Introduction. Asymmetric ciphers. Online Trusted Third Party (TTP) Online Trusted Third Party (TTP)
|
|
- Coleen Nash
- 5 years ago
- Views:
Transcription
1 Intoduction Asymmetic ciphes Myto Aapinis School of Infomatics Univesity of Edinugh Januay 29, 2015 So fa: how two uses can potect data using a shaed secet key One shaed secet key pe pai of uses that want to communicate Ou goal now: how to estalish a shaed secet key to egin with? Tusted Thid Paty (TTP) Diffie-Hellman (DH) potocol RSA ElGamal (EG) 1 / 36 2 / 36 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol k AS k BS k AS, k BS k AS k BS k AS, k BS new N A A, N A 3 / 36 4 / 36
2 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol k AS k BS k AS, k BS k AS k BS k AS, k BS new N A A, N A new N A A, N A new N B new N B B, N B,{A, N A } k BS B, N B,{A, N A } k BS N B,{B, k AB, N A } k AS, {A,B, k AB, N B } k BS new k AB 5 / 36 6 / 36 Online Tusted Thid Paty (TTP) Uses U 1, U 2, U 3,..., U n,... Each use U i has a shaed secet key K i with the TTP ex: using Paulson s vaiant of the Yahalom potocol Pulic-key encyption in pictues k AS k BS k AS, k BS new N A A, N A new N B B, N B,{A, N A } k BS N B,{B, k AB, N A } k AS, {A,B, k AB, N B } k BS new k AB {A,B, k AB, N B } k BS, {NB} k AB Question: can we estalish a shaed secet key without a TTP? Answe: Yes! 7 / 36 8 / 36
3 Pulic-key encyption in pictues Pulic-key encyption in pictues Fom : I want to send you a secet Fom : I want to send you a secet 9 / 36 Pulic-key encyption in pictues 10 / 36 Pulic-key encyption in pictues Fom : I want to send you a secet Fom : I want to send you a secet 11 / / 36
4 Pulic-key encyption in pictues Fom : I want to send you a secet Pulic-key encyption key geneation algoithm: G : K K encyption algoithm E : K M C decyption algoithm D : K C M st. (sk, pk) G, and m M, D(sk, E(pk, m)) = m E D m c c m pk sk the decyption key sk is secet (only known to ). The encyption key pk is known to eveyone. And sk pk 13 / / 36 Pimes We need a it of nume theoy now Definition p N is a pime if its only divisos ae 1 and p Ex: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29 Theoem Evey n N has a unique factoization as a poduct of pime numes (which ae called its factos) Ex: = / / 36
5 Relative pimes Z n Let n N. We define Z n = {0,... n-1} Definition a and in Z ae elative pimes if they have no common factos a Z, Z n, a (mod n) k N. a = + k n Definition The Eule function φ(n) is the nume of elements that ae elative pimes with n: φ(n) = {m gcd(m, n) = 1} Fo p pime: φ(p) = {1,..., p-1} Fo p and q pimes: φ(p q) = (p-1)(q-1) Modula invesion: the invese of x Z n is y Z n s.t. x y 1 (mod n). We denote x -1 the invese of x mod n Ex: 7-1 in Z 12 : in Z 12 : 4 has no invese in Z 12 Theoem a Z, Z n, a (mod n) k N. a = + k n Let n N. Let x Z n. x has a invese in Z n iff gcd(x, n) = 1 17 / / 36 (Z N ) Let n N. We define (Z n ) = {x Z n gcd(x, n) = 1} Ex: Z 12 = {1, 5, 7, 11} Theoem (Eule) n N, x (Z n ), x φ(n) 1 (mod n) Theoem (Eule) p pime, (Z p ) is a cyclic goup, i.e. g (Z p ), {g, g 2, g 3,..., g p 2 } = (Z p ) Intactale polems Factoing: input: n N output: p 1,..., p m pimes st. n = p 1 p m RSAP input: n st. n = p q with 2 p, q pimes e st. gcd(e, φ(n)) = 1 m e output: m Discete Log: input: pime p, geneato g of (Z p ), g x output: x DHP: input: pime p, geneato g of (Z p ), g a (mod p), g (mod p) output: g a (mod p) 19 / / 36
