Sciweavers

56 search results - page 8 / 12
» Nonlinearity from linearity: The Ermakov-Pinney equation rev...
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 1 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
FSE
2004
Springer
82views Cryptology» more  FSE 2004»
15 years 1 months ago
Resistance of S-Boxes against Algebraic Attacks
Abstract. We develop several tools to derive linear independent multivariate equations from algebraic S-boxes. By applying them to maximally nonlinear power functions with the inve...
Jung Hee Cheon, Dong Hoon Lee 0002
SMA
2005
ACM
191views Solid Modeling» more  SMA 2005»
15 years 3 months ago
Poisson shape interpolation
In this paper, we propose a novel shape interpolation approach based on Poisson equation. We formulate the trajectory problem of shape interpolation as solving Poisson equations d...
Dong Xu, Hongxin Zhang, Qing Wang, Hujun Bao
61
Voted
AUTOMATICA
2007
75views more  AUTOMATICA 2007»
14 years 9 months ago
System theory for numerical analysis
Many numerical schemes can be suitably studied from a system theoretic point of view. This paper studies the relationship between the two disciplines, that is, numerical analysis ...
Kenji Kashima, Yutaka Yamamoto
SIAMAM
2008
170views more  SIAMAM 2008»
14 years 9 months ago
Absolute Stability and Complete Synchronization in a Class of Neural Fields Models
Neural fields are an interesting option for modelling macroscopic parts of the cortex involving several populations of neurons, like cortical areas. Two classes of neural field equ...
Olivier D. Faugeras, François Grimbert, Jea...