A Practical Attack on KeeLoq

Size: px
Start display at page:

Download "A Practical Attack on KeeLoq"

Transcription

1 Introducton Our Attacks Practce Conclusons A Practcal Attack on KeeLoq Sebastaan Indesteege 1 Nathan Keller 2 Orr Dunkelman 1 El Bham 3 Bart Preneel 1 1 Dept. ESAT/SCD-COSIC, K.U.Leuven, Belgum. 2 Ensten Insttute of Mathematcs, Hebrew Unversty, Israel. 3 Computer Scence Department, Technon, Israel. Eurocrypt 2008 Sebastaan Indesteege A Practcal Attack on KeeLoq 1/ 21

2 Outlne Introducton Our Attacks Practce Conclusons 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 2/ 21

3 Outlne Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 3/ 21

4 Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks Introducton What? Lghtweght block cpher 32-bt block, 64-bt key Desgned n 1980s Sold by Mcrochp Inc. Where Is It Used? Remote keyless entry applcatons Car locks and alarms Sebastaan Indesteege A Practcal Attack on KeeLoq 4/ 21

5 Introducton Our Attacks Practce Conclusons KeeLoq Prevous Attacks Descrpton of the KeeLoq Block Cpher 528 rounds y () 31 y () 26 y () 20 y () 16 y () 9 y () 1 y () 0 ϕ () NLF k 63 + k 0 Sebastaan Indesteege A Practcal Attack on KeeLoq 5/ 21

6 Introducton Our Attacks Practce Conclusons Prevous Attacks on KeeLoq KeeLoq Prevous Attacks Attack Type Data Tme Memory Ref. Slde/Guess-and-Det KP GB [B07] Slde/Guess-and-Det KP GB [B07b] Slde/Cycle Structure 2 32 KP GB [CB07] Slde/Cycle/G&D 2 32 KP (2 37 ) 16.5 GB [B07b] Slde/Fxed Ponts 2 32 KP 2 27 > 16 GB [C+08] Slde/Algebrac 2 16 KP ? [CB07, C+08] Slde/Algebrac 2 16 KP ? [CB07, C+08] DPA DEMA [E+08] Sebastaan Indesteege A Practcal Attack on KeeLoq 6/ 21

7 Outlne Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 7/ 21

8 Introducton Our Attacks Practce Conclusons Determnng Keybts n KeeLoq Prelmnares Basc Generalsaton Chosen Plantext y () 31 y () 26 y () 20 y () 16 y () 9 y () 1 y () 0 ϕ () NLF k 63 + k 0 Gven two KeeLoq states, 32 rounds or less apart, we can fnd the key bts used n these rounds. Bogdanov [B07] Sebastaan Indesteege A Practcal Attack on KeeLoq 8/ 21

9 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Slde Attack Cpher wth many dentcal rounds F( ) P 2 P 1 F F F... F C 1 P 2 F F... F F C 2 C 1 Sld par P 2 = F(P 1 ), then also C 2 = F(C 1 ) Encryptng C 1 and C 2 yelds another sld par,... Use these pars to attack F( ) Sebastaan Indesteege A Practcal Attack on KeeLoq 9/ 21

10 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P 16 rounds 16 rounds 16 rounds 16 rounds P j k k k k Expect a sld par among 2 16 plantexts (brthday paradox) Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

11 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P 16 rounds 16 rounds 16 rounds 16 rounds P j k k k k k C 16 rounds 16 rounds 16 rounds 16 rounds C j 528 rounds = rounds Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

12 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

13 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Guess 16 key bts: k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

14 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j Guess 16 LSB s of P j : P j = X Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

15 Introducton Our Attacks Practce Conclusons Basc Attack Scenaro Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k k k k k C C Y j Y j C j For each plantext j, determne k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

16 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext j, partally decrypt Y j to Y j Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

17 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext, determne k Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

18 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j For each plantext, partally encrypt C to C Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

19 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C? Y j Y j C j Fnd ±2 16 collson(s) between C and Yj Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

