Math-Net.Ru All Russian mathematical portal
|
|
- Brandon Nelson
- 5 years ago
- Views:
Transcription
1 Math-Net.Ru A Russian mathematica porta G. P. Agibaov, Substitution bock ciphers with functiona keys, Prik. Diskr. Mat., 2017, Number 38, DOI: Use of the a-russian mathematica porta Math-Net.Ru impies that you have read and agreed to these terms of use Downoad detais: IP: September 2, 2018, 02:14:03
2 ПРИКЛАДНАЯ ДИСКРЕТНАЯ МАТЕМАТИКА 2017 Математические методы криптографии 38 МАТЕМАТИЧЕСКИЕ МЕТОДЫ КРИПТОГРАФИИ UDC DOI / /38/4 SUBSTITUTION BLOCK CIPHERS WITH FUNCTIONAL KEYS 1 G. P. Agibaov Nationa Research Tomsk State University, Tomsk, Russia We define a substitution bock cipher C with the paintext and ciphertext bocks in F n 2 and with the keyspace K s 0,n(g) that is the set {f(x) : f(x) = π 2 (g σ 2 ))); σ 1, σ 2 F n 2 ; π 1, π 2 S n }, where s 0 is an integer, 1 s 0 n; g : F n 2 Fn 2 is a bijective vector function g(x) = g 1 (x)g 2 (x)... g n (x) such that every its coordinate function g i (x) essentiay depends on some s i s 0 variabes in the string x = x 1 x 2... x n ; S n is the set of a permutations of the row ( n); π i and σ i are the permutation and negation operations, that is, (π = (i 1 i 2... i n )) (π(a 1 a 2... a n ) = a i1 a i2... a in ), (σ = b 1 b 2... b n ) ((a 1 a 2... a n ) σ = a b 1 1 a b a bn n ) and, for a and b in F 2, a b = a if b = 1 and a b = a if b = 0. Like g, any key f in K s0,n(g) is a bijection on F n 2, f(x) = f 1 (x)f 2 (x)... f n (x), and every its coordinate function f i (x) essentiay depends on not more than s 0 variabes in x. The encryption of a paintext bock x and the decryption of a ciphertext bock y on the key f are defined in C as foows: y = f(x) and x = f 1 (y). Here, we suggest a known paintext attack on C with the threat of discovering the key f that was used. Let P 1, P 2,..., P m be some bocks of a paintext, C 1, C 2,..., C m be the corresponding bocks of a ciphertext, i.e., C = f(p ) for = 1, 2,..., m, and P = P 1 P 2... P n, C = C 1 C 2... C n. The object is to determine the coordinate function f i (x) of f for each i {1, 2,..., n}. The suggested attack consists of two steps, namey we first determine the essentia variabes x i1,..., x is of f i (x) and then compute a Booean function h(x i1,..., x is ) such that h(a i1,..., a is ) = f i (a 1,..., a n ) for a n-tupes (a 1 a 2... a n ) F n 2. For determining the essentia variabes of f i, we construct a Booean matrix inf D(f i ) with the set of rows inf D(f i ), where D(f i ) = {P P j : C i C ji ;, j = 1, 2,..., m}, C i = f i (P ), = 1,..., m, i = 1,..., n, and inf D(f i ) is the subset of a the minima vectors in D(f i ). Then the numbers of essentia variabes for f i are the numbers of coumns in the intersection of a covers of inf D(f i ) with the cardinaities not more than s 0, where a cover of a Booean matrix M is defined as a subset C of its coumns such that each row in M has 1 in a coumn in C. For computing h(x i1,..., x is ), we first set h(p i1,..., P is ) = C i for = 1,..., m and then, if h i is not yet competey determined on F s 2, we increase the number m of known bocks (P i, C i ) of pain- and ciphertexts or extend h i on F s 2 in such a way that the vector function h = h 1h 2... h n with the competey defined coordinate functions is a bijection on F n 2. We aso describe some specia known paintext attacks on substitution bock ciphers with keyspaces being subsets of K s0,n(g). Keywords: substitution ciphers, bock ciphers, functiona keys, cryptanaysis, known paintext attack, Booean functions, essentia variabes, bijective functions. 1 The author was supported by the RFBR-grant no
3 58 G. P. Agibaov 1. Introduction In cryptography, the cryptosystems with the functiona keys are widey used as cryptographic primitives incuding key-stream generators, s-boxes, cryptofiters, cryptocombiners, key hash functions as we as the symmetric and pubic-key ciphers, digita signature schemes. For the author, the research, incuding the definition, characterisation and cryptanaysis of such cryptosystems had beginnings at the 1960-th years. First object of this research was the key-stream generator based on a finite autonomous automaton (state machine) with the output function depending on a bounded number of coordinates of the automaton state and being the key of the generator and of the corresponding stream cipher [1, 2]. Later, two sets of symmetric iterative bock ciphers with the functiona keys were proposed [3]. They were constructed according to the known cryptographic schemes originay suggested by H. Feiste and impemented in the ciphers LUCIFER and DES and, therefore, were named after Lucifer and Feiste respectivey. At the ast years, our research in this area was reated to definitions and cryptanaysis and synthesis methods for some other kinds of cryptagorithms with functiona keys incuding watermarking ciphers [4], finite automata cryptographic generators with two-vaued controed steps [5], and cryptautomata [6] where a cryptautomaton is described by a set C of automata networks and a set K of keys such that the choosing a key in K determines a network in C as a specific cryptographic agorithm. In the case, when the key contains transition and (or) output functions of some components in networks in C, we have a cryptosystem with the functiona keys. In this paper, we describe another cass of cryptosystems with functiona keys, namey that named in the tite. 2. Definition Here is a genera forma mathematica definition of the ciphers under consideration. Let C be a symmetric cipher and C = (X, Y, K, E, D), where X, Y, and K are the sets of paintexts, ciphertexts and keys respectivey and E and D are, respectivey, the encryption and decryption agorithms, E : X K Y, D : Y K X and E(x, k) = y D(y, k) = x for any x X, y Y, and k K. Suppose X = Y = F n 2, K B n, B is a cass of Booean functions having some bounded both computationa and capacity compexities and depending on not more than n variabes such that the mapping f : F n 2 F n 2, defined for x X and f 1 f 2... f n K as f(x) = f 1 (x)f 2 (x)... f n (x), is a bijection. In this case, the cipher C is said to be a substitution bock cipher with functiona keys, or, shorty, a funkeysubcipher. For each bock x = x 1 x 2... x n X, for each key k = f 1 f 2... f n K, and for each ciphertext y Y in it, we have E(x, k) = f(x) and D(y, k) = f 1 (y). Further, these equaities are caed the invertibiity condition of C. Note that in this definition, the bounded compexity of a function means the existence of its practica specification and computation. As usuay, there are two genera probems in the funkeysubcipher theory synthesis and anaysis. The second probem is very typica of bock ciphers and its soving ways significanty depend on the way the first probem is soved. According to the definition above, the first probem consists in generating a proper key space K, namey which is over a set B of Booean functions of a bounded compexity, satisfies the invertibiity conditions, and is great enough to withstand exhaustive search attacks. A method for soving this probem is described in the foowing section.
