A Practical Attack on KeeLoq
|
|
- Christina Gardner
- 5 years ago
- Views:
Transcription
1 Introducton Our Attacks Practce Conclusons A Practcal Attack on KeeLoq Sebastaan Indesteege 1 Nathan Keller 2 Orr Dunkelman 1 El Bham 3 Bart Preneel 1 1 Dept. ESAT/SCD-COSIC, K.U.Leuven, Belgum. 2 Ensten Insttute of Mathematcs, Hebrew Unversty, Israel. 3 Computer Scence Department, Technon, Israel. Eurocrypt 2008 Sebastaan Indesteege A Practcal Attack on KeeLoq 1/ 21
2 Outlne Introducton Our Attacks Practce Conclusons 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 2/ 21
3 Outlne Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 3/ 21
4 Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks Introducton What? Lghtweght block cpher 32-bt block, 64-bt key Desgned n 1980s Sold by Mcrochp Inc. Where Is It Used? Remote keyless entry applcatons Car locks and alarms Sebastaan Indesteege A Practcal Attack on KeeLoq 4/ 21
5 Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks Descrpton of the KeeLoq Block Cpher 528 rounds y () 31 y () 26 y () 20 y () 16 y () 9 y () 1 y () 0 ϕ () NLF k 63 + k 0 Sebastaan Indesteege A Practcal Attack on KeeLoq 5/ 21
6 Introducton Our Attacks Practce Conclusons Prevous Attacks on KeeLoq KeeLoq Prevous Attacks Attack Type Data Tme Memory Ref. Slde/Guess-and-Det KP GB [B07] Slde/Guess-and-Det KP GB [B07b] Slde/Cycle Structure 2 32 KP GB [CB07] Slde/Cycle/G&D 2 32 KP (2 37 ) 16.5 GB [B07b] Slde/Fxed Ponts 2 32 KP 2 27 > 16 GB [C+08] Slde/Algebrac 2 16 KP ? [CB07, C+08] Slde/Algebrac 2 16 KP ? [CB07, C+08] DPA DEMA [E+08] Sebastaan Indesteege A Practcal Attack on KeeLoq 6/ 21
7 Outlne Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 7/ 21
8 Introducton Our Attacks Practce Conclusons Determnng Keybts n KeeLoq Prelmnares Basc Generalsaton Chosen Plantext y () 31 y () 26 y () 20 y () 16 y () 9 y () 1 y () 0 ϕ () NLF k 63 + k 0 Gven two KeeLoq states, 32 rounds or less apart, we can fnd the key bts used n these rounds. Bogdanov [B07] Sebastaan Indesteege A Practcal Attack on KeeLoq 8/ 21
9 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Slde Attack Cpher wth many dentcal rounds F( ) P 2 P 1 F F F... F C 1 P 2 F F... F F C 2 C 1 Sld par P 2 = F(P 1 ), then also C 2 = F(C 1 ) Encryptng C 1 and C 2 yelds another sld par,... Use these pars to attack F( ) Sebastaan Indesteege A Practcal Attack on KeeLoq 9/ 21
10 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P 16 rounds 16 rounds 16 rounds 16 rounds P j k k k k Expect a sld par among 2 16 plantexts (brthday paradox) Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
11 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P 16 rounds 16 rounds 16 rounds 16 rounds P j k k k k k C 16 rounds 16 rounds 16 rounds 16 rounds C j 528 rounds = rounds Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
12 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
13 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Guess 16 key bts: k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
14 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Guess 16 LSB s of P j : P j = X Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
15 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j For each plantext j, determne k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
16 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext j, partally decrypt Y j to Y j Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
17 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext, determne k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
18 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext, partally encrypt C to C Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
19 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C? Y j Y j C j Fnd ±2 16 collson(s) between C and Yj Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
20 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X? P j k k k k k P j Table 2 16 tuples P j, Y, k C C Y j Y j C j Determne (and check) k ; ±1 collson survves Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
21 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j Verfy key canddates usng tral encryptons (±2 16 n total) Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
22 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k Complexty C C Y j Y j C j Data 2 16 known plantexts Memory ±2 MB for the table Tme 2 45 KeeLoq encryptons Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21
23 Introducton Our Attacks Practce Conclusons A Generalsaton of the Attack Prelmnares Basc Generalsaton Chosen Plantext Why 16 rounds throughout the attack? Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21
24 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext A Generalsaton of the Attack Why 16 rounds throughout the attack? No reason! t o bts P 16 rounds X tp rounds X P j tc rounds P j k ˆk 1 ˆk 2 ˆk 3 k C tp rounds C Y j tc rounds Y j 16 rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21
