A Differential Fault Attack on Plantlet

Size: px
Start display at page:

Download "A Differential Fault Attack on Plantlet"

Transcription

1 1 A Dfferental Fault Attack on Plantlet Subhamoy Matra, Akhlesh Sddhant Abstract Lghtweght stream cphers have receved serous attenton n the last few years. The present desgn paradgm consders very small state (less than twce the key sze) and use of the secret key bts durng pseudo-random stream generaton. One such effort, Sprout, had been proposed two years back and t was broken almost mmedately. After carefully studyng these attacks, a modfed verson named Plantlet has been desgned very recently. Whle the desgners of Plantlet do not provde any analyss on fault attack, we note that Plantlet s even weaker than Sprout n terms of Dfferental Fault Attack (DFA). Our nvestgaton, followng the smlar deas as n the analyss aganst Sprout, shows that we requre only around 4 faults to break Plantlet by DFA n a few hours tme. Whle fault attack s ndeed dffcult to mplement and our result does not provde any weakness of the cpher n normal mode, we beleve that these ntal results wll be useful for further understandng of Plantlet. Index Terms Cryptanalyss, Fault Attack, Plantlet, Stream Cpher. I. INTRODUCTION A new lght-weght stream cpher has been ntroduced by Mkhalev, Armknecht and Müller [22], whch clams to be bult upon by takng care of varous cryptographc weaknesses of Sprout [4]. Called Plantlet, t nvolves the secret key bts both n key-schedulng phase and n the pseudo-random bt generaton phase. Ths unque feature has been carred over from Sprout, and sets t apart from most of the common stream cphers. The desgners of such proposals clam that ths feature allows lower state szes aganst Tme-Memory-Data Trade-Off (TMDTO) attack and hence saves resources. Sprout, the predecessor of Plantlet, was heavly attacked n many papers and serous concerns were voced regardng ts desgn. A key-recovery based on dvde-and-conquer technque [14] and a TMDTO attack [13] are two mportant cryptanalytc results on the cpher. Addtonally, one may refer to [15], [2], [8], [27] for further cryptanalytc results. Although Sprout was attacked mmedately, t was an ntal attempt n realzaton of lghtweght stream cphers wth the secret key stored n non-volatle memory. Plantlet uses an 80-bt key, a 90-bt ntalzaton vector, two shft regsters, namely LFSR and NFSR, a counter and a Boolean functon. Lke other stream cphers, Plantlet has an ntal Key Loadng Algorthm, followed by a Key Schedulng Algorthm (nvolvng the secret key bts) and then fnally the Pseudo-Random Generaton Algorthm (agan nvolvng secret key bts) for provdng the key stream. S. Matra s wth Indan Statstcal Insttute, 203 B T Road, Kolkata , Inda. E-mal: subho@scal.ac.n A. Sddhant s wth BITS Plan KK Brla Goa Campus, Zuarnagar , Goa, Inda. E-mal: akhleshsddhant@gmal.com The desgners of Sprout [4] clamed the securty of the cpher aganst fault attacks, though t was dsproved mmedately [2]. However, for Plantlet [22] no specfc comment has been made n terms of fault attack. In ths paper, we present a Dfferental Fault Attack (DFA) aganst Plantlet n the same lne as aganst Sprout n [2]. The attack succeeds wth only 4 random faults n contrast wth around 120 faults n random locatons (20 faults, f the locatons are known) for Sprout [2]. For Plantlet we frst obtan the fault locatons from respectve sgnatures. Then we explot the dfferental key streams usng a SAT solver to obtan the entre states of LFSR and NFSR. Then one can mmedately dscover the secret key. Before proceedng any further, let us descrbe Plantlet n detal. A. Descrpton of Plantlet Plantlet s an mprovsaton over Sprout, whch adapts from the Gran famly of stream cphers, more specfcally Gran128a [1]. Table 1 compares the varous stream cphers. Cpher Key sze IV sze State sze Intalzaton rounds Plantlet (61 LFSR + 40 NFSR) 320 Sprout (40 LFSR + 40 NFSR) 320 Gran 128a (128 LFSR NFSR) 256 Gran v (80 LFSR + 80 NFSR) 160 TABLE I COMPARISON OF PLANTLET WITH ITS PREDECESSORS IN TERMS OF LFSR AND NFSR SIZES. Lke the members of the Gran famly [1], [3], [16], [17] and Sprout [4], Plantlet has two regsters one LFSR and one NFSR, whch we denote by L t and N t respectvely (for some round t) wth LFSR beng 61 bts long and NFSR beng 40 bts n length. For a gven round t, we denote LFSR bts as l t, l t+1,..., l t+60 and NFSR bts as n t, n t+1,..., n t+39 respectvely. We also denote the secret key by k and ts correspondng bts by k 0, k 1,..., k 79. Plantlet ncorporates the secret key n the KSA and PRGA by XORng a specally selected key bt, k, wth the last bt of NFSR, n t+39. The selecton happens through a Round-Key functon, whch s cyclcally selected from the secret key: k = k (t mod 80) t 0 (1) Ths cpher uses a 9-bt counter dvded n two halves. The lower 7 bts are used for a modulo 80 counter, denoted by (c 6 t, c 5 t, c 4 t, c 3 t, c 2 t, c 1 t, c 0 t ) for a gven round t. The last two bts, namely c 7 t, c 8 t consttute a modulo 4 counter ncremented once after completon of one round of the modulo 80 counter. Ths s merely to keep track of the completon of 320 rounds of KSA, post whch the counter resets to zero. However, only the 5th LSB (c 4 t ) of ths counter s actually used n the evoluton of the states. Hence, t mght not be necessary to nclude the hgher counter bts n the mplementaton.