20 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X? P j k k k k k P j Table 2 16 tuples P j, Y, k C C Y j Y j C j Determne (and check) k ; ±1 collson survves Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

21 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k C C Y j Y j C j Verfy key canddates usng tral encryptons (±2 16 n total) Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

22 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext Basc Attack Scenaro P X X P j P j Table 2 16 tuples P j, Y, k k k k k k Complexty C C Y j Y j C j Data 2 16 known plantexts Memory ±2 MB for the table Tme 2 45 KeeLoq encryptons Sebastaan Indesteege A Practcal Attack on KeeLoq 10/ 21

23 Introducton Our Attacks Practce Conclusons A Generalsaton of the Attack Prelmnares Basc Generalsaton Chosen Plantext Why 16 rounds throughout the attack? Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21

24 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext A Generalsaton of the Attack Why 16 rounds throughout the attack? No reason! t o bts P 16 rounds X tp rounds X P j tc rounds P j k ˆk 1 ˆk 2 ˆk 3 k C tp rounds C Y j tc rounds Y j 16 rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21

25 Introducton Our Attacks Practce Conclusons Prelmnares Basc Generalsaton Chosen Plantext A Generalsaton of the Attack Why 16 rounds throughout the attack? No reason! t o bts P 16 rounds X tp rounds X P j tc rounds P j k ˆk 1 ˆk 2 ˆk 3 k C tp rounds C Y j tc rounds Y j 16 rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21

26 Introducton Our Attacks Practce Conclusons A Generalsaton of the Attack Prelmnares Basc Generalsaton Chosen Plantext Why 16 rounds throughout the attack? No reason! t o bts 16 rounds P X Generalsaton tp rounds X P j tc rounds P j Parameters k t p and t ˆk c 1 If t o t p, t c ˆk 2 ˆk 3 Guess extra bts, or C C Plantext flterng Yj Optmum? tp rounds tp = t c = 15, t o = KeeLoq encryptons tc rounds Y j k rounds C j Sebastaan Indesteege A Practcal Attack on KeeLoq 11/ 21

27 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j k ˆk 1 ˆk 2 ˆk 3 k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21

28 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j constant k ˆk 1 ˆk 2 ˆk 3 k C C Y j Y j C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21

29 Introducton Our Attacks Practce Conclusons A Chosen Plantext Attack Prelmnares Basc Generalsaton Chosen Plantext P X X P j P j constant k Chosen Plantext Attack ˆk 1 ˆk 2 ˆk 3 k t o > t c C C Yj Y j Keep LSB s of plantext constant less guesses Optmum t p = 20, t c = 13, t o = 17 Stll KeeLoq encryptons... C j Sebastaan Indesteege A Practcal Attack on KeeLoq 12/ 21

30 Outlne Introducton Our Attacks Practce Conclusons Experments Applcablty 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 13/ 21

31 Introducton Our Attacks Practce Conclusons Experments Applcablty Implementaton Fully mplemented (C and x86 asm) and tested 128-way btslcng, where possble... Not durng collson verfcaton Impact? Collson verfcaton s more expensve Optmal t p, t c change CP becomes much faster than KP n practce! Sebastaan Indesteege A Practcal Attack on KeeLoq 14/ 21

32 Introducton Our Attacks Practce Conclusons Experments Applcablty Expermental Results Experments on one core of an AMD Athlon 64 X Known plantext attack mnutes,.e., ±500 CPU days 288 tmes faster than [CB07] Chosen plantext attack mnutes,.e., ±218 CPU days 661 tmes faster than [CB07] Average from 500 experments. Standard devaton < 2 s. Sebastaan Indesteege A Practcal Attack on KeeLoq 15/ 21

33 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Authentcaton protocols Authentcaton protocols based on KeeLoq, used e.g. n cars. KeeLoq Rollng Codes One-pass authentcaton protocol usng a synchronsed 16-bt counter. Not nterestng for our attack Sebastaan Indesteege A Practcal Attack on KeeLoq 16/ 21

