共查询到20条相似文献,搜索用时 15 毫秒
1.
The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 261 related-key chosen ciphertexts and 2120.59 full-round SCO-1 decryptions. For the attack on SCO-2, we require 259 related-key chosen plaintexts and 2118.42 full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 258 related-key chosen plaintexts and 2117.54 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. 相似文献
2.
3.
Gul Agha Jos Meseguer Koushik Sen 《Electronic Notes in Theoretical Computer Science》2006,153(2):213-239
We introduce a rewrite-based specification language for modelling probabilistic concurrent and distributed systems. The language, based on PMaude, has both a rigorous formal basis and the characteristics of a high-level rule-based programming language. Furthermore, we provide tool support for performing discrete-event simulations of models written in PMaude, and for statistically analyzing various quantitative aspects of such models based on the samples that are generated through discrete-event simulation. Because distributed and concurrent communication protocols can be modelled using actors (concurrent objects with asynchronous message passing), we provide an actor PMaude module. The module aids writing specifications in a probabilistic actor formalism. This allows us to easily write specifications that are purely probabilistic – and not just non-deterministic. The absence of such (un-quantified) non-determinism in a probabilistic system is necessary for a form of statistical analysis that we also discuss. Specifically, we introduce a query language called Quantitative Temporal Expressions (or QuaTEx in short), to query various quantitative aspects of a probabilistic model. We also describe a statistical technique to evaluate QuaTEx expressions for a probabilistic model. 相似文献
4.
Pedro Baltazar Paulo Mateus Rajagopal Nagarajan Nikolaos Papanikolaou 《Electronic Notes in Theoretical Computer Science》2007,190(3):95
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evolution is modelled by probabilistic Kripke structures that capture both stochastic and non–deterministic transitions. The proposed logic is a temporal enrichment of Exogenous Probabilistic Propositional Logic (EPPL). The model-checking problem for EpCTL is analysed and the logic is compared with PCTL; the semantics of the former is defined in terms of probability distributions over sets of propositional symbols, whereas the latter is designed for reasoning about distributions over paths of possible behaviour. The intended application of the logic is as a specification formalism for properties of communication protocols, and security protocols in particular; to demonstrate this, we specify relevant security properties for a classical contract signing protocol and for the so–called quantum one–time pad. 相似文献
5.
Observing recurrent event processes at discrete, possibly random times produces panel count data. Modeling panel count data is challenging because the event process may be associated with the observation pattern and censoring time. Various methods have been proposed to fit flexible semiparametric regression models, but no software is available to practitioners. We develop an R package spef that fits semiparametric regression models for panel count data. Existing methods in the literature are implemented as well as our recently developed estimating equations approach. Some of the implemented methods allow informative observation and censoring scheme. The package usage is illustrated with a well-known bladder tumor data set. 相似文献
6.
7.
Ichiro Satoh 《Journal of Network and Systems Management》2006,14(1):147-169
This paper presents a framework for reusable mobile agents for network management in the sense that they are independent of either particular networks or applications. The framework enables a mobile agent to be composed from two layered components, which are mobile agents. The former is a carrier of the latter over particular networks independent of any management tasks and the latter defines management tasks performed at each host independently of any networks. The framework also offers a mechanism for matchmaking the two components. Since the mechanism is formulated on a process algebra approach, it can accurately select the appropriate itinerary component to perform management tasks at hosts that the tasks want to visit over networks. The framework provides a methodology for easily developing and operating mobile agents for traveling among multiple sub-networks to perform their management tasks at all of the nodes that they visit. This paper also describes the framework, its prototype implementation, and a practical application.
相似文献
Ichiro SatohEmail: |
8.
In functional languages such as OBJ*, CafeOBJ, and Maude, symbols are given strategy annotations that specify (the order in) which subterms are evaluated. Syntactically, strategy annotations are given either as lists of natural numbers or as lists of integers associated to function symbols whose (absolute) values refer to the arguments of the corresponding symbol. A positive index prescribes the evaluation of an argument whereas a negative index means “evaluation on-demand”. These on-demand indices have been proposed to support laziness in OBJ-like languages. While strategy annotations containing only natural numbers have been implemented and investigated to some extent (regarding, for example, termination, confluence, and completeness), fully general annotations (including positive and negative indices) have been disappointingly under-explored to date.In this paper, we first point out a number of problems of current proposals for handling on-demand strategy annotations. Then, we propose a solution to these problems by keeping an accurate track of annotations along the evaluation sequences. We formalize this solution as a suitable extension of the evaluation strategy of OBJ-like languages (which only consider annotations given as natural numbers) to on-demand strategy annotations. Our on-demand evaluation strategy (ODE) overcomes the drawbacks of previous proposals and also has better computational properties. For instance, we show how to use this strategy for computing (head-)normal forms. We also introduce a transformation which allows us to prove the termination of the new evaluation strategy by using standard rewriting techniques. Finally, we present two interpreters of the new strategy together with some encouraging experiments which demonstrate the usefulness of our approach. 相似文献
9.