2 2 As dscussed before, the clockng of the cpher can be dvded nto three routnes: KLA (Key Loadng Algorthm), KSA (Key Schedulng Algorthm) and PRGA (Pseudo Random Generatng Algorthm). 1) The KLA Routne: The NFSR s ntalzed wth the frst 40 bts of IV. The rest 50 bts of the IV are used to ntalze the frst 50 bts of LFSR. The remanng 11 bts of LFSR are ntalzed wth a specfc paddng n the partcular sequence: (1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1) from l 50 to l 60. 2) The KSA Routne: The NFSR and LFSR regsters are clocked 320 tmes, wth one bt shfted n every clock pulse. The hghest bt of NFSR s updated as n t+39 = z t g(n t ) k t l t c 4 t, where g(n t ) s a polynomal n GF(2): g(n t ) = n t n t+13 n t+19 n t+35 n t+39 n t+2 n t+25 n t+3 n t+5 n t+7 n t+8 n t+14 n t+21 n t+16 n t+18 n t+22 n t+24 n t+26 n t+32 n t+33 n t+36 n t+37 n t+38 n t+10 n t+11 n t+12 n t+27 n t+30 n t+31 (2) and z t s the key stream bt computed as: z t = h(x) + l t+30 + j B n t+j. (3) Here h(x) s a non-lnear functon: h(x) = n t+4 l t+6 l t+8 l t+10 l t+17 l t+32 l t+19 l t+23 n t+4 l t+32 n t+38 (4) and B = {1, 6, 15, 17, 23, 28, 34}. We would also lke to present a clarfcaton regardng the feedback of output z to NFSR durng KSA. The specfcaton of Plantlet [22, Secton 4.3] mentons t whle the equatons do not agree wth the same. However, here we consder the more complex verson where the output s fed back to both LFSR and NFSR durng KSA. Note that faults are njected durng the rounds of PRGA only. Hence t makes no dfference n mplementaton of our fault attack. The hghest bt of LFSR, l t+60 s always ntalzed to 1 durng KSA. The second-hghest bt l t+59 s updated as: l t+59 = l t+54 l t+43 l t+34 l t+20 l t+14 l t z t (5) Note that n any clock cycle, the output s generated frst and only then the regsters are updated. It s XORed to l t+59 and n t+39 (used as feedback) nstead of producng any output durng KSA. 3) The PRGA Routne: The update functon for PRGA remans the same for NFSR except that the output s no longer XORed wth the key stream bt: n t+39 = g(n t ) k t l t 0 c 4 t. Further, the slghtly modfed update functon for LFSR durng PRGA phase s: l t+60 = l t+54 l t+43 l t+34 l t+20 l t+14 l t (6) The key stream bt z t s produced usng the output functon n (3). B. Descrpton of Dfferental Fault Attack Fault attacks were frst ntroduced n the works of [9], [11], and snce then such technques have ganed attenton n cryptanalytc lterature. In the doman of stream cphers, one of the frst fault attacks was ntroduced by Hoch and Shamr n [18]. Generally, faults are njected nto the state of a cpher to ntroduce a change n the key stream bts, whch can help deduce nformaton about the nternal state. The method of njectng faults can be laser shots, clock gltches, onzng radaton, unsupported voltage, etc. Faults can be both transent or permanent. Though the approach of the attack seems qute complcated to be mplemented n practcal scenaro, many mplementatons of well known cphers lke RSA, AES, DES etc. have been cryptanaylsed by ths technque. In fact, all the cphers n estream [12] hardware portfolo, namely Gran v1, Mckey 2.0 and Trvum, have been cryptanalyzed aganst DFA [5], [6], [7], [19], [20], [21], [23]. As mentoned before, even Sprout has been cryptanalyzed [2]. In all these cases, t was enough to recover the cpher state by DFA as the KSA and PRGA of such cphers are reversble, provdng the secret key once the state s known. The same s true for Plantlet. Let us now brefly explan the connecton between Dfferental Cryptanalyss and Dfferental Fault Attacks (DFA). In dfferental attack, we generally put a dfference n IV whle KLA. Thus, f one goes for a suffcent number of rounds durng KSA (namely 320 for Plantlet), the dfference mght not be exploted durng the PRGA. In DFA, the adversary s allowed to nject faults durng the rounds of PRGA as well. Here the dfference s reflected mmedately n the key stream and thus, the cpher becomes much weaker n ths model. Thus, here we show that Plantlet s even weaker than Sprout n ths very specfc lne of attack. One dfference between the cphers from the estream portfolo (Gran v1, Mckey 2.0 and Trvum) s that the secret key bts are not only nvolved n the KSA but also durng PRGA (smlar to Sprout). However, that does not resst DFA knd of cryptanalyss. We explot the probablty of matchng between each correspondng par of fault-free and faulty keystream bts to compute the sgnatures. Further we consder correlatons between the dfferental stream and the sgnatures to obtan the good matches and thereby dentfyng the fault locaton (Secton II). After fndng the locaton of the faults, we can use correspondng dfferental key streams to obtan a system of nonlnear equatons and those can be solved usng an effcent SAT Solver tool (Secton III). Once all the state varables are known for some round t, we can mmedately deduce the secret key. As wth every fault attack, we need to lay down the assumptons whle mountng the DFA. Naturally, ths s mportant as too many assumptons can make the attack mpractcal. Also, the number of faults njected should be low, as there s a chance of damagng the devce. We consder the followng assumptons whch are generally accepted throughout n cryptanalytc lterature on fault attacks. The adversary 1) can restart the cpher and re-key t wth the orgnal Key/IV multple tmes,