6 The Diffie-Hellman (DH) potocol We can now go ack and see how to estalish a key without a TTP Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a 21 / / 36 The Diffie-Hellman (DH) potocol The Diffie-Hellman (DH) potocol Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a, g (mod p) a, g (mod p), g a (mod p) 23 / / 36
7 The Diffie-Hellman (DH) potocol Assumption: the DHP is had in (Z p ) Fix a vey lage pime p, and g {1,..., p-1} a, g (mod p) a A*acke, g a (mod p) k AB = (g ) a [mod p] = g a (mod p) k AB = (g a ) [mod p] = g a (mod p) 25 / / 36 a A*acke, g (mod p) a A*acke, g (mod p), g (mod p) 27 / / 36
8 a, g (mod p) A+acke, g (mod p) a, g (mod p) A*acke, g (mod p) æ, g a (mod p), g a (mod p), g (mod p) 29 / / 36 a, g (mod p), g a (mod p) A*acke, g (mod p), g (mod p) k AB = g (mod p) k B = (g ) = g k AB = g a (mod p) k A = (g ) = g 31 / 36 RSA tapdoo pemutation G RSA () = (pk, sk) whee pk = (N, e) and sk = (N, d) and N = p q with p, q andom pimes and e, d Z st. e d 1 (mod φ(n)) M = C = (Z N ) RSA(pk, x) = x e (mod N) whee pk = (N, e) RSA -1 (sk, x) = x d (mod N) whee sk = (N, d) Consistency: (pk, sk) = G RSA (), x, RSA -1 (sk, RSA(pk, x)) = x Poof: Let pk = (N, e) and sk = (N, d) RSA -1 (sk, RSA(pk, x)) = (x e ) d (mod N) = x e d (mod N) = x 1+kφ(N) (mod N) = x x kφ(n) (mod N) = x (x φ(n) ) k (mod N) Eule = x (mod N) 32 / 36
9 How NOT to use RSA ISO standad Goal: uild a CPA secue asymmetic ciphe using (G RSA, RSA, RSA -1 ) (G RSA, RSA, RSA -1 ) is called aw RSA. Do not use aw RSAdiectly as an asymmetic ciphe! RSA is deteministic not secue against chosen plaintext attacks (Details on the oad) Let (E s, D s ) e a symmetic encyption scheme ove (M, C, K) Let H : (Z N ) K Build (G RSA, E RSA, D RSA ) as follows G RSA () as descied aove E RSA (pk, m): pick andom x (Z N ) y RSA(pk, x)(= x e ) k H(x) ERSA (pk, m) = y E s (k, m) D RSA (pk, y c) = D s (H(RSA -1 (sk, y)), c) 33 / / 36 PKCS1 v2.0: RSA-OAEP Goal: uild a CPA secue asymmetic ciphe using (G RSA, RSA, RSA -1 ) ElGamal (EG) Fix pime p, and geneato g (Z p ) M = {0,..., p-1} and C = M M m and G EG () = (pk, sk) whee pk = g d (mod p) and sk = d and d {1,..., p-2} + H E EG (pk, x) = (g (mod p), m (g d ) (mod p)) whee pk = g d (mod p) and Z G + D EG (sk, x) = e -d c (mod p) whee x = (e, c) Consistency: (pk, sk) = G EG (), x, D EG (sk, E EG (pk, x)) = x Poof: Let pk = g d (mod p) and sk = d Plaintext to encypt with RSA {0,1} N-1 D EG (sk, E EG (pk, x)) = (g ) -d m (g d ) (mod p) = m (mod p) 35 / / 36
L29&30 - RSA Cryptography
L29&30 - RSA Cryptography CSci/Math 2112 20&22 July 2015 1 / 13 Notation We write a mod n for the integer b such that 0 b < n and a b (mod n). 2 / 13 Calculating Large Powers Modulo n Example 1 What is
More informationData security (Cryptography) exercise book
University of Debrecen Faculty of Informatics Data security (Cryptography) exercise book 1 Contents 1 RSA 4 1.1 RSA in general.................................. 4 1.2 RSA background.................................