In a multistage interconnection network (MIN) the calculation of the number of permutations of the input terminals into the output terminals is a classic difficult problem. In this paper, we introduce an innovative technique based on Colored Petri Nets (known as CP-nets or CPNs) that will allow us to analyze the permutation capability of arbitrary MINs. We show how to verify whether a MIN is rearrangeable through the state space analysis of the associated CP-net and we measure the permutation capability of non-rearrangeable MINs in terms of the permutations that can be generated. The proposed approach takes advantage of powerful existing software tools, particularly, CPNTools, which is used to explore the occurrence graphs of CP-nets and determine the set of permutations performed by the modeled MINs. This new technique is easy to use and can be efficiently applied to MINs made of cross-bar switches. 相似文献
10.
The conventional concepts of invariance are extended in this article to include impulsive control systems represented by measure driven differential inclusions. Invariance conditions and some of their main features are derived. The solution concept plays a critical role in the extension of the conditions for conventional problems to the impulsive control context. 相似文献
11.
Major principles of the method of the linear codes multithreshhold decoding as search for the global functional extremum for a great number of variables are considered. It was demonstrated that the multithreshold decoding efficiency is close to the results ensured by the optimum exhaustive search methods. Decoding complexity under software and hardware realizations is evaluated. 相似文献
12.
13.
A new form of a partial frequency criterion of absolute stability for nonlinear automatic control systems is obtained basing on a quadratic transformation of the state vector. As is shown, the obtained criterion is stronger than V.M. Popov’s one. An alternative formulation of the criterion is given in terms excluding the notions of quadratic transformation. 相似文献
14.
We consider a problem of discrete control for a class of nonlinear time-varying objects. Only set estimations for object parameters are available. The aim is to design controls that ensure robust stability of closed-loop systems in a given domain of state space. Since the considered class of objects is large enough not to have a stabilizing control, the proposed design method has to verify at the last step if the obtained conditions of robust stability are satisfied for a nonlinear system “in a given domain.” 相似文献
15.
The problem of maximizing the profit of an economic organization with simultaneous selection of its composition and structure was formulated. Consideration was given to a class of the power cost functions whose parameters reflect the organization environmental characteristics. The optimal organization was analytically established for this case, and the regularities of its variation vs. the environmental conditions were investigated. 相似文献
16.
E. R. Smol’yakov 《Automation and Remote Control》2009,70(8):1317-1326
The paper presents two new definitions of equilibrium for arbitrary game problems. The new definitions allow finding a unique solution for a significantly wider class of problems. 相似文献
17.
P. S. Kostenetskii A. V. Lepikhov L. V. Sokolinskii 《Automation and Remote Control》2007,68(5):847-859
For the multiprocessor systems of the hierarchical-architecture relational databases, a new approach to data layout and load balancing was proposed. Described was a database multiprocessor model enabling simulation and examination of arbitrary multiprocessor hierarchical configurations in the context of the on-line transaction processing applications. An important subclass of the symmetrical multiprocessor hierarchies was considered, and a new data layout strategy based on the method of partial mirroring was proposed for them. The disk space used to replicate the data was evaluated analytically. For the symmetrical hierarchies having certain regularity, theorems estimating the laboriousness of replica formation were proved. An efficient method of load balancing on the basis of the partial mirroring technique was proposed. The methods described are oriented to the clusters and Grid-systems. 相似文献
18.
S. P. Mishin 《Automation and Remote Control》2008,69(7):1188-1200
A model of the optimal multilevel organization is described. Its originality is determined by its multilevel character, the optimal hierarchy structure being the internal parameter examined together with the “classical” organization theory parameters, such as technology, number of agents and principals, their types and effort levels, stimulation mechanisms. The key assumption is the additivity of principals’ contributions to the total profit of the organization. A particular case of the model with the logarithmic profit function is examined in detail. 相似文献
19.
Singularly perturbed systems of ordinary differential equations are studied. A method for analysis of canard-type trajectories in such systems based on the topological degree theory is suggested. The method does not require smoothness of the right-hand side of the system. A result on the existence of periodic canards in systems with non-smooth perturbations is obtained. The trajectories located in this way are not necessarily Lyapunov stable, and appropriate control algorithms are required to stabilize them, e.g., feedback control. 相似文献
20.
A new representation is proved of the solutions of initial boundary value problems for the equation of the form u xx (x, t) + r(x)u x (x, t) ? q(x)u(x, t) = u tt (x, t) + μ(x)u t (x, t) in the section (under boundary conditions of the 1st, 2nd, or 3rd type in any combination). This representation has the form of the Riemann integral dependent on the x and t over the given section. 相似文献