Results 1  10
of
17
Unbalanced Feistel Networks and BlockCipher Design
 Fast Software Encryption, 3rd International Workshop Proceedings
, 1996
"... We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of eq ..."
Abstract

Cited by 50 (5 self)
 Add to MetaCart
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks has interesting implications for designing ciphers secure against linear and differential attacks. We describe UFNs and a terminology for discussing their properties, present and analyze some UFN constructions, and make some initial observations about their security. It is notable that almost all the proposed ciphers that are based on Feistel networks follow the same design construction: half the bits operate on the other half. There is no inherent reason that this should be so; as we will demonstrate, it is possible to design Feistel networks across a much wider, richer design space. In this paper, we examine the nature of the...
On the CharneyDavis and NeggersStanley Conjectures
"... For a graded naturally labelled poset P, it is shown that the PEulerian polynomial ... counting linear extensions of P by their number of descents has symmetric and unimodal coefficient sequence, verifying the motivating consequence of the NeggersStanley conjecture on real zeroes for W (P, t) in t ..."
Abstract

Cited by 29 (3 self)
 Add to MetaCart
For a graded naturally labelled poset P, it is shown that the PEulerian polynomial ... counting linear extensions of P by their number of descents has symmetric and unimodal coefficient sequence, verifying the motivating consequence of the NeggersStanley conjecture on real zeroes for W (P, t) in these cases. The result is deduced from McMullen's gTheorem, by exhibiting a simplicial polytopal sphere whose hpolynomial is W (P, t). Whenever this...
Cryptographic primitives enforcing communication and storage complexity
 In Financial Cryptography (FC 2002
, 2003
"... Abstract. We introduce a new type of cryptographic primitives which enforce high communication or storage complexity. Intuitively, to evaluate these primitives on a random input one has to engage in a protocol of high communication complexity, or one has to use a lot of storage. Therefore, the abili ..."
Abstract

Cited by 22 (0 self)
 Add to MetaCart
Abstract. We introduce a new type of cryptographic primitives which enforce high communication or storage complexity. Intuitively, to evaluate these primitives on a random input one has to engage in a protocol of high communication complexity, or one has to use a lot of storage. Therefore, the ability to compute these primitives constitutes certain “proof of work, ” because the computing party is forced to contribute a lot of its communication or storage resources to this task. Such primitives can be used in applications which deal with nonmalicious but selfishly resourcemaximizing parties. For example, they can be useful in constructing peertopeer systems which are robust against so called “free riders. ” In this paper we define two such primitives, a communicationenforcing signature and a storageenforcing commitment scheme, and we give constructions for both.
Strengthening Passwords
 SRC Technical Note
, 1997
"... Despite their notorious vulnerability, traditional passwords remain important for security. In this paper we describe a method for strengthening passwords. Our method does not require users to memorize or to write down long passwords, and does not rely on smartcards or other auxiliary hardware. The ..."
Abstract

Cited by 17 (1 self)
 Add to MetaCart
Despite their notorious vulnerability, traditional passwords remain important for security. In this paper we describe a method for strengthening passwords. Our method does not require users to memorize or to write down long passwords, and does not rely on smartcards or other auxiliary hardware. The main cost of our method is that it lengthens the process of checking a password.
The Propagation Characteristics of the Plate Modes of Acoustic Emission Waves in Thin Aluminum Plates and Thin Graphite/Epoxy Composite Plates and Tubes
 in Thin Aluminum Plates and Thin Graphite/Epoxy Composite Plates and Tubes," NASA Technical Memorandum 104187
, 1991
"... Acoustic emission was interpreted as modes of vibration in finite aluminum and graphite/epoxy plates. The `thin plate' case of classical plate theory was used to predict dispersion curves for the two fundamental modes described by the theory and to calculate the shapes of flexural waveforms produced ..."
Abstract