More informationGRADE 6 FLORIDA. Division WORKSHEETS
GRADE 6 FLORIDA Division WORKSHEETS Mental division stategies invese opeations As we know, multiplication and division ae invese opeations. 8 9 = 7 This means they do the evese of each othe: 7 9 = 8 We
More informationIntroduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic
More information10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be:
MATH 0(001 Fall 2018 Homewok 2 Solutions Please infom you instucto if you find any eos in the solutions 1 Suppose that thee ae duck huntes, each with a pefect shot A flock of ducks fly ove, and each hunte
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 5: Cryptographic Algorithms Common Encryption Algorithms RSA
More informationChannel Modelling ETIM10. Fading Statistical description of the wireless channel
Channel Modelling ETIM10 Lectue no: 3 Fading Statistical desciption of the wieless channel Ghassan Dahman \ Fedik Tufvesson Depatment of Electical and Infomation Technology Lund Univesity, Sweden 013-01-8
More informationChapter 4 Integers and Number Theory
Chapte 4 Answes 15 Chapte 4 Intees and Nume Theo Suestions: Althouh it is possile to daw pictues fo the models used in the followin activities, encouae students to use two diffeent coloed squaes to epesent
More informationAnalysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n
meican Intenational Jounal of Reseach in Fomal, pplied & Natual Sciences vailable online at http://www.iasi.net ISSN (Pint): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 IJRFNS is a efeeed,
More informationIEEE Broadband Wireless Access Working Group < Modifications to the Feedback Methodologies in UL Sounding
Poject Title Date Submitted IEEE 802.16 Boadband Wieless Access Woking Goup Modifications to the Feedback Methodologies in UL Sounding 2008-01-14 Souce(s) Fed Vook, Jeff Zhuang,
More informationParameterized Complexity of Connected Even/Odd Subgraph Problems
Paameteized Complexity of Connected Even/Odd Subgaph Poblems Fedo V. Fomin 1 and Pet A. Golovach 2 1 Depatment of Infomatics, Univesity of Begen PB 7803, 5020 Begen, Noway fedo.fomin@ii.uib.no 2 School
More informationCHAPTER 2. Modular Arithmetic
CHAPTER 2 Modular Arithmetic In studying the integers we have seen that is useful to write a = qb + r. Often we can solve problems by considering only the remainder, r. This throws away some of the information,
More informationElGamal Public-Key Encryption and Signature
ElGamal Public-Key Encryption and Signature Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 10 ElGamal Cryptosystem and Signature Scheme Taher ElGamal, originally from Egypt,
More informationFoundations of Cryptography
Foundations of Cryptography Ville Junnila viljun@utu.fi Department of Mathematics and Statistics University of Turku 2015 Ville Junnila viljun@utu.fi Lecture 10 1 of 17 The order of a number (mod n) Definition
More informationDES Data Encryption standard
DES Data Encryption standard DES was developed by IBM as a modification of an earlier system Lucifer DES was adopted as a standard in 1977 Was replaced only in 2001 with AES (Advanced Encryption Standard)
More informationVariance? which variance? R squared effect size measures in simple mediation models
Vaiance? which vaiance? squaed effect size measues in simple mediation models M This is it? med di X de Heus, P. (01). squaed effect size measues and ovelap between diect and indiect effect in mediation
More informationDiscussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic
Discussion #7 Example Poblem This poblem illustates how Fouie seies ae helpful tools fo analyzing electonic cicuits. Often in electonic cicuits we need sinusoids of vaious fequencies But we may aleady
More informationEE 418: Network Security and Cryptography
EE 418: Network Security and Cryptography Homework 3 Solutions Assigned: Wednesday, November 2, 2016, Due: Thursday, November 10, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University
More informationDiffie-Hellman key-exchange protocol
Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users
More informationCCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02
CCSDS Coding&Synchonization Woking Goup Mach 2008 1 Washington DC, USA DVB-S2 like fame constuction and LDPC codes ate o/and size extension fo use of Vaiable Coding & Modulation suitable fo X and Ka bands
More information1 Trigonometric Functions
Tigonometic Functions. Geomet: Cicles and Radians cicumf. = π θ Aea = π An angle of adian is defined to be the angle which makes an ac on the cicle of length. Thus, thee ae π adians in a cicle, so π ad
More informationSteve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline
Steve Alpen, Thomas Lidbette, Alec Moton, and Kateina Papadaki Patolling a pipeline Book section Oiginal citation: Oiginally published in Alpen, Steven, Lidbette, Thomas, Moton, Alec and Papadaki, Kateina
More informationEfficient Power Control for Broadcast in Wireless Communication Systems
Efficient Powe Contol fo Boadcast in Wieless Communication Systems A. T. Chonopoulos Compute Science Depatment Univesity of Texas at San Antonio San Antonio, TX Email:atc@cs.utsa.edu P. Cotae Depatment
More informationPublic-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh
Public-Key Cryptosystem Based on Composite Degree Residuosity Classes aka Paillier Cryptosystem Harmeet Singh Harmeet Singh Winter 2018 1 / 26 Background s Background Foundation of public-key encryption
More informationMultiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios
Sensos & Tansduces 204 by IFSA Publishing, S L http://wwwsensospotalcom Multiagent Reinfocement Leaning Dynamic Spectum Access in Cognitive Radios Wu Chun, 2 Yin Mingyong, 2 Ma Shaoliang, Jiang Hong School
More informationReal-time Self Compensating AC/DC Digitally Controlled Power Supply
Real-time Self Compensating AC/DC Digitally Contolled Powe Supply Dave Feeman, Mak Hagen Texas Instuments Digital Powe Goup Digital Contol Poblem: Detemining optimal loop compensation given uncetainties
More informationOptimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang
Optimal Stategies in Jamming Resistant Uncoodinated Fequency Hopping Systems by Bingwen Zhang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in patial fulfillment of the equiements
More informationCryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1
Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption
More informationOn Local-Time Dependent Deviations in the Ionospheric Density Profiles Retrieved From the Radio Occultation Dada
On Local-Time Dependent Deviations in the Ionospheic Density Pofiles Retieved Fom the Radio Occultation Dada S.-Y. Su 1, S. Tulasi Ram,3, and C. H. Liu 1. National Cental Univesity, Chung-Li, Taiwan..