34 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Authentcaton protocols (contnued) KeeLoq Identfy Frend or Foe (IFF) protocol Smple challenge-response authentcaton protocol. challenge E k (challenge) Challenges are not authentcated! Chosen plantext ablty! Gatherng 2 16 CP takes ±65 mnutes Sebastaan Indesteege A Practcal Attack on KeeLoq 17/ 21

35 Introducton Our Attacks Practce Conclusons Experments Applcablty Practcal Applcablty of the Attack Key dervaton In KeeLoq, all secret keys are derved from a master key, usng one of four ways: Dervaton functon XOR, or KeeLoq Decrypton Use of a seed-value Normal Learnng, or Secure Learnng XOR-based: k = pad(id, seed) k master Fnd one secret key, fnd the master key! Sebastaan Indesteege A Practcal Attack on KeeLoq 18/ 21

36 Outlne Introducton Our Attacks Practce Conclusons 1 Introducton Descrpton of the KeeLoq Block Cpher Prevous Attacks on KeeLoq 2 Our Attacks on KeeLoq Prelmnares Basc Attack Scenaro A Generalsaton of the Attack A Chosen Plantext Attack 3 Practce Expermental Results Practcal Applcablty of the Attack 4 Conclusons Sebastaan Indesteege A Practcal Attack on KeeLoq 19/ 21

37 Introducton Our Attacks Practce Conclusons Conclusons KeeLoq s badly broken Practcal Slde/MtM attack usng 2 16 KP or CP IFF protocol gves chosen plantext ablty XOR-based key dervaton s obvously flawed Soon, cryptographers wll all drve expensve cars Attack Type Data Tme Practce Memory Slde/MtM 2 16 KP CPU days ±3 MB Slde/MtM 2 16 CP CPU days ±2 MB Not all conclusons are to be taken too serously... Sebastaan Indesteege A Practcal Attack on KeeLoq 20/ 21

38 References References [B07] [B07b] [CB07] [C+08] [E+08] Andrey Bogdanov Cryptanalyss of the KeeLoq block cpher Cryptology eprnt Archve, Report 2007/055 Andrey Bogdanov Attacks on the KeeLoq Block Cpher and Authentcaton Systems 3rd Conference on RFID Securty 2007 Ncolas T. Courtos and Gregory V. Bard Algebrac and Slde Attacks on KeeLoq Cryptology eprnt Archve, Report 2007/062 Ncolas T. Courtos, Gregory V. Bard and Davd Wagner Algebrac and Slde Attacks on KeeLoq Proceedngs of Fast Software Encrypton 2008 Thomas Esenbarth, Tmo Kasper, Amr Morad, Chrstof Paar, Mahmoud Salmaszadeh and Mohammad T. Manzur Shalman Physcal Cryptanalyss of KeeLoq Code Hoppng Applcatons Cryptology eprnt Archve, Report 2008/058 Sebastaan Indesteege A Practcal Attack on KeeLoq 21/ 21

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Practical Attack on KeeLoq

A Practical Attack on KeeLoq A Practical Attack on KeeLoq Sebastiaan Indesteege 1,, Nathan Keller 2,, Orr Dunkelman 1, Eli Biham 3, and Bart Preneel 1 1 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit

More information

Cryptanalysis of KeeLoq with COPACOBANA

Cryptanalysis of KeeLoq with COPACOBANA Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný 1 and Timo Kasper 2 1 Faculty of Information Technology Czech Technical University in Prague Kolejní 550/2 160 00 Praha 6, Czech Republic email: novotnym@fit.cvut.cz

More information

Miss in the Middle Attacks on IDEA and Khufu

Miss in the Middle Attacks on IDEA and Khufu Mss n the Mddle Attacks on IDEA and Khufu El Bham Alex Bryukov Ad Shamr Abstract. In a recent paper we developed a new cryptanalytc technque based on mpossble dfferentals, and used t to attack the Skpjack