Cited by 14 (12 self)
 Add to MetaCart
Acoustic emission was interpreted as modes of vibration in finite aluminum and graphite/epoxy plates. The `thin plate' case of classical plate theory was used to predict dispersion curves for the two fundamental modes described by the theory and to calculate the shapes of flexural waveforms produced by a vertical step function loading. There was good agreement between the theoretical and experimental results for the aluminum. Composite materials required the use of a higher order plate theory (ReissnerMindlin) combined with lamination theory in order to get good agreement with the measured velocities. Plate modes were shown to be useful for determining the direction of motion of a source. Thus, with a knowledge of the material, it may be possible to ascertain the type of the source. For example, particle impact on a plate could be distinguished from a crack growing in the plate. A high fidelity transducer was needed to distinguish the plate modes. After evaluating several types of tra...
HIGGS BOSON PRODUCTION AT THE LHC
, 1995
"... Gluon fusion is the main production mechanism for Higgs particles at the LHC. We present the QCD corrections to the fusion cross sections for the Higgs boson in the Standard Model, and for the neutral Higgs bosons in the minimal supersymmetric extension of the Standard Model. The QCD corrections are ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Gluon fusion is the main production mechanism for Higgs particles at the LHC. We present the QCD corrections to the fusion cross sections for the Higgs boson in the Standard Model, and for the neutral Higgs bosons in the minimal supersymmetric extension of the Standard Model. The QCD corrections are in general large and they increase the cross sections significantly. In two steps preceding the calculation of the production processes, we determine the QCD The Higgs mechanism is a cornerstone in the electroweak sector of the Standard Model [SM]. The fundamental particles, leptons, quarks and gauge particles, acquire the masses through the interaction with a scalar field [1]. To accomodate the well–established electromagnetic and weak phenomena, this mechanism requires the existence of at least one
Lucre: Anonymous Electronic Tokens v1.8
"... This is a revised version of the theory of blinded coins that may not violate Chaum’s patent 1, based on the original work by David Wagner, and conversations with Ian Goldberg, David Molnar, Paul Barreto and various Anonymouses. Note that this now includes variants that probably do violate the paten ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
This is a revised version of the theory of blinded coins that may not violate Chaum’s patent 1, based on the original work by David Wagner, and conversations with Ian Goldberg, David Molnar, Paul Barreto and various Anonymouses. Note that this now includes variants that probably do violate the patent, but
Abstract
"... Stock market trading rule discovery using technical charting heuristics ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Stock market trading rule discovery using technical charting heuristics
5. EXPERIMENTS AND MODEL VALIDATION
"... In order to apply the models presented in the previous chapter, effort has to be put on the validation of the developed numerical tools. The final objective for all tools developed in this context is to estimate the danger potential that can arise after a hypothetical release of hydrogen into the co ..."
Abstract
 Add to MetaCart
In order to apply the models presented in the previous chapter, effort has to be put on the validation of the developed numerical tools. The final objective for all tools developed in this context is to estimate the danger potential that can arise after a hypothetical release of hydrogen into the containment atmosphere of a NPP. Therefore, the results of numerical simulations need to be comapared with basic experiments.
Baryogenesis – 40 Years Later 1
, 710
"... Abstract. The classical picture of GUT baryogenesis has been strongly modified by theoretical progress concerning two nonperturbative features of the standard model: the phase diagram of the electroweak theory, and baryon and lepton number changing sphaleron processes in the hightemperature symmetri ..."
Abstract
 Add to MetaCart
Abstract. The classical picture of GUT baryogenesis has been strongly modified by theoretical progress concerning two nonperturbative features of the standard model: the phase diagram of the electroweak theory, and baryon and lepton number changing sphaleron processes in the hightemperature symmetric phase of the standard model. We briefly review three viable models, electroweak baryogenesis, the AffleckDine mechanism and leptogenesis and discuss the prospects to falsify them. All models are closely tied to the nature of dark matter, especially in supersymmetric theories. In the near future results from LHC and gammaray astronomy will shed new light on the origin of the matterantimatter asymmetry of the universe.