More informationStatement of Works Data Template Version: 4.0 Date:
Statement of Woks Data Template Vesion: 4.0 Date: 16.08.17 This Statement of Woks (SoW) Data Template is to be completed by Distibution Netwok Opeatos (DNOs) in ode to povide National Gid the equied data
More informationDiscrepancies Between Euclidean and Spherical Trigonometry. David Eigen
Discepancies Between Euclidean and Spheical Tigonomety David Eigen 1 Non-Euclidean geomety is geomety that is not based on the postulates of Euclidean geomety. The five postulates of Euclidean geomety
More information4 Trigonometric and Inverse Trigonometric Functions
MATH983/954 Mathematics 0C/C. Geneal infomation fo the academic yea 0-03: Lectue: D Theodoe Voonov, Room.09, School of Mathematics, Alan Tuing Building, email: theodoe.voonov@mancheste.ac.uk. Lectues:
More information1 Performance and Cost
Pefomance and Cost Analysis and Reseach of Ai-Cooled Using Small Diamete Coppe Tubes Wu Yang, Li Changsheng and Deng Bin Abstact Replacing coppe tubes with aluminum tubes and using coppe tubes with smalle
More informationPublic Key Encryption
Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,
More information5.2 Trigonometric Ratios of Any Angle
5. Tigonometic Ratios of An Angle The use of canes to lift heav objects is an essential pat of the constuction and shipping industies. Thee ae man diffeent designs of cane, but the usuall include some
More informationECEN326: Electronic Circuits Fall 2017
ECEN36: Electonic Cicuits Fall 07 Lectue 4: Cascode Stages and Cuent Mios Sam Palemo Analog & Mixed-Signal Cente Texas A&M Univesity Announcements HW3 due 0/4 Exam 0/9 9:0-0:0 (0 exta minutes) Closed book
More informationwhere and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis.
function whee is an unknown constant epesents fo the un-modeled dynamics The pape investigates the position contol of electical moto dives that can be configued as stuctue of Fig 1 This poblem is fomulated
More informationTriple Crown Advantage:
Aeoquip Tiple Cown Advantage Hose Poducts GH120 GH663 GH781 GH793 GH493 FC254 Tiple Cown Advantage: Highe Pessues Impoved Tempeatues Impoved Abasion Resistance Raise You Standads with Eaton s Aeoquip MatchMate
More informationAlgorithmic Number Theory and Cryptography (CS 303)
Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson 1 Introduction Objective: To understand what a public key cryptosystem is and
More informationA multichannel Satellite Scheduling Algorithm
A multichannel Satellite Scheduling Algoithm J.S. Gilmoe and R. Wolhute Depatment of Electonic Engineeing Univesity of Stellenbosch 7600 Stellenbosch, South Afica Email: jgilmoe@dsp.sun.ac.za, wolhute@sun.ac.za
More informationABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1
Phase econstuction stategies in phase-locking system based on multi-apetue wave font sensos P.A. Semenov, S.D. Pol skikh Shvabe-Reseach, Moscow, Russian Fedeation; e-mail: pite@bk.u ABSTRACTT System of
More informationISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SIMULATION COMPARISONS OF INDUCTION MOTOR DRIVE WITH ESTIMATOR AND PLL V. Nasi Reddy *, S. Kishnajuna Rao*, S.Nagenda Kuma * Assistant
More informationAlgorithmic Number Theory and Cryptography (CS 303)
Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic Jeremy R. Johnson 1 Introduction Objective: To become familiar with modular arithmetic and some key algorithmic constructions that
More informationThe Mean and Variance of the Numbers of r-pronged Nodes and r-caterpillars in Yule-Generated Genealogical
Annals of Combinatoics 10 (2006 129-146 0218-0006/06/010129-18 DOI 10.1007/s00026-006-0278-6 c Bikhäuse Velag, Basel, 2006 Annals of Combinatoics The Mean and Vaiance of the Numbes of -Ponged Nodes and
More informationPrimitive Roots. Chapter Orders and Primitive Roots
Chapter 5 Primitive Roots The name primitive root applies to a number a whose powers can be used to represent a reduced residue system modulo n. Primitive roots are therefore generators in that sense,
More informationTECHNICAL DATA. JIS (Japanese Industrial Standard) Screw Thread. Specifications
JIS (Japanese Industial Standad) Scew Thead Specifications TECNICAL DATA Note: Although these specifications ae based on JIS they also apply to and DIN s. Some comments added by Mayland Metics Coutesy
More informationTHE UNIVERSITY OF NEW SOUTH WALES. School of Electrical Engineering & Telecommunications
THE UNIESITY OF NEW SOUTH WAES School of Electical Engineeing & Telecommunications EE97 POWE EETONIS FO ENEWABE AND DISTIBUTED GENEATION EXAMINATION Session (Supplementay Exam) TIME AOWED: 3 hous TOTA