4 Substitution bock ciphers with functiona keys Synthesis method Let IS n denote the set of a invertibe systems each consisting of n functions in B. Further, we aso consider the systems in IS n as Booean bijective vector functions, that is, as substitutions on F n 2. To synthesize a funkeysubcipher C = (F n 2, K, F n 2, E, D), where K IS n, we need generating the vector functions in IS n as keys in K. Without knowing how to generate a of them, we propose here to generate keys in K as some members of IS n which can be obtained by inverse and permutation operations over bits on inputs and outputs of a chosen or given function in IS n. For this purpose, we, first, introduce some auxiiary notations reated to the permutation and inverse operations and, then, define some subsets of functions in B n. Let S n be the set of a the permutations of numbers 1, 2,..., n, namey S n = = {i 1 i 2... i n : i j {1, 2,..., n}; j k i j i k ; j, k {1, 2,..., n}}. For any permutation π = i 1 i 2... i n S n and any vector v = v 1 v 2... v n, et π(v j ) = v ij, j = 1, 2,..., n, and π(v) = π(v 1 )π(v 2 )... π(v n ) = v i1 v i2... v in. Aso, if v 1, v 2,..., v n are Booean vaues (variabes or constants) and σ = b 1 b 2... b n F n 2, then et v σ = v b 1 1 v b vn bn, where, for any Booean vaues a and b, a b = a if b = 0 and a b = a if b = 1. We say that π(v) and v σ are obtained by, respectivey, permutation and inverse operations π and σ over v. In cases when π = n or σ = , that is, the operations π or σ are identity ones, we write π = 1 or σ = 1 respectivey. Taking any g(x 1, x 2,..., x n ) in IS n, σ 1, σ 2 in F n 2, and π 1, π 2 in S n, we then can define a vector function f : F n 2 F n 2 as f(x) = π 2 (g σ 2 ))), x = x 1 x 2... x n. Particuary, g(x) can be the identica function, that is, for each i in {1, 2,..., n} its coordinate function g i (x) can be equa to x i. In any case, the tabe of the function f(x) is obtained from the tabe of the function g(x) by substituting coumns corresponding to some variabes for inverses (in σ 1 ), transposing (according to π 1 ) coumns corresponding to some variabes, substituting coumns corresponding to some coordinate functions of g(x) for inverses (in σ 2 ), and transposing (according to π 2 ) coumns corresponding to some coordinate functions of the function g(x). In other words, f(x) is computed from the function g(x) by the inversion and transposition of some its inputs and outputs and, ike g, is of a bounded compexity and satisfies the invertibiity condition. Therefore, f(x) IS n. Define K n (g) = {π 2 (g σ 2 ))) : σ 1, σ 2 F n 2, π 1, π 2 S n }. Thus, we get that K n (g) IS n and K n (g) (2 n n!) 2. Any subset K K n (g) of an exponentia cardinaity can be taken as a synthesis resut the key space of a funkeysubcipher C. The foowing subsets of K n (g) are possibe candidates for paying this roe: K n (g, 1) = {g(x σ 1 ) : σ 1 F n 2}, K n (g, 1) 2 n ; K n (g, 2) = {g(π 1 (x)) : π 1 S n }, K n (g, 2) n!; K n (g, 3) = {g )) : σ 1 F n 2, π 1 S n }, K n (g, 3) 2 n n!; K n (g, 4) = {g σ 2 (x) : σ 2 F n 2}, K n (g, 4) 2 n ; K n (g, 5) = {g σ 2 (x σ 1 ) : σ 1, σ 2 F n 2}, K n (g, 5) 2 2n ; K n (g, 6) = {g σ 2 (π 1 (x)) : σ 2 F n 2, π 1 S n }, K n (g, 6) 2 n n!; K n (g, 7) = {g σ 2 )) : σ 1, σ 2 F n 2, π 1 S n }, K n (g, 7) 2 2n n!; K n (g, 8) = {π 2 (g(x)) : π 2 S n }, K n (g, 8) n!; K n (g, 9) = {π 2 (g(x σ 1 )) : σ 1 F n 2, π 2 S n }, K n (g, 9) 2 n n!; K n (g, 10) = {π 2 (g(π 1 (x))) : π 2, π 1 S n }, K n (g, 10) (n!) 2 ;
