Linear sequential circuit approximation of Grain and Trivium stream ciphers
Grain and Trivium - hardware oriented stream ciphers. The linear sequential circuit approximation method as an effective method for the linear model determination. Outline of the analyzed ciphers. Description of Trivium. Correlation coefficient analysis.
Подобные документы
Development of a basic robotics workstation with the method of training students in accordance with the specific needs of the robot teachers. The robot can also be used to install programs in the ROS environment, you need to install a Kinect add-on.
статья, добавлен 26.08.2020The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. А functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
статья, добавлен 06.05.2018Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
статья, добавлен 28.09.2016Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.
статья, добавлен 29.04.2019Description of the developed energy saving algorithm for autonomous heating systems installed in heated premises. Determination of the moment of switching on for the transition to the specified nominal temperature after maintaining the set temperature.
статья, добавлен 03.12.2018Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.
статья, добавлен 21.12.2021Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
статья, добавлен 12.05.2024Программный комплекс MMSolver предназначен для решения вариационных неравенств различными итерационными методами. Функциональное назначение программы, область её применения, её назначение. Описание модулей MatrixCalc, Task, Method. Диаграмма классов.
методичка, добавлен 11.01.2020Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
статья, добавлен 09.10.2018Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.
диссертация, добавлен 08.03.2014The detail parallelization a popular global search method, the PSO algorithm using MPJ Express. The parallel PSO algorithm’s robustness and efficiency are demonstrated by using four standard benchmark functions Alpine, Rosenbrock, Rastrigin and Schaffer.
статья, добавлен 23.02.2015The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.
статья, добавлен 21.08.2022Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.
статья, добавлен 23.02.2016Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
статья, добавлен 17.12.2022The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
статья, добавлен 28.02.2016Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
статья, добавлен 28.08.2016Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.
статья, добавлен 23.02.2016Investigation of polygonal meshes to represent objects in systems of computer-aided design and computer graphics. Use the method of the voting tensor to isolate in the geometric structures the sparsities, irregularities and possible sources of noise.
статья, добавлен 28.09.2016The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.
статья, добавлен 15.09.2012Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.
статья, добавлен 01.02.2013Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.
статья, добавлен 23.02.2016The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.
статья, добавлен 23.02.2016