3 3 2) can nject the fault at the exact tmngs durng the executon, 3) has the equpment/requred technology for mplementng the fault, 4) does not need to know the exact locaton durng fault njecton. The paper s organzed as follows. In Secton II, we dscuss how to obtan the fault sgnatures. Then, n Secton III, we dscuss the recovery of the entre state of LFSR, NFSR and consequently the recovery of the secret key bts by solvng nonlnear equatons. Secton IV concludes the paper. II. FAULT SIGNATURES, AND HOW TO IDENTIFY THE FAULT LOCATIONS Suppose we ntroduce a change n the key stream bts by njectng a fault at some random locaton f. From now on, by njectng a fault at locaton f, we mean (for 0 f 60) njectng a fault at LFSR bt l f, and by njectng a fault at any locaton f, for (61 f 100) we mean njectng a fault n NFSR bt n (f 61). We obtan the respectve fault-free key stream z and faulty key stream z (f) for λ key stream bts. To form a unque pattern of the key stream sequence, we compute a sgnature vector Q (f) whch we defne as: where q (f) Q (f) = (q (f) 0, q(f) 1,..., q(f) λ 1 ) (7) = 1 2 P r(z z (f) ), [0, λ 1]. (8) We obtan ths probablty by suffcent number of experments beforehand. The sharpness of a sgnature s defned as follows: σ(q (f) ) = 1 λ λ 1 q (f). (9) =0 Fg. 1. Plot of Q (f) for all f n [0, 100] wth λ = 64. As we can see n Fgure 1, q f are close to zero for > 32, hence λ = 32 could have been suffcent. However, we choose λ = 64 nstead as evaluaton of correlatons and ranks (whch we wll dscuss soon) becomes more accurate wth hgher number of key stream bts. Now, we can use the sharpness of a locaton (we just defned) to compare the faults at dfferent locatons. For example, one may note the cases for f = 30 and f = 31 n Fgure 2. It s very clear that dentfyng the locaton f the fault s ndeed njected at 30 (blue) has much better chance than that of 31 (red). Wth λ = 64, we execute Fg. 2. Plot of Q (30) (blue) and Q (31) (red). Ths s a snapshot of Fgure 1 for f = 30, runs wth random key-iv pars to prepare the sgnatures Q (0), Q (1),..., Q (100). As mentoned earler, we pre-compute the sgnatures durng the offlne phase of the attack, and store t for comparsons wth dfferental key stream. Suppose we nject a fault n a random unknown locaton g (0 g 100) and obtan the fault-free and faulty key streams z and z (g) respectvely. Then we defne the followng: where η (g) ν (g) = 1 2 η(g) (10) = z z (g). Let us now contnue wth a few defntons and notatons. Defnton 1: The vector Γ (g) = (ν (g) 0, ν(g) 1,..., ν(g) λ 1 ) s called tral of the fault at the unknown locaton g. Note that there s no probablty term n ths scenaro, snce we are actually njectng a fault and checkng aganst our sgnatures. We compare Γ (g) for each of the Q (f) s, for f = 0,..., 100 to dentfy the exact fault locaton. Defnton 2: We call a relaton between the sgnature Q (f) = (q (f) 0, q(f) 1,..., q(f) λ 1 ) and a tral Γ(g) = (ν (g) 0, ν(g) 1,..., ν(g) λ 1, (0 λ 1) such that (q (f) (q (f) = 1 2, ν(g) ) a msmatch, f there exsts at least one = 1 2, ν(g) = 1 2 ) or = 1 2 ) hold true. However, t s qute natural that ths may not always happen, and thus we need to extend ths defnton. For ths purpose, we ncorporate the correlaton coeffcent between two sets of data. Defnton 3: We use correlaton coeffcent µ(q (f), Γ (g) ) between the sgnature Q (f) λ 1 ) and a tral Γ (g) = (ν (g) 0, ν(g) 1,..., ν(g) λ 1 ) for checkng a match. Naturally, 1 µ(q (f), Γ (g) ) 1. In case of a msmatch, (as per the Defnton 2), then µ(q (f), Γ (g) ) = 1. = (q (f) 0, q(f) 1,..., q(f) Then we experment how one can locate the faults. For each known fault g, we calculate the tral Γ (g) = (ν (g) 0, ν(g) 1,..., ν (g) λ 1 ). and hence the correspondng µ(q(f), Γ (g) ) for each of the faults f, (0 f < 100). We note: 1) max 100 f=0 µ(q(f), Γ (g) ), 2) µ(q (g), Γ (g) ), and