More information

Cryptanalysis of KeeLoq code-hopping using a Single FPGA

Cryptanalysis of KeeLoq code-hopping using a Single FPGA Cryptanalysis of KeeLoq code-hopping using a Single FPGA Idan Sheetrit and Avishai Wool Computer and Network Security Lab School of Electrical Engineering Tel-Aviv University, Ramat Aviv 69978, Israel

More information

KeeLoq and Side-Channel Analysis Evolution of an Attack

KeeLoq and Side-Channel Analysis Evolution of an Attack KeeLoq and Side-Channel Analysis Evolution of an Attack Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper and Amir Moradi Chair for Embedded Security Electrical Engineering and Information Sciences

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

A Star-based Independent Biclique Attack on Full Rounds SQUARE

A Star-based Independent Biclique Attack on Full Rounds SQUARE A Star-based Independent Bclque Attack on Full Rounds SQUARE Zheng Yuan,, Zhen Peng,, Mng Mao,. Beng Electronc Scence &Technology Insttute, Beng 00070,Chna. Xdan Unversty, X an, Chna yuanzheng@best.edu.cn,

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Deep learnng s a good steganalyss tool when embeddng key s reused for dfferent mages, even f there s a cover source-msmatch Lonel PIBRE 2,3, Jérôme PASQUET 2,3, Dno IENCO 2,3, Marc CHAUMONT 1,2,3 (1) Unversty

More information

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme Thomas Eisenbarth 1,TimoKasper 1, Amir Moradi 2,, Christof Paar 1, Mahmoud Salmasizadeh 2, and Mohammad

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

New Cryptanalytic Results on IDEA

New Cryptanalytic Results on IDEA New Cryptanalytic Results on IDEA Eli Biham, Orr Dunkelman, Nathan Keller Computer Science Dept., Technion Dept. of Electrical Engineering ESAT SCD/COSIC, KUL Einstein Institute of Mathematics, Hebrew

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Discriminative Dictionary Learning with Pairwise Constraints

Discriminative Dictionary Learning with Pairwise Constraints Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse

More information

New Cryptanalytic Results on IDEA

New Cryptanalytic Results on IDEA New Cryptanalytic Results on IDEA Eli Biham, Orr Dunkelman, Nathan Keller Computer Science Dept., Technion Dept. of Electrical Engineering ESAT SCD/COSIC, KUL Einstein Institute of Mathematics, Hebrew

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

LOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS

LOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS LOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS FLAVIO GARCIA, DAVID OSWALD, TIMO KASPER, PIERRE PAVLIDES PRESENTED BY JACOB BEDNARD, WAYNE STATE UNIVERSITY CSC5991

More information

Differential-Linear Cryptanalysis of Serpent

Differential-Linear Cryptanalysis of Serpent Differential-Linear Cryptanalysis of Serpent Eli Biham 1, Orr Dunkelman 1, and Nathan Keller 2 1 Computer Science Department, Technion, Haifa 32000, Israel {biham,orrd}@cs.technion.ac.il 2 Mathematics

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

Concurrent models of computation for embedded software

Concurrent models of computation for embedded software Concurrent models of computaton for embedded software and hardware! Researcher overvew what t looks lke semantcs what t means and how t relates desgnng an actor language actor propertes and how to represent

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

9. BASIC programming: Control and Repetition

9. BASIC programming: Control and Repetition Am: In ths lesson, you wll learn: H. 9. BASIC programmng: Control and Repetton Scenaro: Moz s showng how some nterestng patterns can be generated usng math. Jyot [after seeng the nterestng graphcs]: Usng

More information

Spam Detection Through Sliding Windowing of Headers

Spam Detection Through Sliding Windowing of  Headers Spam Detecton Through Sldng Wndowng of E-mal Headers Francsco Salcedo-Campos, Jesus Daz-Verdejo, Pedro Garca-Teodoro Dpt. of Sgnal Theory, Telematcs and Communcatons ETSIIT - CITIC - Unversty of Granada

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction Chapter 2 Desgn for Testablty Dr Rhonda Kay Gaede UAH 2 Introducton Dffcultes n and the states of sequental crcuts led to provdng drect access for storage elements, whereby selected storage elements are

