This contribution is dedicated to the celebration of Rémi Abgrall’s accomplishments in Applied Mathematics and Scientific Computing during the conference“Essentially Hyperbolic Problems:Unconventional Numerics,...This contribution is dedicated to the celebration of Rémi Abgrall’s accomplishments in Applied Mathematics and Scientific Computing during the conference“Essentially Hyperbolic Problems:Unconventional Numerics,and Applications”.With respect to classical Finite Elements Methods,Trefftz methods are unconventional methods because of the way the basis functions are generated.Trefftz discontinuous Galerkin(TDG)methods have recently shown potential for numerical approximation of transport equations[6,26]with vectorial exponential modes.This paper focuses on a proof of the approximation properties of these exponential solutions.We show that vectorial exponential functions can achieve high order convergence.The fundamental part of the proof consists in proving that a certain rectangular matrix has maximal rank.展开更多
In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application a...In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis.展开更多
We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differe...We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differentially 4-uniform (n, n)-functions from APN and differentially 4-uniform (n/2, n/2)-functions. We also give a construction of quadratic APN functions which includes as particular cases a previous construction by the author and a more recent construction by Pott and Zhou.展开更多
文摘This contribution is dedicated to the celebration of Rémi Abgrall’s accomplishments in Applied Mathematics and Scientific Computing during the conference“Essentially Hyperbolic Problems:Unconventional Numerics,and Applications”.With respect to classical Finite Elements Methods,Trefftz methods are unconventional methods because of the way the basis functions are generated.Trefftz discontinuous Galerkin(TDG)methods have recently shown potential for numerical approximation of transport equations[6,26]with vectorial exponential modes.This paper focuses on a proof of the approximation properties of these exponential solutions.We show that vectorial exponential functions can achieve high order convergence.The fundamental part of the proof consists in proving that a certain rectangular matrix has maximal rank.
文摘In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis.
文摘We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differentially 4-uniform (n, n)-functions from APN and differentially 4-uniform (n/2, n/2)-functions. We also give a construction of quadratic APN functions which includes as particular cases a previous construction by the author and a more recent construction by Pott and Zhou.