5 60 G. P. Agibaov K n (g, 11) = {π 2 (g ))) : σ 1 F n 2, π 1, π 2 S n }, K n (g, 11) 2 n (n!) 2 ; K n (g, 12) = {π 2 (g σ 2 (x)) : σ 2 F n 2, π 2 S n }, K n (g, 12) 2 n n!; K n (g, 13) = {π 2 (g σ 2 (x σ 1 )) : σ 1, σ 2 F n 2, π 2 S n }, K n (g, 13) 2 2n n!; K n (g, 14) = {π 2 (g σ 2 (π 1 (x))) : σ 2 F n 2, π 1, π 2 S n }, K n (g, 14) 2 n (n!) 2 ; K n (g, 15) = K n (g). 4. Funkeysubciphers with key functions in a bounded number of essentia variabes Let s 0 and n be some integers, 1 s 0 n, and B s0,n be the set of a Booean functions f(x 1,..., x n ) essentiay depending on not more than s 0 variabes x 1,..., x n, that is, for any f : F n 2 F 2, f(x 1,..., x n ) B s0,n s s 0 i 1,..., i s {1,..., n} g : F s 2 F 2 (f(x 1,..., x n ) = g(x i1,..., x is )). The set of variabes x i1,..., x is satisfying this equation is said to be a sufficient subset of arguments for the function f. If U is a sufficient subset for f and, for any V U, V isn t a sufficient for f, then the variabes in U are said to be essentia arguments for f. For natura s s 0, et Bs,n be the set of a functions in B s0,n essentiay depending on exacty s variabes. It is cear that B s0,n = s 0 Bs,n. We suppose that the number s 0 is sma s=1 s 0 2 s 0 1 enough for accepting functions in B s0,n to be of a bounded compexity. Let IS s0,n denote the set of a bijective Booean vector functions each consisting of n coordinate functions in B s0,n. Baancedness of each coordinate function of a Booean vector function f is the necessary condition (( )( for bijectivity of f. So the cardinaity of IS s0,n n 2 s 0 )) n doesn t exceed the number N s0,n =, that is the number of a n-dimensiona vectors with coordinates being baanced Booean functions in s 0 variabes taken in a possibe ways from the set {x 1,..., x n }. A funkeysubcipher with key functions in a bounded number of essentia variabes is a funkeysubcipher C = (F n 2, K, F n 2, E, D), where K IS s0,n. To synthesize these ciphers, we need generating the key spaces K for them from vector functions in IS s0,n. Here, we propose to do this just in the same way as we have done above in the set IS n using the inverse and permutation operations. Namey, take a vector function g(x 1, x 2,..., x n ) in IS s0,n. Let g = (g 1,..., g n ). By the definition of IS s0,n, for every i {1,..., n}, there exists a natura s i s 0 such that g i Bs i,n, that is, g i essentiay depends on s i variabes. Define K s0,n(g) = {π 2 (g σ 2 ))) : σ 1, σ 2 F n 2, π 1, π 2 S n }, where x = x 1 x 2... x n. Thus, we get that K s0,n(g) IS s0,n and K s0,n(g) (2 n n!) 2. Moreover, for any function f = (f 1,..., f n ) K s0,n(g) and any i {1,..., n}, the number of essentia variabes of f i equas s j, the number of essentia variabes of g j where j = π2 1 (i). Any subset K K s0,n(g) of an exponentia cardinaity can be taken as the key space of the funkeysubcipher C with key functions in a bounded number of essentia variabes. In particuar, this roe can be successfuy payed by the subsets K s0,n(g, j) that are formay defined, just as K n (g, j), j = 1, 2,..., 15, have been done. For exampe, K s0,n(g, 7) = = {g σ 2 )) : σ 1, σ 2 F n 2, π 1 S n }, K s0,n(g, 7) 2 2n n!, and K s0,n(g, 15) = K s0,n(g). The ony difference is in the cass of the function g that, for K n (g, j), beongs to IS n and, for K s0,n(g, j), beongs to IS s0,n.