4 4 3) α(q (g) ) = n(µ(q (f), Γ (g) ) > µ(q (g), Γ (g) )). As we can see n Fgure 3, when µ(q (g), Γ (g) ) (drawn n blue) s close to max 100 f=0 µ(q(f), Γ (g) ) (drawn n red), α(q (g) ) s small, t s easer to locate these faults. However, f µ(q (g), Γ (g) ) s much smaller than max 100 f=0 µ(q(f), Γ (g) ) (red),.e., α(q (g) ) s large, that means t s harder to locate the fault. number of tmes we have to run the SAT solver. However, for Plantlet, we note that the sgnature of the faults are qute sharp and thus we need not try for specfc fault locatons durng the attack. Now let us consder the set W such that t contans the 4 faults wth maxmum possble α(q (g) ) values from the experments (average over 2 15 runs. Then we calculate that g W (1+α(Q(g) )) combnatons (for 4 faults). Ths s the worst case. That s, after njectng random faults, f these faults appear, then we may need to run the SAT solver these many tmes. However, the average case scenaro s much better than ths. For example, we may consder the set of four fault locatons S = {5, 26, 2, 12}. As we have mentoned earler, the values less than 61 belong to LFSR, and the other values belong to NFSR. The expected number of combnatons to check n ths case s g S (1 + α(q(g) )) Fg. 3. Plot of max 100 f=0 µ(q(f), Γ (g) ) (red) and µ(q (g), Γ (g) ) (blue). Gven α(q (g) ), for each g, we can estmate how many attempts we should requre to obtan the actual fault locaton. Our expermental results show that obtanng random fault locatons s easer n Plantlet as compared to Sprout. Further, the fault requrement s much lower here, makng a practcal fault attack sgnfcantly easer. As we wll descrbe n Secton III, obtanng the exact state s always possble (durng the experments) from the dfferental key stream correspondng to 4 correct fault locatons (detals are n Table II). Hence, we need to locate 4 correct fault locatons from a large number of random faults. In fact, we also provde examples for the complete attack wth only 4 faults. However, we sometmes fal to get LSB of NFSR n 0 n some cases durng the experments. The exact algorthm for mountng a fault s as follows. Consder that every fault s njected at the same round t of PRGA routne: Inject a fault at some random fault locaton. Obtan the dfferental tral (for some unknown g) Γ (g) = (ν (g) 0, ν(g) 1,..., ν(g) λ 1 ). For each f n [0, 100], calculate µ(q (f), Γ (g) ). For the fault, prepare a ranked table T g arrangng the possble fault locatons f wth more prorty accordng to µ(q (f), Γ (g) ). After creatng tables T g for the requred faults (say 4), compute usng SAT solvers as mentoned n Secton III for each of the combnatons. When the correct fault set wll be selected n the above algorthm, we wll be able to obtan the correct state, whch wll n turn provde the secret key bts. Then we can check and match wth the exstng fault free and faulty key streams at hand. To obtan the streams, we need to re-key the cpher a few tmes and nject those many faults (4 s enough as per our experments). Naturally, the DFA wll be more effcent when the faults are n the locatons where t s easer to dentfy them. That s a locaton g such that α(q (g) ) s small wll provde better result. To clarfy, lower the α(q (g) ), lesser s the number of possble combnatons of faults, and lesser the III. OBTAINING THE STATE FROM THE DIFFERENTIAL KEY-STREAMS Let us assume that a fault s njected n the LFSR locaton φ at PRGA round t. The same method wll work f the fault s njected n the NFSR. Snce we re-key the cpher wth the same (key, IV) par before njectng a fault, after fault njecton we get the state l t, l t+1,..., l t+φ 1, 1 l t+φ, l t+φ+1..., l t+60 and n t, n t+1,..., n t+39 at the t-th round of PRGA. Then correspondng to each faulty key-stream bt z φ t, we ntroduce two new varables L (φ) t, N (φ) t and obtan three more equatons (LFSR, NFSR and output functon). Thus we have addtonal 2l varables and 3l equatons for each faulty key-streams, when we nvolve l many bts of key stream. Here we have consdered l = 60 for solvng such equatons. Naturally, ths mples that we wll not nvolve all the secret key bts (as we need at least 80 key stream bts for nvolvement of each of the secret key bts). However, at ths stage we are not lookng for solvng the secret key bts. Instead we only try to obtan the LFSR and NFSR states. By tral and error we found l = 60 to be suffcent for that. Once we know the state (N t, L t ) for some round t, then we may use SAT solver to obtan the secret key bts as explaned n [22, Table 4]. In fact, knowledge of 95 (out of 101) state bts are enough to get the state bts very quckly. Expermental Results: We solve the equatons usng a SAT solver, Cryptomnsat-2.9.6, under SAGE 7.5.rc2 [26] on a laptop runnng wth Ubuntu The hardware confguraton s based on Intel(R) Core(TM) M 2.50GHz and 8 GB RAM. For each guessed set of faults, a system of equatons are formulated, and the equatons are then fed nto the SAT solver. These experments are made for 5 runs (for each row) consderng that the correct faults have been dentfed. Thus the tme gven n the table should be multpled by g S (1 + α(q (g) )) whle estmatng the effort for the complete fault attack. Note that we have expermented wth more number of faults too. The results show that havng more faults does not mean that the equatons can be solved n less tme. Ths s the reason, we get faster processng tme n case of 9 faults than 10 faults (see Table II). However, as we contnue towards

