Symmetries of q-bernoulli Polynomials
Journal of Nonlinear Matematical Pysics Volume 1, Supplement 1 005, 41 4 Birtday Issue Reflection Symmetries of q-bernoulli Polynomials Boris A KUPERSHMIDT Te University of Tennessee Space Institute Tullaoma,
More information1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x)
Calculus. Gradients and te Derivative Q f(x+) δy P T δx R f(x) 0 x x+ Let P (x, f(x)) and Q(x+, f(x+)) denote two points on te curve of te function y = f(x) and let R denote te point of intersection of
More informationDedicated to the 70th birthday of Professor Lin Qun
Journal of Computational Matematics, Vol.4, No.3, 6, 4 44. ACCELERATION METHODS OF NONLINEAR ITERATION FOR NONLINEAR PARABOLIC EQUATIONS Guang-wei Yuan Xu-deng Hang Laboratory of Computational Pysics,
More informationThe cluster problem in constrained global optimization
Te cluster problem in constrained global optimization Te MIT Faculty as made tis article openly available. Please sare ow tis access benefits you. Your story matters. Citation As Publised Publiser Kannan,
More informationCombining functions: algebraic methods
Combining functions: algebraic metods Functions can be added, subtracted, multiplied, divided, and raised to a power, just like numbers or algebra expressions. If f(x) = x 2 and g(x) = x + 2, clearly f(x)
More informationAffine equivalence in the AES round function
Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,
More informationQuaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016.
Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals Gary D. Simpson gsim1887@aol.com rev 1 Aug 8, 216 Summary Definitions are presented for "quaternion functions" of a quaternion. Polynomial
More informationTHE IMPLICIT FUNCTION THEOREM
THE IMPLICIT FUNCTION THEOREM ALEXANDRU ALEMAN 1. Motivation and statement We want to understand a general situation wic occurs in almost any area wic uses matematics. Suppose we are given number of equations
More informationA = h w (1) Error Analysis Physics 141
Introduction In all brances of pysical science and engineering one deals constantly wit numbers wic results more or less directly from experimental observations. Experimental observations always ave inaccuracies.
More informationTransform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and
Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565
More information