6 Substitution bock ciphers with functiona keys 61 To produce subsets K K s0,n(g) as key spaces for funkeysubciphers with key functions in a bounded number of essentia variabes, we need to have a capabiity to generate vector Booean functions g = (g 1... g n ) in I s0,n with various vaues of their parameters n, s 0, s 1,..., s n. Unfortunatey, we have no any exhaustive soution of this probem and can ony present now a pair of some restricted reevant methods. Let IS s,n denote the set of a bijective Booean vector functions each consisting of n coordinate functions in B s,n. The methods just mentioned construct functions from IS s,n. The first method is used in the case when s 3 and s n, i.e. n = st for some t N. It is proved in [7] that ISs,s for a s 3. So, we can construct t functions g (i) = g (i) 1... g s (i) ISs,s, i = 1,..., t. Then the function g(x 1,..., x n ) = = g (1) 1 (x 1,..., x s )... g s (1) (x 1,..., x s )g (2) 1 (x s+1,..., x 2s )... g s (2) (x s+1,..., x 2s )... g (t) 1 (x (t 1)s+1,..., x n )... g s (t) (x (t 1)s+1,..., x n ) beongs to ISs,n. The second method starts from g (1) (x 1,..., x s ) = g 1... g s ISs,s too. Then we construct the function g (2) (x 1,..., x s, x s+1 ) = g 1... g s h where h = x s+1 q(x 1,..., x s ) and q Bs 1,s. It is proved in [8] that g (2) ISs,s+1. Repeating this step, we successivey obtain the functions g (3) ISs,s+2 (using the functions h = x s+2 q(x 1,..., x s, x s+1 ) and q Bs 1,s+1),..., g (n+s 1) ISs,n. 5. Cryptanaysis 5.1. C r y p t a n a y s i s p r o b e m In this section, we consider the cryptanaysis probem for funkeysubciphers giving our attention to ciphers with key functions in bounded numbers of essentia variabes. Moreover, we confine the consideration to ciphers with key spaces K = K s0,n(g, j), where g is an arbitrary function in (B s0,n) n and j can be assigned any vaue from {1,..., 15}. However, for some parameter j vaues, the cryptanaysis methods proposed here actuay hod for ciphers with the wider key spaces, particuary with K = K n (g, j). We assume that the cryptanayst expoits a known paintext attack with the threat of tota break (secret key recovery). This means that he possesses some bocks P 1,..., P m of a paintext and corresponding bocks C 1,..., C m of a ciphertext and tries to determine the key that was used, that is, a function f(x) K = K s0,n(g, j) such that C = f(p ) for a {1,..., m}. According to Kerckhoff s principe, it is supposed that the cryptanayst knows the cipher C = (F n 2, K, F n 2, E, D) being used. Particuary, he knows the key space K = K s0,n(g, j) and its parameters g (B s0,n) n, n N, s 0 n, and j {1,..., 15}. The knowedge of the function g(x 1,..., x n ) yieds the knowedge of its inverse g 1, coordinate functions g 1,..., g n in B s0,n and the sets X 1,..., X n of their essentia variabes respectivey, X i X = {x 1,..., x n }, i = 1,..., n. On the base of this information, the cryptanayst has to determine the coordinate functions f 1,..., f n of a key function f(x 1,..., x n ) in K s0,n(g, j) which satisfies the equaities f(p ) = C for a {1,..., m}. Here, for each i {1,..., n}, the function f i beongs to B s0,n, its essentia variabes form a subset U i X, and U i = X i = s i if the permutation π 2 in the expression for K s0,n(g, j) is the identity one. For the cryptanayst, to determine the function f i means to determine the set U i of its essentia variabes and the vaue of f i for each combination of vaues of variabes in U i. Beow we first give a genera soution of the probem comprising the a fifteen partia cases of it and then present specific soutions for some of these cases.
7 62 G. P. Agibaov 5.2. G e n e r a c r y p t a n a y s i s m e t h o d The method concerns the funkeysubcipher C with the genera key space K = K s0,n(g) = = {π 2 (g σ 2 ))) : σ 1, σ 2 F n 2, π 1, π 2 S n } which incudes the partia key spaces K s0,n(g, j) for a j {1,..., 15}. Reca that we have a string of Booean variabes x = x 1 x 2... x n, a vector Booean function g(x) = g 1 (x)g 2 (x)... g n (x) with coordinate functions g 1,..., g n, where g i B s i,n for 1 s i s 0 and i = 1,..., n, the bocks of a pain text P 1,..., P m and the corresponding bocks of a ciphertext C 1,..., C m. Let k K and C = C 1 C 2... C n, = 1,..., m. Denote f(x) = f 1 (x)f 2 (x)... f n (x) = = π 2 (g σ 2 ))). Then f i B s0,n, k = f(x), C = f(p ), and C i = f i (P ), = 1,..., m and i = 1,..., n. Thus, the cryptanaysis probem is as foows: for every i {1,..., n} and given equaities C i = f i (P ), = 1,..., m, determine the function f i (x). The probem is divided into two subprobems: find out essentia variabes of the function f i and compute its vaues for a possibe vaues of these variabes. In connection with the first subprobem, we need to note that the number of essentia variabes of f i depends on whether the permutation π 2 in f(x) = π 2 (g σ 2 ))) is the identity one or not. If the answer is yes, then f i has the same number s i of essentia variabes as g i. Otherwise we can ony say that this number is ess or equa to max{s 1,..., s n } and doesn t exceed s 0. To sove the first subprobem, we now present some auxiiary resuts. Let f (x 1,..., x n ) be a, possiby, partia Booean function given by two subsets M 0 f Fn 2 and M 1 f Fn 2 so that α M b f f (α) = b, b F 2. We first define the foowing sets: D(f ) = {α β : α M 0 f, β M 1 f }, inf D(f ) = {δ : δ D(f ), δ D(f )(δ < δ)}, where for δ = d 1... d n and δ = d 1... d n in F n 2, δ < δ δ δ & t {1,..., n} (d t d t ). Particuary, in our case, D(f i ) = {P P j : C i C ji,, j = 1, 2,..., m}. We next construct the Booean matrix M = inf D(f ) with the set of rows that is equa