25 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext A Generalsaton of the Attack Why 16 rounds throughout the attack? No reason! t o bts P 16 rounds X tp rounds X P j tc rounds P j k ˆk 1 ˆk 2 ˆk 3 k C tp rounds C Y j tc rounds Y j 16 rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21
26 Introducton Our Attacks Practce Conclusons A Generalsaton of the Attack Prelmnares Basc Generalsaton Chosen Plantext Why 16 rounds throughout the attack? No reason! t o bts 16 rounds P X Generalsaton tp rounds X P j tc rounds P j Parameters k t p and t ˆk c 1 If t o t p, t c ˆk 2 ˆk 3 Guess extra bts, or C C Plantext flterng Yj Optmum? tp rounds tp = t c = 15, t o = KeeLoq encryptons tc rounds Y j k rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21
27 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k ˆk 1 ˆk 2 ˆk 3 k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21
28 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j constant k ˆk 1 ˆk 2 ˆk 3 k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21
29 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j constant k Chosen Plantext Attack ˆk 1 ˆk 2 ˆk 3 k t o > t c C C Yj Y j Keep LSB s of plantext constant less guesses Optmum t p = 20, t c = 13, t o = 17 Stll KeeLoq encryptons... C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21
30 Outlne Introducton Our Attacks Practce Conclusons Experments Applcablty 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 13/ 21
31 Introducton Our Attacks Practce Conclusons Experments Applcablty Implementaton Fully mplemented (C and x86 asm) and tested 128-way btslcng, where possble... Not durng collson verfcaton Impact? Collson verfcaton s more expensve Optmal t p, t c change CP becomes much faster than KP n practce! Sebastaan Indesteege A Practcal Attack on KeeLoq 14/ 21
32 Introducton Our Attacks Practce Conclusons Experments Applcablty Expermental Results Experments on one core of an AMD Athlon 64 X Known plantext attack mnutes,.e., ±500 CPU days 288 tmes faster than [CB07] Chosen plantext attack mnutes,.e., ±218 CPU days 661 tmes faster than [CB07] Average from 500 experments. Standard devaton < 2 s. Sebastaan Indesteege A Practcal Attack on KeeLoq 15/ 21
33 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Authentcaton protocols Authentcaton protocols based on KeeLoq, used e.g. n cars. KeeLoq Rollng Codes One-pass authentcaton protocol usng a synchronsed 16-bt counter. Not nterestng for our attack Sebastaan Indesteege A Practcal Attack on KeeLoq 16/ 21
34 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Authentcaton protocols (contnued) KeeLoq Identfy Frend or Foe (IFF) protocol Smple challenge-response authentcaton protocol. challenge E k (challenge) Challenges are not authentcated! Chosen plantext ablty! Gatherng 2 16 CP takes ±65 mnutes Sebastaan Indesteege A Practcal Attack on KeeLoq 17/ 21
35 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Key dervaton In KeeLoq, all secret keys are derved from a master key, usng one of four ways: Dervaton functon XOR, or KeeLoq Decrypton Use of a seed-value Normal Learnng, or Secure Learnng XOR-based: k = pad(id, seed) k master Fnd one secret key, fnd the master key! Sebastaan Indesteege A Practcal Attack on KeeLoq 18/ 21
36 Outlne Introducton Our Attacks Practce Conclusons 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 19/ 21
37 Introducton Our Attacks Practce Conclusons Conclusons KeeLoq s badly broken Practcal Slde/MtM attack usng 2 16 KP or CP IFF protocol gves chosen plantext ablty XOR-based key dervaton s obvously flawed Soon, cryptographers wll all drve expensve cars Attack Type Data Tme Practce Memory Slde/MtM 2 16 KP CPU days ±3 MB Slde/MtM 2 16 CP CPU days ±2 MB Not all conclusons are to be taken too serously... Sebastaan Indesteege A Practcal Attack on KeeLoq 20/ 21
38 References References [B07] [B07b] [CB07] [C+08] [E+08] Andrey Bogdanov Cryptanalyss of the KeeLoq block cpher Cryptology eprnt Archve, Report 2007/055 Andrey Bogdanov Attacks on the KeeLoq Block Cpher and Authentcaton Systems 3rd Conference on RFID Securty 2007 Ncolas T. Courtos and Gregory V. Bard Algebrac and Slde Attacks on KeeLoq Cryptology eprnt Archve, Report 2007/062 Ncolas T. Courtos, Gregory V. Bard and Davd Wagner Algebrac and Slde Attacks on KeeLoq Proceedngs of Fast Software Encrypton 2008 Thomas Esenbarth, Tmo Kasper, Amr Morad, Chrstof Paar, Mahmoud Salmaszadeh and Mohammad T. Manzur Shalman Physcal Cryptanalyss of KeeLoq Code Hoppng Applcatons Cryptology eprnt Archve, Report 2008/058 Sebastaan Indesteege A Practcal Attack on KeeLoq 21/ 21
Related-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA Practical Attack on KeeLoq
A Practical Attack on KeeLoq Sebastiaan Indesteege 1,, Nathan Keller 2,, Orr Dunkelman 1, Eli Biham 3, and Bart Preneel 1 1 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit
More informationCryptanalysis of KeeLoq with COPACOBANA
Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný 1 and Timo Kasper 2 1 Faculty of Information Technology Czech Technical University in Prague Kolejní 550/2 160 00 Praha 6, Czech Republic email: novotnym@fit.cvut.cz
More informationMiss in the Middle Attacks on IDEA and Khufu
Mss n the Mddle Attacks on IDEA and Khufu El Bham Alex Bryukov Ad Shamr Abstract. In a recent paper we developed a new cryptanalytc technque based on mpossble dfferentals, and used t to attack the Skpjack
More informationCryptanalysis of KeeLoq code-hopping using a Single FPGA
Cryptanalysis of KeeLoq code-hopping using a Single FPGA Idan Sheetrit and Avishai Wool Computer and Network Security Lab School of Electrical Engineering Tel-Aviv University, Ramat Aviv 69978, Israel
More informationKeeLoq and Side-Channel Analysis Evolution of an Attack
KeeLoq and Side-Channel Analysis Evolution of an Attack Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper and Amir Moradi Chair for Embedded Security Electrical Engineering and Information Sciences
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationA Star-based Independent Biclique Attack on Full Rounds SQUARE
A Star-based Independent Bclque Attack on Full Rounds SQUARE Zheng Yuan,, Zhen Peng,, Mng Mao,. Beng Electronc Scence &Technology Insttute, Beng 00070,Chna. Xdan Unversty, X an, Chna yuanzheng@best.edu.cn,
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationLecture - Data Encryption Standard 4
The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationDeep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty
More informationOn the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme Thomas Eisenbarth 1,TimoKasper 1, Amir Moradi 2,, Christof Paar 1, Mahmoud Salmasizadeh 2, and Mohammad
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationPrivacy Models for RFID Authentication Protocols
Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationHOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY
HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable
More informationNew Cryptanalytic Results on IDEA
New Cryptanalytic Results on IDEA Eli Biham, Orr Dunkelman, Nathan Keller Computer Science Dept., Technion Dept. of Electrical Engineering ESAT SCD/COSIC, KUL Einstein Institute of Mathematics, Hebrew
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationCryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag
IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationDiscriminative Dictionary Learning with Pairwise Constraints
Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse
More informationNew Cryptanalytic Results on IDEA
New Cryptanalytic Results on IDEA Eli Biham, Orr Dunkelman, Nathan Keller Computer Science Dept., Technion Dept. of Electrical Engineering ESAT SCD/COSIC, KUL Einstein Institute of Mathematics, Hebrew
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationReview of approximation techniques
CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated
More informationLOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS
LOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS FLAVIO GARCIA, DAVID OSWALD, TIMO KASPER, PIERRE PAVLIDES PRESENTED BY JACOB BEDNARD, WAYNE STATE UNIVERSITY CSC5991
More informationDifferential-Linear Cryptanalysis of Serpent
Differential-Linear Cryptanalysis of Serpent Eli Biham 1, Orr Dunkelman 1, and Nathan Keller 2 1 Computer Science Department, Technion, Haifa 32000, Israel {biham,orrd}@cs.technion.ac.il 2 Mathematics
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationConcurrent models of computation for embedded software
Concurrent models of computaton for embedded software and hardware! Researcher overvew what t looks lke semantcs what t means and how t relates desgnng an actor language actor propertes and how to represent
More informationA Clustering Algorithm for Chinese Adjectives and Nouns 1
Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,
More informationKent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming
CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More information9. BASIC programming: Control and Repetition
Am: In ths lesson, you wll learn: H. 9. BASIC programmng: Control and Repetton Scenaro: Moz s showng how some nterestng patterns can be generated usng math. Jyot [after seeng the nterestng graphcs]: Usng
More informationSpam Detection Through Sliding Windowing of Headers
Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationCordial and 3-Equitable Labeling for Some Star Related Graphs
Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,
More informationCPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction
Chapter 2 Desgn for Testablty Dr Rhonda Kay Gaede UAH 2 Introducton Dffcultes n and the states of sequental crcuts led to provdng drect access for storage elements, whereby selected storage elements are
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationParameter estimation for incomplete bivariate longitudinal data in clinical trials