5 5 # Faults Soluton tme (seconds) Maxmum Mnmum Average TABLE II RESULTS OBSERVED WHILE OBTAINING STATE FROM FAULT ATTACK. very few faults (such as 4 to 6), the processng tme generally ncreases wth lesser number of faults. The followng are two examples wth 4 faults each. Example 1: Consder that we nject 4 faults at random and the the locatons turn out to be S = {17, 19, 60, 42}. In ths case, the expected number of combnatons so that we arrve at the rght set of fault locatons s We have to check for every such combnaton n SAT solver. For the correct fault locatons, the SAT solver takes seconds to compute the entre states of LFSR and NFSR. Example 2: Here s another example wth 4 random faults. Consder the set of locatons S = {13, 36, 28, 45}. Here, the expected number of possble combnatons to check for s Note that n ths case, the SAT solver s unable to compute the NFSR bt n 0. However, ths should not be a problem to solve the complete system and the key fnally. For the correct fault locatons, the SAT solver takes seconds to compute the states of LFSR and NFSR (wthout n 0 ). IV. CONCLUSION In ths paper, we have appled Dfferental Fault Attack (DFA) on Plantlet. Plantlet has evolved from Sprout after dscovery of many of ts cryptographc weaknesses. It s thus beleved that Plantlet wll be cryptographcally stronger than Sprout. However, we note that ths s not true n terms of DFA. By usng as lttle as 4 faults, we show that the LFSR and NFSR states can be obtaned n reasonable tme and ths n turn provdes the secret key mmedately. Our technque frst fnds the locatons of the random faults usng fault sgnatures and then t formulates equatons to be fed nto a SAT solver. Experments for the same have been performed on a software mplementaton of the cpher and the exact algorthm was descrbed. It mght happen that the larger state sze and smple nvolvement of the secret key bts durng the PRGA phase for Plantlet compared to Sprout make the DFA more effcent on Plantlet than ts prevous nstantaton. Ths ndeed requres further attenton. Whle fault attacks can be mplemented n very restrcted scenaros, we beleve our observatons can help n understandng Plantlet better. REFERENCES [1] M. Ågren, M. Hell, T. Johansson and W. Meer. A New Verson of Gran- 128 wth Authentcaton. Symmetrc Key Encrypton Workshop 2011, DTU, Denmark. [2] S. Matra and S. Sarkar and A. Baks and P. Dey. Key Recovery from State Informaton of Sprout: Applcaton to Cryptanalyss and Fault Attack. [3] M. Ågren, M. Hell, T. Johansson and W. Meer. Gran-128a: a new verson of Gran-128 wth optonal authentcaton. IJWMC, 5(1): 48 59, Ths s the journal verson of [1]. [4] F. Armknecht and V. Mkhalev. On Lghtweght Stream Cphers wth Shorter Internal States. FSE [5] S. Bank, S. Matra and S. Sarkar. A Dfferental Fault