to inf D(f ). The coumns in M with the numbers 1, 2,..., n are assigned to variabes x 1, x 2,..., x n respectivey. A subset J of them is said to be a cover of M if for each row in M, there is a coumn in J with the vaue 1 in this row. The cover J is minima if it doesn t contain as a subset another cover of M. At ast, we note that in [9] we have proved that a subset of variabes U = {x j1,..., x js } is sufficient for f iff the subset J of coumns in M with the numbers j 1,..., j s is a cover of M, and U is essentia for f iff J is a minima cover of M. Moreover, U is a unique subset of essentia variabes for f iff J is a unique cover of M ; in this case, each row in M is a unit vector e j (with a 1 in the j-th coordinate and 0 s esewhere) and U = {x j1,..., x js } if a the rows in M are e j1,..., e js. Aso, in [10], we have proved that a subset of variabes {x j1,..., x js } is a unique subset of essentia variabes for a function f in B s0,n iff a the covers of the matrix inf D(f ), the cardinaities of which don t exceed s 0, have a non-empty intersection consisting of coumns with the numbers j 1,..., j s. So, finding a unique subset of essentia variabes (if it exists) for the function f i in B s0,n and thus soving the first cryptanaysis subprobem is reduced to computing, for the
8 Substitution bock ciphers with functiona keys 63 matrix inf D(f i ), the intersection of a covers whose cardinaities are not more than s 0. The computationa compexity of this work is O(2 s 0 ). Under the known essentia variabes x i1,..., x isi of f i, any soution of the second cryptanaysis subprobem for i {1,..., n} can be obtained as f i (x) = h i (x i1,..., x isi ), where h i : F s i 2 F 2, the vector function h 1 (x 11,..., x 1s1 )h 2 (x 21,..., x 2s2 )... h n (x n1,..., x nsn ) is a bijection on F n 2, and, for a α = a 1 a 2... a n F n 2, if α = P and {1,..., m}, then h i (a i1,..., a isi ) = C i. In particuar, if for each i {1,..., n}, the set {x i1,..., x isi } is a unique subset of essentia variabes for f i and P = {P i1 P i2... P isi : = 1,..., m} = F s i 2, then the soution f(x) of the cryptanaysis probem for the cipher C is unique and, for i {1,..., n}, it has f i (x) = h i (x i1,..., x isi ), where h i (P i1 P i2... P isi ) = C i, {1,..., m}. In the case of P F s i 2, the foowing probem arises: given a partiay defined Booean function f (x 1,..., x n ) and a subset {i 1,..., i s } {1,..., n}, find (if exists) a competey defined Booean function h(x i1,..., x is ) such that h(a i1 a i2... a is ) = f (a 1 a 2... a n ) for each n-tupe (a 1 a 2... a n ) from the domain of f. This probem is a specia case of the known probem of competing a partia function in a functiona cass and isn t a subject of this research. For making references to the genera cryptanaysis method described here, we name it GCM. The core of GCM is the agorithm for finding, for a given partiay defined Booean function f (x 1,..., x n ) from B s0,n, such a function h(x i1,..., x is ) Bs,n that h(x i1,..., x is ) = f (x 1,..., x n ) on the domain of f. We denote this agorithm by B. As for the parameters of the cryptanaysis probem, namey g, σ 1, σ 2, π 1, π 2, GCM doesn t depend directy on them both in the contents and in a resut. This is not an accidenta fact, but it is because these parameters are not reay the key k of the cipher C, they ony form the expression π 2 (g σ 2 ))) to specify a bijective function f : F n F n which is in fact the key k of C and the resut of GCM execution over the given pairs (P i, C i ), i = 1,..., n S o m e p a r t i c u a r c r y p t a n a y s i s m e t h o d s Some particuar cryptanaysis methods for a cipher C under consideration can be obtained by appying GCM to ciphers C j with key spaces K s0,n(g, j) for j {1,..., 14}. We think of these methods as key space imitations of the genera method and denote by GCM j. For exampe, GCM 9 and GCM 14 are GCM for ciphers with key spaces K = K s0,n(g, 9) = {π 2 (g(x σ 1 )) : σ 1 F n 2, π 2 S n } and K = K s0,n(g, 14) = {π 2 (g σ 2 (π 1 (x))) : σ 2 F n 2, π 1, π 2 S n } respectivey. Now, we consider some other particuar cryptanaysis methods that are not exacty key space imitations of GCM, but give specia soutions to some ciphers C j with imited key spaces. Cases j = 1, 4, 5 Describing cryptanaysis methods in these cases, we imit our exposition to determination of the inverse operations for obtaining f from g. Let g 1 = (g1, g2,..., gn ), f 1 = (f1, f2,..., fn ), σ 1 = σ 11 σ σ 1n, σ 2 = = σ 21 σ σ 2n, P = P 1 P 2... P n, and C = C 1 C 2... C n, = 1, 2,..., m. In the case j = 1, where K = K s0,n(g, 1) = {g(x σ 1 ) : σ 1 F n 2}, the cryptanaysis probem is trivia because, for every {1,..., m}, C = g(p σ 1 ), P σ 1 = g 1 (C ), P σ 1i i = g i (C ), i {1,..., n}, and σ 1i is computed by using the Booean impication (a b = c) (b = 1 c = a),
