Figure 1 from Math-Net.Ru All Russian mathematical portal | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
  • Corpus ID: 33088072
@inproceedings{Bokut2017MathNetRuAR, title={Math-Net.Ru All Russian mathematical portal}, author={Leonid A. Bokut and E. I. Zelmanov and P. Zusmanovich and Victor G. Kac and L. G. Makar-Limanov and Yurii I Manin and S. P. Novikov and A. N. Parshin and V. P. Platonov and Iskander A. Taimanov and U. U. Umirbaev and I. P. Shestakov}, year={2017}, url={https://api.semanticscholar.org/CorpusID:33088072}}
  • L. Bokut, E. I. Zelmanov, I. P. Shestakov
  • Published 2017
  • Mathematics

The problem of modelling (reconstruction) of inputs in parabolic systems is considered. The solving algorithms are suggested. These algorithms are stable with respect to the informati­ onal noises and the measurement disturbances. General constructions are applied to the prob­ lem of simulation of groundwater contamination process. In this case the problem of model­ ling of varying intensities of pollutant sources is investigated

2 Citations

Background Citations

1

Figures and Tables from this paper

  • figure 1
  • table 1
  • figure 2
  • figure 3

2 Citations

Algorithmic Foundations of Economic and Mathematical Modeling of Network Logistics Processes
    S. BarykinI. KapustinaS. SergeevV. Yadykin

    Economics, Mathematics

    Journal of Open Innovation: Technology, Market…

  • 2020

Using a set of formalisms, a mathematical model has been developed, which will make it possible to search for optimal solutions based on the criterion of economic efficiency and will find application not only in transport problems but also in many industries and economic activities.

  • 40
  • PDF
Effect of annealing on chemically deposited Cu2Se thin films
    Melda FrancisA. KuruvillaLakshmi M

    Materials Science, Chemistry

    Materials Chemistry and Physics

  • 2022
  • 2

725 References

Differential Fault Analysis of Rabbit
    Aleksandar KircanskiA. Youssef

    Computer Science

    Selected Areas in Cryptography

  • 2009

This paper presents a practical fault analysis attack on Rabbit, a high speed scalable stream cipher with 128-bit key and a 64-bit initialization vector, in which the attacker is assumed to be able to fault a random bit of the internal state of the cipher but cannot control the exact location of injected faults.

  • 27
  • PDF
Fault Analysis Study of IDEA
    Christophe ClavierBenedikt GierlichsI. Verbauwhede

    Computer Science

    CT-RSA

  • 2008

A study of several fault attacks against the block cipher IDEA, which is the first Differential Fault Analysis of IDEA to the best of the authors' knowledge, recovers 93 out of 128 key bits exploiting about only 10 faults.

  • 44
  • PDF
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD
    G. PiretJ. Quisquater

    Computer Science

    CHES

  • 2003

The differential fault attack technique is able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES.

  • 623
  • Highly Influential
  • PDF
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering
    Xin-jie ZhaoShize Guo Dawu Gu

    Computer Science, Mathematics

    2014 Workshop on Fault Diagnosis and Tolerance in…

  • 2014

The security of GOST against side-channel attacks is examined with algebraic fault analysis (AFA), which combines the algebraic cryptanalysis with the fault attack and proves that keeping some components in a cipher secret cannot guarantee its security against fault attacks.

  • 13
  • PDF
Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis
    Christophe ClavierAntoine Wurcker

    Computer Science

    2013 Workshop on Fault Diagnosis and Tolerance in…

  • 2013

This paper proposes a chosen plaintext FIRE attack based on ineffective fault analysis (IFA) in the "byte stuck at 0" fault model and describes a step-by-step procedure that recovers the AES-like secret parameters without requiring the knowledge of the encryption key.

  • 23
DFA on AES
    Christophe Giraud

    Computer Science

    AES Conference

  • 2003

Two different DFA attacks on the AES are described: the first uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128, and the second uses a more realistic fault model, which assumes that a whole byte may be induced.

  • 361
  • PDF
A Single-Key Attack on the Full GOST Block Cipher
    Takanori Isobe

    Computer Science

    Journal of Cryptology

  • 2012

This paper shows the first single-key attack, which works for all key classes, on the full GOST block cipher, using a new attack framework called Reflection-Meet-in-the-Middle Attack and uses additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds.

  • 116
  • PDF
Differential Fault Analysis of Secret Key Cryptosystems
    E. BihamA. Shamir

    Computer Science, Mathematics

    CRYPTO

  • 1997

This work states that this attack is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES).

  • 1,694
  • PDF
Improved Attacks on Full GOST
    Itai DinurO. DunkelmanA. Shamir

    Computer Science

    IACR Cryptol. ePrint Arch.

  • 2011

A new fixed point property is introduced and a better way to attack 8-round GOST in order to find improved attacks on full GOST, which can be reduced from an impractical 264 to a practical 236 without changing the 2224 time complexity.

  • 71
  • PDF
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
    Michael TunstallDebdeep MukhopadhyaySubidh Ali

    Computer Science

    WISTP

  • 2009

A differential fault attack that can be applied to the AES using a single fault, which demonstrates that when a single random byte fault is induced at the input of the eighth round, the AES key can be deduced using a two stage algorithm.

  • 353
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    Figure 1 from Math-Net.Ru All Russian mathematical portal | Semantic Scholar (5)

    Fig. 1. Four estimators t(x) of в when x ~ N(9, 1).

    Published in 2017

    Math-Net.Ru All Russian mathematical portal

    L. BokutE. I. Zelmanov I. P. Shestakov

    Figure 1 of 4

    Figure 1 from Math-Net.Ru All Russian mathematical portal | Semantic Scholar (2024)

    References

    Top Articles
    Latest Posts
    Article information

    Author: Rob Wisoky

    Last Updated:

    Views: 5634

    Rating: 4.8 / 5 (68 voted)

    Reviews: 83% of readers found this page helpful

    Author information

    Name: Rob Wisoky

    Birthday: 1994-09-30

    Address: 5789 Michel Vista, West Domenic, OR 80464-9452

    Phone: +97313824072371

    Job: Education Orchestrator

    Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

    Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.