Attack on the Gran Famly of Stream Cphers. In CHES 2012, LNCS, Vol. 7428, pp [6] S. Bank and S. Matra. A Dfferental Fault Attack on MICKEY 2.0. CHES 2013, LNCS, Vol. 8086, pp , [7] S. Bank, S. Matra and S. Sarkar. Improved dfferental fault attack on MICKEY 2.0. Journal of Cryptographc Engneerng, 5(1):13 29, [8] S. Bank. Some results on Sprout. INDOCRYPT 2015, LNCS, Vol. 9462, pp , [9] E. Bham and A. Shamr. Dfferental Fault Analyss of Secret Key Cryptosystems. In CRYPTO 1997, LNCS, Vol. 1294, pp [10] E. Bham and O. Dunkelman. Dfferental Cryptanalyss n Stream Cphers. Cryptology eprnt Archve, Report 2007/218, org/2007/218 [11] D. Boneh, R. A. DeMllo and R. J. Lpton. On the Importance of Checkng Cryptographc Protocols for Faults. In EUROCRYPT 1997, LNCS, Vol. 1233, pp [12] The ECRYPT Stream Cpher Project. estream Portfolo of Stream Cphers. SAC 2015, Canada. [13] M. F. Esgn and O. Kara. Practcal Cryptanalyss of Full Sprout wth TMD Tradeoff Attacks. [14] V. Lallemand and M. Naya-Plasenca. Cryptanalyss of Full Sprout. In Crypto 2015, LNCS. In CRYPTO 2015, LNCS, Vol. 9215, pp [15] Y. Hao. A Related-Key Chosen-IV Dstngushng Attack on Full Sprout Stream Cpher. [16] M. Hell, T. Johansson and W. Meer. Gran - A Stream Cpher for Constraned Envronments. ECRYPT Stream Cpher Project Report 2005/001, Avalable at [17] M. Hell, T. Johansson, A.Maxmov and W. Meer. A Stream Cpher Proposal: Gran-128. In IEEE Internatonal Symposum on Informaton Theory (ISIT 2006). [18] J. J. Hoch and A. Shamr. Fault Analyss of Stream Cphers. In CHES 2004, LNCS, Vol. 3156, pp [19] M. Hojsík and B. Rudolf. Dfferental Fault Analyss of Trvum. In FSE 2008, LNCS, Vol. 5086, pp [20] M. Hojsík and B. Rudolf. Floatng Fault Analyss of Trvum. In INDOCRYPT 2008, LNCS, Vol. 5365, pp [21] Y. Hu, J. Gao, Q. Lu and Y. Zhang. Fault analyss of Trvum. Desgns, Codes and Cryptography, 62(3): , [22] V. Mkhalev, F. Armknecht and C. Müller. On cphers that contnuously access the non-volatle key. FSE TOSC, Volume 2016, Issue 2, pp , [23] S. Sarkar, S. Bank and S. Matra. Dfferental Fault Attack aganst Gran famly wth very few faults and mnmal assumptons. IEEE Transactons on Computers, 64(6): , [24] S. P. Skorobogatov and R. J. Anderson. Optcal Fault Inducton Attacks. In CHES 2002, LNCS, Vol. 2523, pp [25] S. P. Skorobogatov. Optcally Enhanced Poston-Locked Power Analyss. In CHES 2006, LNCS, Vol. 4249, pp [26] W. Sten. Sage Mathematcs Software. Free Software Foundaton, Inc., Avalable at (Open source project ntated by W. Sten and contrbuted by many). [27] B. Zhang and X. Gong. Another Tradeoff Attack on Sprout-Lke Stream Cphers. In Asacrypt 2015, LNCS, Vol. 9453, pp Acknowledgments: The authors lke to thank Dr. Santanu Sarkar of IIT Madras for detaled techncal dscusson and mplementaton ssues n SAGE.