Parameter estmaton for ncomplete bvarate longtudnal data n clncal trals Naum M. Khutoryansky Novo Nordsk Pharmaceutcals, Inc., Prnceton, NJ ABSTRACT Bvarate models are useful when analyzng longtudnal data
More informationSpam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection
E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton We-Chh Hsu, Tsan-Yng Yu E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton
More informationImage Alignment CSC 767
Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationMore engineering. considerations for the SHA-3 hash function
More engineering considerations for the SHA-3 hash function Jean-Philippe Aumasson Dan Bernstein Charles Bouillaguet Daniel Brown Orr Dunkelman Sebastiaan Indesteege Emilia Käsper Dmitry Khovratovich Jongsung
More informationCost-efficient deployment of distributed software services
1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationConformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection
Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,
More informationA Comparative Analysis of Encryption Algorithms for Better Utilization
A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks
More informationThis module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics
Ths module s part of the Memobust Handbook on Methodology of Modern Busness Statstcs 26 March 2014 Theme: Donor Imputaton Contents General secton... 3 1. Summary... 3 2. General descrpton... 3 2.1 Introducton
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationAn Efficient Algorithm for PC Purchase Decision System
Proceedngs of the 6th WSAS Internatonal Conference on Instrumentaton, Measurement, Crcuts & s, Hangzhou, Chna, Aprl 15-17, 2007 216 An ffcent Algorthm for PC Purchase Decson Huay Chang Department of Informaton
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More information12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification
Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero
More informationProviding Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework
2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationTHE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS. Yuriy Zaychenko
206 5 Knowledge Dalogue - Soluton THE FUZZY GROUP ETHOD OF DATA HANDLING WITH FUZZY INPUTS Yury Zaycheno Abstract: The problem of forecastng models constructng usng expermental data n terms of fuzzness,
More informationWavefront Reconstructor
A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes
More informationAn Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems
An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationLinear Cryptanalysis of Reduced Round Serpent
Linear Cryptanalysis of Reduced Round Serpent Eli Biham 1, Orr Dunkelman 1, and Nathan Keller 2 1 Computer Science Department, Technion Israel Institute of Technology, Haifa 32000, Israel, {biham,orrd}@cs.technion.ac.il,
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More informationProgramming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017
Programmng Assgnment Sx, 07 Programmng Assgnment Sx Larry Caretto Mechancal Engneerng 09 Computer Programmng for Mechancal Engneers Outlne Practce quz for actual quz on Thursday Revew approach dscussed
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationCE 221 Data Structures and Algorithms
CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume
More informationA secure sharing design for multi-tag RFID authentication protocol
Edth Cowan Unversty Research Onlne Australan Securty and Intellgence Conference Conferences, Symposa and Campus Events 2015 A secure sharng desgn for mult-tag RFID authentcaton protocol Ayad Al-Adham Plymouth
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationSENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR
SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu
More informationDynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution
Dynamc Voltage Scalng of Supply and Body Bas Explotng Software Runtme Dstrbuton Sungpack Hong EE Department Stanford Unversty Sungjoo Yoo, Byeong Bn, Kyu-Myung Cho, Soo-Kwan Eo Samsung Electroncs Taehwan
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationData Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c
6th Internatonal Conference on Informaton Engneerng for Mechancs and Materals (ICIMM 2016) Data Preprocessng Based on Partally Supervsed Learnng Na Lu1,2, a, Guangla Gao1,b, Gupng Lu2,c 1 College of Computer
More informationNew Remote Mutual Authentication Scheme using Smart Cards
141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationCan We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search
Can We Beat the Prefx Flterng? An Adaptve Framework for Smlarty Jon and Search Jannan Wang Guolang L Janhua Feng Department of Computer Scence and Technology, Tsnghua Natonal Laboratory for Informaton
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More information