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Parameter estimation for incomplete bivariate longitudinal data in clinical trials

Parameter estimation for incomplete bivariate longitudinal data in clinical trials Parameter estmaton for ncomplete bvarate longtudnal data n clncal trals Naum M. Khutoryansky Novo Nordsk Pharmaceutcals, Inc., Prnceton, NJ ABSTRACT Bvarate models are useful when analyzng longtudnal data

More information

Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection

Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton We-Chh Hsu, Tsan-Yng Yu E-mal Spam Flterng Based on Support Vector Machnes wth Taguch Method for Parameter Selecton

More information

Image Alignment CSC 767

Image Alignment CSC 767 Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

More engineering. considerations for the SHA-3 hash function

More engineering. considerations for the SHA-3 hash function More engineering considerations for the SHA-3 hash function Jean-Philippe Aumasson Dan Bernstein Charles Bouillaguet Daniel Brown Orr Dunkelman Sebastiaan Indesteege Emilia Käsper Dmitry Khovratovich Jongsung

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

A Comparative Analysis of Encryption Algorithms for Better Utilization

A Comparative Analysis of Encryption Algorithms for Better Utilization A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics Ths module s part of the Memobust Handbook on Methodology of Modern Busness Statstcs 26 March 2014 Theme: Donor Imputaton Contents General secton... 3 1. Summary... 3 2. General descrpton... 3 2.1 Introducton

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

An Efficient Algorithm for PC Purchase Decision System

An Efficient Algorithm for PC Purchase Decision System Proceedngs of the 6th WSAS Internatonal Conference on Instrumentaton, Measurement, Crcuts & s, Hangzhou, Chna, Aprl 15-17, 2007 216 An ffcent Algorthm for PC Purchase Decson Huay Chang Department of Informaton

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS. Yuriy Zaychenko

THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS. Yuriy Zaychenko 206 5 Knowledge Dalogue - Soluton THE FUZZY GROUP ETHOD OF DATA HANDLING WITH FUZZY INPUTS Yury Zaycheno Abstract: The problem of forecastng models constructng usng expermental data n terms of fuzzness,

More information

Wavefront Reconstructor

Wavefront Reconstructor A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes

More information

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems

An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Linear Cryptanalysis of Reduced Round Serpent

Linear Cryptanalysis of Reduced Round Serpent Linear Cryptanalysis of Reduced Round Serpent Eli Biham 1, Orr Dunkelman 1, and Nathan Keller 2 1 Computer Science Department, Technion Israel Institute of Technology, Haifa 32000, Israel, {biham,orrd}@cs.technion.ac.il,

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Programming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017

Programming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017 Programmng Assgnment Sx, 07 Programmng Assgnment Sx Larry Caretto Mechancal Engneerng 09 Computer Programmng for Mechancal Engneers Outlne Practce quz for actual quz on Thursday Revew approach dscussed

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

A secure sharing design for multi-tag RFID authentication protocol

A secure sharing design for multi-tag RFID authentication protocol Edth Cowan Unversty Research Onlne Australan Securty and Intellgence Conference Conferences, Symposa and Campus Events 2015 A secure sharng desgn for mult-tag RFID authentcaton protocol Ayad Al-Adham Plymouth

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution Dynamc Voltage Scalng of Supply and Body Bas Explotng Software Runtme Dstrbuton Sungpack Hong EE Department Stanford Unversty Sungjoo Yoo, Byeong Bn, Kyu-Myung Cho, Soo-Kwan Eo Samsung Electroncs Taehwan

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c 6th Internatonal Conference on Informaton Engneerng for Mechancs and Materals (ICIMM 2016) Data Preprocessng Based on Partally Supervsed Learnng Na Lu1,2, a, Guangla Gao1,b, Gupng Lu2,c 1 College of Computer

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search Can We Beat the Prefx Flterng? An Adaptve Framework for Smlarty Jon and Search Jannan Wang Guolang L Janhua Feng Department of Computer Scence and Technology, Tsnghua Natonal Laboratory for Informaton

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information