Correspondence of Operands to Functions
نویسندگان
چکیده
منابع مشابه
Addition with Blinded Operands
The masking countermeasure is an efficient method to protect cryptographic algorithms against Differential Power Analysis (DPA) and similar attacks. For symmetric cryptosystems, two techniques are commonly used: Boolean masking and arithmetic masking. Conversion methods have been proposed for switching from Boolean masking to arithmetic masking, and conversely. The way conversion is applied dep...
متن کاملNarrative summarization and its correspondence to Proppian functions
Some formal systems of narrative aim to represent those features that belong to faithful summaries of the narrative. In this paper, we compare data obtained in two experiments by means of an event mapping: summaries by untrained test subjects and annotations of test subjects trained in the narrative framework of Vladimir Propp. The method used is adequate for the task and highlights differences...
متن کاملCorrelation Functions and AdS/LCFT Correspondence
Correlation functions of Logarithmic conformal field theory is investigated using the ADS/CFT correspondence and a novel method based on nilpotent weights and ’super fields’. Adding an specific form of interaction, we introduce a perturbative method to calculate the correlation functions. PACS : 11.25.Hf
متن کاملShape Part Correspondence Using Chance Probability Functions
This paper presents a direct method for finding corresponding pairs of parts between two shapes. Statistical knowledge about a large number of parts from many different objects is used to find a part correspondence between two previously unseen input shapes. No class membership information is required. The knowledge-based approach is shown to produce significantly better results than a classica...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Mathematical Gazette
سال: 1910
ISSN: 0025-5572,2056-6328
DOI: 10.2307/3603412