9 64 G. P. Agibaov namey σ 1i = 1 g i (C ) = P i for a i {1, 2,..., n} and some (any) {1,..., m}, particuary for = 1. By the same reason, the probem is trivia in the case j = 4, where K = K s0,n(g, 4) = = {g σ 2 (x) : σ 2 F n 2}, because C = g σ 2 (P ), C σ 2 = g(p ) and σ 2 is computed by using the same impication: σ 2i = 1 g i (P ) = C i, i = 1, 2,..., n. In the case j = 5, where K = K s0,n(g, 5) = {g σ 2 (x σ 1 ) : σ 1, σ 2 F n 2}, we have C = = g σ 2 (P σ 1 ), C σ 2 = g(p σ 1 ), and P σ 1 = g 1 (C σ 2 ). For every pair (σ 2, ), where σ 2 F n 2 and = 1, 2,..., m, compute the vaue σ (σ 2,) 1 = σ (σ 2,) 11 σ (σ 2,) σ (σ 2,) 1n of the vector σ 1 in F 2 n by using the agorithm of the case j = 1, namey σ (σ 2,) 1i = 1 g i (C σ 2 ) = P i, i = 1,..., m. The resut of the cryptanaysis is a pair (σ 1, σ 2 ) satisfying the equaity σ 1 = σ (σ 2,) 1 for a {1,..., m}. Note that this answer is not sure to be unique. The computationa compexity of the agorithm is O(2 n ). Note that the attacks described in these cases successfuy work on ciphers with K = = K n (g, j) for j = 1, 4, 5 respectivey and g IS n. Case j = 7 In this case, K = K s0,n(g, 7) = {g σ 2 )) : σ 1, σ 2 F n 2, π 1 S n } and the cipher under consideration is C 7 that is the partia case of C, where π 2 = 1. Besides, the ciphers C j for a j {1,..., 6} are partia cases of C 7, and the cryptanaysis probem for them can be soved by any method soving this probem for C 7. The method presented here is an ampification of GCM, namey, instead of method B, a method A is used, which takes into attention the condition π 2 = 1, yieding the fact that a function f i (x) to be found has the same number s i of essentia variabes as the known function g i. So, finding essentia variabes for f i is reduced in A to finding, for the matrix inf D(f i ), a minima cover of the( given ) n cardinaity s i. The computationa compexity of the ast probem doesn t exceed. In other detais, the cryptanaysis method for C 7 coincides with GCM. Some program impementations of agorithms A and B and the resuts of their thorough testing on computers have been presented in [2]. REFERENCES 1. Agibaov G. P. and Levashnikov A. A. Statisticheskoe issedovanie zadachi opoznaniya buevykh funktsiy odnogo kassa [Statistica study of the identifying probem for a cass of Booean functions]. Proc. ASDA Conf., Novosibirsk, 1966, pp (in Russian) 2. Agibaov G. P. and Sungurova O. G. Kriptoanaiz konechno-avtomatnogo generatora kyuchevogo potoka s funktsiey vykhodov v kachestve kyucha [Cryptanaysis of a finite-state keystream generator with an output function as a key]. Vestnik TSU. Priozhenie, 2006, no. 17, pp (in Russian) 3. Agibaov G. P. SIBCiphers simmetrichnye iterativnye bochnye shifry iz buevykh funktsiy s kyuchevymi argumentami [SIBCiphers symmetric iterative bock ciphers composed of Booean functions depending on sma number of variabes]. Prikadnaya Diskretnaya Matematika. Priozhenie, 2014, no. 7, pp (in Russian) 4. Agibaov G. P. Watermarking ciphers. Prikadnaya Diskretnaya Matematika, 2016, no. 1(31), pp Agibaov G. P. and Pankratova I. A. O dvukhkaskadnykh konechno-avtomatnykh kriptograficheskikh generatorakh i metodakh ikh kriptoanaiza [About 2-cascade finite s i
10 Substitution bock ciphers with functiona keys 65 automata cryptographic generators and their cryptanaysis]. Prikadnaya Diskretnaya Matematika, 2017, no. 35, pp (in Russian) 6. Agibaov G. P. Kriptoavtomaty s funktsiona nymi kyuchami [Cryptautomata with functiona keys]. Prikadnaya Diskretnaya Matematika, 2017, no. 36, pp (in Russian) 7. Pankratova I. A. Construction of invertibe vectoria Booean functions with coordinates depending on given number of variabes. Proc. CSIST 2016, Minsk, BSU Pub., 2016, pp Pankratova I. A. Ob obratimosti vektornykh buevykh funktsiy [On the invertibiity of vector Booean functions]. Prikadnaya Diskretnaya Matematika. Priozhenie, 2015, no. 8, pp (in Russian) 9. Agibaov G. P. Minimizatsiya chisa argumentov buevykh funktsiy [Number minimization for variabes a partia Booean function depends on]. Probemy Sinteza Tsifrovykh Avtomatov, Moscow, Nauka Pub., 1967, pp (in Russian) 10. Agibaov G. P. O nekotorykh doopredeeniyakh chastichnoy buevoy funktsii [Some competions of partia Booean function]. Trudy SPhTI, 1970, iss. 49, pp (in Russian)
Math-Net.Ru All Russian mathematical portal
Math-Net.Ru All Russian mathematical portal G. P. Agibalov, I. A. Pankratova, Asymmetric cryptosystems on Boolean functions, Prikl. Diskr. Mat., 2018, Number 40, 23 33 DOI: https://doi.org/10.17223/20710410/40/3
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationMath-Net.Ru All Russian mathematical portal
Math-Net.Ru All Russian mathematical portal G. P. Agibalov, Cryptautomata: definition, cryptanalysis, example, Prikl. Diskr. Mat. Suppl., 2017, Issue 10, 106 110 DOI: http://dx.doi.org/10.17223/2226308x/10/43
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More informationSeparation of Variables and a Spherical Shell with Surface Charge
Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationBALANCING REGULAR MATRIX PENCILS
BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationCryptanalysis of multi-hfe
Cryptanaysis of muti-hfe Yasufumi Hashimoto Abstract Muti-HFE Chen et a, 2009 is one of cryptosystems whose pubic key is a set of mutivariate quadratic forms over a finite fied Its quadratic forms are
More informationBASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set
BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More information4 Separation of Variables
4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationCONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION
CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION SAHAR KARIMI AND STEPHEN VAVASIS Abstract. In this paper we present a variant of the conjugate gradient (CG) agorithm in which we invoke a subspace minimization
More informationC. Fourier Sine Series Overview
12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationComponentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems
Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationCS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time
CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference
More informationWeek 6 Lectures, Math 6451, Tanveer
Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationare left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1
Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.