More informationOptic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing
08 5th Intenational Confeence on Electical & Electonics Engineeing and Compute Science (ICEEECS 08) Optic Cable Tacking and Positioning Method Based on Distibuted Optical Fibe Vibation Sensing Zhang Chao,
More informationInternet Engineering Task Force (IETF) ISSN: May 2013
Internet Engineering Task Force (IETF) J. Schaad Request for Comments: 6955 Soaring Hawk Consulting Obsoletes: 2875 H. Prafullchandra Category: Standards Track HyTrust, Inc. ISSN: 2070-1721 May 2013 Abstract
More informationSpectrum Sharing between Public Safety and Commercial Users in 4G-LTE
1 Spectum Shaing between Public Safety and Commecial Uses in 4G-LTE Haya Shajaiah, Ahmed Abdel-Hadi and Chales Clancy Badley Depatment of Electical and Compute Engineeing Viginia Tech, Alington, VA, 22203,
More informationAnalysis of influence of the ionosphere onto GNSS positioning. WP 4.4 Real Time positioning related issues
WP 4.4 Real Time poitioning elated iue Kinga Wezka (ESR8) Techniche Univeitat Belin Depatment fo Geodey and Geoinfomation Science Nottingham 20-21. Mach, 2012 Intoduction abolute poitioning elative poitioning
More informationSTACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM
H PRASHANTHA KUMAR et. al.: STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM DOI:.297/ijct.22.69 STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL
More informationMicrowave Finite Element Modeling Applications to Coupled Electromagnetic-Thermal Problems and Characterization of Dielectric Materials
Micowave Finite Element Modeling Applications to Coupled Electomagnetic-Themal Poblems and Chaacteization of Dielectic Mateials Hulusi Acikgoz, Yann Le Bihan, Olivie Meye, and Lionel Pichon Laboatoie de
More information2D Coding for Future Perpendicular and Probe Recording
2D Coding fo Futue Pependicula and Pobe Recoding Joseph A. O Sullivan Naveen Singla Ronald S. Indec Washington Univesity Saint Louis, Missoui s Outline: 2D Coding fo 2D ISI Motivation: 2D Intesymbol Intefeence
More information6.1 Reciprocal, Quotient, and Pythagorean Identities
Chapte 6 Tigonometic Identities 1 6.1 Recipocal, Quotient, and Pthagoean Identities Wam-up Wite each epession with a common denominato. Detemine the estictions. a c a a) b d b) b c d c) a 1 c b c b a Definition
More informationSecurity in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Secuity in Distibuted Stoage Systems by Communicating a Logaithmic Numbe of Bits Theodoos K. Dikaliotis Depatment of lectical ngineeing Alexandos G. Dimakis Depatment of lectical ngineeing Tacey Ho Depatment
More informationCryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017
Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators
More informationAssignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp
* Dynamic Memoy *Big O Notation*Stacks *Exteme Pogamming*Selection Sot*Insetion Sot*Watefall Model Sting*Aays*AayList*Client Seve*Atificial Intelligence*Inheitance*Files*Video Games*Shot cicuit evaluation*
More informationICAN meeting, Palaiseau, 11/10/2012 Some temporal aspects of Passive cavity-dumped enhancement for ICAN
ICAN meeting, Palaiseau, // Some tempoal aspects of Passive ity-dumped enhancement fo ICAN Laboatoie Chales Faby, Institut d Optique, Palaiseau Passive ity-dumped enhancement pinciple Repetition ate convete
More informationSmall Loop Antenna and Duality Theorem
Small Loop Antenna and Duality Theoem Page 1 Small Loop Antenna and Duality Theoem Having studied the ideal electic dipole we now tun ou attention to an inteesting antenna closely elated to the electic
More informationTiling Layouts with Dominoes
+, 16th Canadian Confeence on Computational Geomety, 2004 Tiling Layouts with Dominoes Mak Watson Chis Woman c 1 We exploe the complexity of tiling finite subsets of the plane, which we call layouts, with
More informationFreeSpace ZA 2120-HZA Zone Amplifier
Poduct Desciption The Bose zone amplifie is designed to povide basic amplification and sound system expansion when using font-end Bose poducts such as FeeSpace integated zone amplifies and ContolSpace
More informationERROR ESTIMATIONS IN CYLINDRICAL NEAR FIELD SYSTEM FOR LARGE RADAR ANTENNAS
ERROR ESTIMATIONS IN CYLINDRICAL NEAR FIELD SYSTEM FOR LARGE RADAR ANTENNAS S. Bugos (), F. Matín (), M. Siea-Castañe () and J.L.Besada () () Gupo de Radiación. Dpto. de Señales, Sistemas y Radiocomunicaciones.