The stream cipher MICKEY

The stream cipher MICKEY The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We

More information

Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions

Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Mult-Bt Dfferental Fault Analyss of Gran-128 wth Very Weak Assumptons Prakash Dey 1, Abhshek Chakraborty 2, Avshek Adhkar 1 and Debdeep Mukhopadhyay 2 1 Department of Pure Mathematcs Unversty of Calcutta,

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

A TMDTO Attack Against Lizard

A TMDTO Attack Against Lizard A TMDTO Attack Against Lizard Subhamoy Maitra 1, Nishant Sinha 2, Akhilesh Siddhanti 3, Ravi Anand 4, Sugata Gangopadhyay 2 1 Indian Statistical Institute, Kolkata, subho@isical.ac.in 2 Indian Institute

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

The stream cipher MICKEY 2.0

The stream cipher MICKEY 2.0 The stream cpher MICKEY 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We present

More information

1 GSW Iterative Techniques for y = Ax

1 GSW Iterative Techniques for y = Ax 1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Polynomial Regression Models

Polynomial Regression Models LINEAR REGRESSION ANALYSIS MODULE XII Lecture - 6 Polynomal Regresson Models Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Test of sgnfcance To test the sgnfcance

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Lecture 3 Stat102, Spring 2007

Lecture 3 Stat102, Spring 2007 Lecture 3 Stat0, Sprng 007 Chapter 3. 3.: Introducton to regresson analyss Lnear regresson as a descrptve technque The least-squares equatons Chapter 3.3 Samplng dstrbuton of b 0, b. Contnued n net lecture

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Fundamental loop-current method using virtual voltage sources technique for special cases

Fundamental loop-current method using virtual voltage sources technique for special cases Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Linear Feature Engineering 11

Linear Feature Engineering 11 Lnear Feature Engneerng 11 2 Least-Squares 2.1 Smple least-squares Consder the followng dataset. We have a bunch of nputs x and correspondng outputs y. The partcular values n ths dataset are x y 0.23 0.19

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Cube Attack on Reduced-Round Quavium

Cube Attack on Reduced-Round Quavium 3rd Internatonal onference on Mechatroncs and Industral Informatcs (IMII 05 ube Attac on Reduced-Round Quavum Shyong Zhang, a *, Gonglang hen,b and Janhua L,c School of Informaton Securty Engneerng, Shangha

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes

More information

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient 58:080 Expermental Engneerng 1 OBJECTIVE Lab 2e Thermal System Response and Effectve Heat Transfer Coeffcent Warnng: though the experment has educatonal objectves (to learn about bolng heat transfer, etc.),

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013 COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.

More information

Solving Nonlinear Differential Equations by a Neural Network Method

Solving Nonlinear Differential Equations by a Neural Network Method Solvng Nonlnear Dfferental Equatons by a Neural Network Method Luce P. Aarts and Peter Van der Veer Delft Unversty of Technology, Faculty of Cvlengneerng and Geoscences, Secton of Cvlengneerng Informatcs,

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

Towards Security Limits in Side-Channel Attacks

Towards Security Limits in Side-Channel Attacks Towards Securty Lmts n Sde-Channel Attacks (Wth an Applcaton to Block Cphers) F.-X. Standaert, E. Peeters, C. Archambeau, and J.-J. Qusquater UCL Crypto Group, Place du Levant 3, B-348 Louvan-la-Neuve,

More information

χ x B E (c) Figure 2.1.1: (a) a material particle in a body, (b) a place in space, (c) a configuration of the body

χ x B E (c) Figure 2.1.1: (a) a material particle in a body, (b) a place in space, (c) a configuration of the body Secton.. Moton.. The Materal Body and Moton hyscal materals n the real world are modeled usng an abstract mathematcal entty called a body. Ths body conssts of an nfnte number of materal partcles. Shown

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Note on EM-training of IBM-model 1

Note on EM-training of IBM-model 1 Note on EM-tranng of IBM-model INF58 Language Technologcal Applcatons, Fall The sldes on ths subject (nf58 6.pdf) ncludng the example seem nsuffcent to gve a good grasp of what s gong on. Hence here are

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Improved Integral Cryptanalysis of FOX Block Cipher 1

Improved Integral Cryptanalysis of FOX Block Cipher 1 Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,

More information

Online Appendix to: Axiomatization and measurement of Quasi-hyperbolic Discounting

Online Appendix to: Axiomatization and measurement of Quasi-hyperbolic Discounting Onlne Appendx to: Axomatzaton and measurement of Quas-hyperbolc Dscountng José Lus Montel Olea Tomasz Strzaleck 1 Sample Selecton As dscussed before our ntal sample conssts of two groups of subjects. Group

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Chapter 6. Supplemental Text Material

Chapter 6. Supplemental Text Material Chapter 6. Supplemental Text Materal S6-. actor Effect Estmates are Least Squares Estmates We have gven heurstc or ntutve explanatons of how the estmates of the factor effects are obtaned n the textboo.

