期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Approximation Properties of Vectorial Exponential Functions
1
作者 Christophe Buet Bruno Despres Guillaume Morel 《Communications on Applied Mathematics and Computation》 EI 2024年第3期1801-1831,共31页
This contribution is dedicated to the celebration of Rémi Abgrall’s accomplishments in Applied Mathematics and Scientific Computing during the conference“Essentially Hyperbolic Problems:Unconventional Numerics,... This contribution is dedicated to the celebration of Rémi Abgrall’s accomplishments in Applied Mathematics and Scientific Computing during the conference“Essentially Hyperbolic Problems:Unconventional Numerics,and Applications”.With respect to classical Finite Elements Methods,Trefftz methods are unconventional methods because of the way the basis functions are generated.Trefftz discontinuous Galerkin(TDG)methods have recently shown potential for numerical approximation of transport equations[6,26]with vectorial exponential modes.This paper focuses on a proof of the approximation properties of these exponential solutions.We show that vectorial exponential functions can achieve high order convergence.The fundamental part of the proof consists in proving that a certain rectangular matrix has maximal rank. 展开更多
关键词 Trefftz method Transport equation vectorial exponential functions
在线阅读 下载PDF
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
2
作者 Nahla Fatahelrahman Ibrahim Johnson Ihyeh Agbinya 《Advances in Internet of Things》 2022年第1期9-17,共9页
In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application a... In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis. 展开更多
关键词 Internet of Things Lightweight Cryptographic Scheme vectorial Boolean functions IoT Differential Cryptanalysis
在线阅读 下载PDF
More constructions of APN and differentially 4-uniform functions by concatenation 被引量:4
3
作者 CARLET Claude 《Science China Mathematics》 SCIE 2013年第7期1373-1384,共12页
We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differe... We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differentially 4-uniform (n, n)-functions from APN and differentially 4-uniform (n/2, n/2)-functions. We also give a construction of quadratic APN functions which includes as particular cases a previous construction by the author and a more recent construction by Pott and Zhou. 展开更多
关键词 block cipher vectorial function substitution box almost perfect nonlinear almost bent
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部