More informationHonors Thesis Bounded Query Functions With Limited Output Bits II
Honors Thesis Bounded Query Functions With Limited Output Bits II Daibor Zeený University of Maryand, Batimore County May 29, 2007 Abstract We sove some open questions in the area of bounded query function
More informationORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION
J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,
More information#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG
#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan
More informationApproximation and Fast Calculation of Non-local Boundary Conditions for the Time-dependent Schrödinger Equation
Approximation and Fast Cacuation of Non-oca Boundary Conditions for the Time-dependent Schrödinger Equation Anton Arnod, Matthias Ehrhardt 2, and Ivan Sofronov 3 Universität Münster, Institut für Numerische
More informationMat 1501 lecture notes, penultimate installment
Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the
More informationA Graphical Approach for Solving Single Machine Scheduling Problems Approximately
A Graphica Approach for Soving Singe Machine Scheduing Probems Approximatey Evgeny R Gafarov Aexandre Dogui Aexander A Lazarev Frank Werner Institute of Contro Sciences of the Russian Academy of Sciences,
More informationOn generalized quantum Turing machine and its language classes
Proceedings of the 11th WSEAS Internationa onference on APPLIED MATHEMATIS, Daas, Texas, USA, March -4, 007 51 On generaized quantum Turing machine and its anguage casses SATOSHI IRIYAMA Toyo University
More information2M2. Fourier Series Prof Bill Lionheart
M. Fourier Series Prof Bi Lionheart 1. The Fourier series of the periodic function f(x) with period has the form f(x) = a 0 + ( a n cos πnx + b n sin πnx ). Here the rea numbers a n, b n are caed the Fourier
More informationSymbolic models for nonlinear control systems using approximate bisimulation
Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica
More informationPairwise RNA Edit Distance
Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))...
More informationLecture Notes for Math 251: ODE and PDE. Lecture 34: 10.7 Wave Equation and Vibrations of an Elastic String
ecture Notes for Math 251: ODE and PDE. ecture 3: 1.7 Wave Equation and Vibrations of an Eastic String Shawn D. Ryan Spring 212 ast Time: We studied other Heat Equation probems with various other boundary
More informationAppendix of the Paper The Role of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Model
Appendix of the Paper The Roe of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Mode Caio Ameida cameida@fgv.br José Vicente jose.vaentim@bcb.gov.br June 008 1 Introduction In this
More informationFitting affine and orthogonal transformations between two sets of points
Mathematica Communications 9(2004), 27-34 27 Fitting affine and orthogona transformations between two sets of points Hemuth Späth Abstract. Let two point sets P and Q be given in R n. We determine a transation
More information6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7
6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the
More informationIntegrating Factor Methods as Exponential Integrators
Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been
More informationReichenbachian Common Cause Systems
Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationPartial permutation decoding for MacDonald codes
Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics
More informationThe EM Algorithm applied to determining new limit points of Mahler measures
Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,
More informationData Mining Technology for Failure Prognostic of Avionics
IEEE Transactions on Aerospace and Eectronic Systems. Voume 38, #, pp.388-403, 00. Data Mining Technoogy for Faiure Prognostic of Avionics V.A. Skormin, Binghamton University, Binghamton, NY, 1390, USA
More informationStochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997
Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques
More informationOn colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018
On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,
More informationTitleCryptanalysis of the Quaternion Rai. IEICE Transactions on Fundamentals.
TiteCryptanaysis of the Quaternion Rai Author(s Hashimoto, Yasufumi Citation IEICE Transactions on Fundamentas Communications and Computer Science Issue Date 205-0-0 URL http://hd.hande.net/20.500.2000/
More informationare left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1
Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.
More informationarxiv: v1 [math.fa] 23 Aug 2018
An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract
More informationPrimal and dual active-set methods for convex quadratic programming
Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:
More informationMath 124B January 17, 2012
Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia
More informationAsymptotic Properties of a Generalized Cross Entropy Optimization Algorithm
1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete
More informationThe Symmetric and Antipersymmetric Solutions of the Matrix Equation A 1 X 1 B 1 + A 2 X 2 B A l X l B l = C and Its Optimal Approximation
The Symmetric Antipersymmetric Soutions of the Matrix Equation A 1 X 1 B 1 + A 2 X 2 B 2 + + A X B C Its Optima Approximation Ying Zhang Member IAENG Abstract A matrix A (a ij) R n n is said to be symmetric
More informationHigher dimensional PDEs and multidimensional eigenvalue problems
Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u
More informationMA 201: Partial Differential Equations Lecture - 10
MA 201: Partia Differentia Equations Lecture - 10 Separation of Variabes, One dimensiona Wave Equation Initia Boundary Vaue Probem (IBVP) Reca: A physica probem governed by a PDE may contain both boundary
More informationSupplementary Appendix (not for publication) for: The Value of Network Information
Suppementary Appendix not for pubication for: The Vaue of Network Information Itay P. Fainmesser and Andrea Gaeotti September 6, 03 This appendix incudes the proof of Proposition from the paper "The Vaue
More informationOn the Goal Value of a Boolean Function
On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor
More informationAnalysis of the problem of intervention control in the economy on the basis of solving the problem of tuning
Anaysis of the probem of intervention contro in the economy on the basis of soving the probem of tuning arxiv:1811.10993v1 q-fin.gn] 9 Nov 2018 1 st eter Shnurov Nationa Research University Higher Schoo
More informationAn explicit Jordan Decomposition of Companion matrices
An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationStochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract
Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More informationUNIFORM CONVERGENCE OF MULTIPLIER CONVERGENT SERIES
royecciones Vo. 26, N o 1, pp. 27-35, May 2007. Universidad Catóica de Norte Antofagasta - Chie UNIFORM CONVERGENCE OF MULTILIER CONVERGENT SERIES CHARLES SWARTZ NEW MEXICO STATE UNIVERSITY Received :
More informationJENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF SEVERAL VARIABLES
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Voume 128, Number 7, Pages 2075 2084 S 0002-99390005371-5 Artice eectronicay pubished on February 16, 2000 JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF
More informationVolume 13, MAIN ARTICLES
Voume 13, 2009 1 MAIN ARTICLES THE BASIC BVPs OF THE THEORY OF ELASTIC BINARY MIXTURES FOR A HALF-PLANE WITH CURVILINEAR CUTS Bitsadze L. I. Vekua Institute of Appied Mathematics of Iv. Javakhishvii Tbiisi
More informationMinimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch
The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence
More informationCoupling of LWR and phase transition models at boundary
Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of
More informationStatistical Learning Theory: A Primer
Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO
More information14 Separation of Variables Method
14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt
More informationBiometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe
NONISCMORPHIC CCMPLETE SETS OF ORTHOGONAL F-SQ.UARES, HADAMARD MATRICES, AND DECCMPOSITIONS OF A 2 4 DESIGN S. J. Schwager and w. T. Federer Biometrics Unit, 337 Warren Ha Corne University, Ithaca, NY
More informationMore Scattering: the Partial Wave Expansion
More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationStat 155 Game theory, Yuval Peres Fall Lectures 4,5,6
Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria
More informationA Comparison Study of the Test for Right Censored and Grouped Data
Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the
More informationA Novel Learning Method for Elman Neural Network Using Local Search
Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationBayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?
Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine
More informationTwo-sample inference for normal mean vectors based on monotone missing data
Journa of Mutivariate Anaysis 97 (006 6 76 wwweseviercom/ocate/jmva Two-sampe inference for norma mean vectors based on monotone missing data Jianqi Yu a, K Krishnamoorthy a,, Maruthy K Pannaa b a Department
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationAn approximate method for solving the inverse scattering problem with fixed-energy data
J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999
More informationFrom Margins to Probabilities in Multiclass Learning Problems
From Margins to Probabiities in Muticass Learning Probems Andrea Passerini and Massimiiano Ponti 2 and Paoo Frasconi 3 Abstract. We study the probem of muticass cassification within the framework of error
More informationPhysics 235 Chapter 8. Chapter 8 Central-Force Motion
Physics 35 Chapter 8 Chapter 8 Centra-Force Motion In this Chapter we wi use the theory we have discussed in Chapter 6 and 7 and appy it to very important probems in physics, in which we study the motion
More informationLecture Notes 4: Fourier Series and PDE s
Lecture Notes 4: Fourier Series and PDE s 1. Periodic Functions A function fx defined on R is caed a periodic function if there exists a number T > such that fx + T = fx, x R. 1.1 The smaest number T for
More informationThe Construction of a Pfaff System with Arbitrary Piecewise Continuous Characteristic Power-Law Functions
Differentia Equations, Vo. 41, No. 2, 2005, pp. 184 194. Transated from Differentsia nye Uravneniya, Vo. 41, No. 2, 2005, pp. 177 185. Origina Russian Text Copyright c 2005 by Izobov, Krupchik. ORDINARY
More informationMinalpher v1. Designers Yu Sasaki, Yosuke Todo, Kazumaro Aoki, Yusuke Naito, Takeshi Sugawara, Yumiko Murakami, Mitsuru Matsui, Shoichi Hirose
Minapher v1 Designers Yu Sasaki, Yosuke Todo, Kazumaro Aoki, Yusuke Naito, Takeshi Sugawara, Yumiko Murakami, Mitsuru Matsui, Shoichi Hirose Submitters NTT Secure Patform Laboratories, Mitsubishi Eectric
More informationTwo view learning: SVM-2K, Theory and Practice
Two view earning: SVM-2K, Theory and Practice Jason D.R. Farquhar jdrf99r@ecs.soton.ac.uk Hongying Meng hongying@cs.york.ac.uk David R. Hardoon drh@ecs.soton.ac.uk John Shawe-Tayor jst@ecs.soton.ac.uk
More informationGeneralized Bell polynomials and the combinatorics of Poisson central moments
Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,
More informationA proposed nonparametric mixture density estimation using B-spline functions
A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),
More informationMultilayer Kerceptron
Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,
More informationSolution of Wave Equation by the Method of Separation of Variables Using the Foss Tools Maxima
Internationa Journa of Pure and Appied Mathematics Voume 117 No. 14 2017, 167-174 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-ine version) ur: http://www.ijpam.eu Specia Issue ijpam.eu Soution
More informationIdentification of macro and micro parameters in solidification model
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vo. 55, No. 1, 27 Identification of macro and micro parameters in soidification mode B. MOCHNACKI 1 and E. MAJCHRZAK 2,1 1 Czestochowa University
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More informationSummation of p-adic Functional Series in Integer Points
Fiomat 31:5 (2017), 1339 1347 DOI 10.2298/FIL1705339D Pubished by Facuty of Sciences and Mathematics, University of Niš, Serbia Avaiabe at: http://www.pmf.ni.ac.rs/fiomat Summation of p-adic Functiona
More information