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

ONE DIMENSIONAL TRIANGULAR FIN EXPERIMENT. Technical Advisor: Dr. D.C. Look, Jr. Version: 11/03/00

ONE DIMENSIONAL TRIANGULAR FIN EXPERIMENT. Technical Advisor: Dr. D.C. Look, Jr. Version: 11/03/00 ONE IMENSIONAL TRIANGULAR FIN EXPERIMENT Techncal Advsor: r..c. Look, Jr. Verson: /3/ 7. GENERAL OJECTIVES a) To understand a one-dmensonal epermental appromaton. b) To understand the art of epermental

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2 Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to

More information

An Algebraic Fault Attack on the LED Block Cipher

An Algebraic Fault Attack on the LED Block Cipher An Algebrac Fault Attack on the LED Block Cpher P. Jovanovc, M. Kreuzer and I. Polan Fakultät für Informatk und Mathematk Unverstät Passau D-94030 Passau, Germany Abstract. In ths paper we propose an attack

More information

PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM

PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM Alexandros Papankolaou and Song Y. Yan Department of Computer Scence, Aston Unversty, Brmngham B4 7ET, UK 24 October 2000, Receved 26 June 2001 Abstract

More information

Analytical Chemistry Calibration Curve Handout

Analytical Chemistry Calibration Curve Handout I. Quck-and Drty Excel Tutoral Analytcal Chemstry Calbraton Curve Handout For those of you wth lttle experence wth Excel, I ve provded some key technques that should help you use the program both for problem

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Second Order Analysis

Second Order Analysis Second Order Analyss In the prevous classes we looked at a method that determnes the load correspondng to a state of bfurcaton equlbrum of a perfect frame by egenvalye analyss The system was assumed to

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Supplementary Notes for Chapter 9 Mixture Thermodynamics

Supplementary Notes for Chapter 9 Mixture Thermodynamics Supplementary Notes for Chapter 9 Mxture Thermodynamcs Key ponts Nne major topcs of Chapter 9 are revewed below: 1. Notaton and operatonal equatons for mxtures 2. PVTN EOSs for mxtures 3. General effects

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Curve Fitting with the Least Square Method

Curve Fitting with the Least Square Method WIKI Document Number 5 Interpolaton wth Least Squares Curve Fttng wth the Least Square Method Mattheu Bultelle Department of Bo-Engneerng Imperal College, London Context We wsh to model the postve feedback

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Basically, if you have a dummy dependent variable you will be estimating a probability.

Basically, if you have a dummy dependent variable you will be estimating a probability. ECON 497: Lecture Notes 13 Page 1 of 1 Metropoltan State Unversty ECON 497: Research and Forecastng Lecture Notes 13 Dummy Dependent Varable Technques Studenmund Chapter 13 Bascally, f you have a dummy

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram Adabatc Sorpton of Ammona-Water System and Depctng n p-t-x Dagram J. POSPISIL, Z. SKALA Faculty of Mechancal Engneerng Brno Unversty of Technology Techncka 2, Brno 61669 CZECH REPUBLIC Abstract: - Absorpton

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Research on State Collisions of Authenticated Cipher ACORN

Research on State Collisions of Authenticated Cipher ACORN 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Research on State Collsons of Authentcated Cpher ACORN Pe Zhanga*, Je Guanb, Junzh Lc and Tarong Shd Informaton

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

NEW CONSTRUCTIONS IN LINEAR CRYPTANALYSIS OF BLOCK CIPHERS

NEW CONSTRUCTIONS IN LINEAR CRYPTANALYSIS OF BLOCK CIPHERS Proceedngs of ACS 000, Szczecn, pp.53-530 NEW CONSTRUCTIONS IN LINEAR CRYPTANALYSIS OF BLOCK CIPHERS ANNA ZUGAJ, KAROL GÓRSKI, ZBIGNIEW KOTULSKI, ANDRZEJ PASZKIEWICZ 3, JANUSZ SZCZEPAŃSKI ENIGMA Informaton

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information