More informationAnalysis of a Fractal Microstrip Patch Antenna
124 Analysis of a Factal Micostip Patch Antenna Vibha Rani Gupta and Nisha Gupta* Bila Institute of Technology, Mesa, Ranchi-835215, Jhakhand, India. vgupta@bitmesa.ac.in, ngupta@bitmesa.ac.in Abstact-
More informationThe number theory behind cryptography
The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?
More informationTECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University
TECHNICAL REPORT: CVEL-13-053 Maximum Radiated Emission Calculato: Powe Bus EMI Algoithm Chentian Zhu and D. Todd Hubing Clemson Univesity Octobe 12, 2013 Abstact The Maximum Radiated Electomagnetic Emissions
More informationAMERICAN NATIONAL STANDARD
ENGINEERING COMMITTEE Inteface Pactices Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 48-1 2015 Test Method fo Measuing Shielding Effectiveness of Passive and Active Devices Using a GTEM Cell NOTICE
More informationCyclic Constellation Mapping Method for PAPR Reduction in OFDM system
2013 8th Intenational Confeence on Communications and Netwoking in China (CHINACOM) Cyclic Constellation Mapping Method fo PAPR Reduction in OFDM system Yong Cheng, Jianhua Ge, Jun Hou, and Fengkui Gong
More informationSchool of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007
School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 1 Due on Nov. 8, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes. ii)
More informationDerangements. Brian Conrey and Tom Davis and March 23, 2000
Deangements Bian Coney and Tom Davis coney@aimath.og and tomdavis@eathlink.net http://www.geomete.og/mathcicles Mach 23, 2000 Seating Mixup Imagine that Yankee Stadium is completely sold out, but when
More informationA Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels
A Tansmission Scheme fo Continuous ARQ Potocols ove Undewate Acoustic Channels Mingsheng Gao 1, Wee-Seng Soh 1 and Meixia Tao 2 1 Dept. of Electical & Compute Engineeing, National Univesity of Singapoe,
More informationChapter 5: Trigonometric Functions of Angles
Chapte 5: Tigonometic Functions of Angles In the pevious chaptes we have exploed a vaiety of functions which could be combined to fom a vaiety of shapes. In this discussion, one common shape has been missing:
More informationAssignment 2. Due: Monday Oct. 15, :59pm
Introduction To Discrete Math Due: Monday Oct. 15, 2012. 11:59pm Assignment 2 Instructor: Mohamed Omar Math 6a For all problems on assignments, you are allowed to use the textbook, class notes, and other
More informationNumber Theory/Cryptography (part 1 of CSC 282)
Number Theory/Cryptography (part 1 of CSC 282) http://www.cs.rochester.edu/~stefanko/teaching/11cs282 1 Schedule The homework is due Sep 8 Graded homework will be available at noon Sep 9, noon. EXAM #1
More informationTheoretical Analysis of the Multi-agent Patrolling Problem
Theoetical Analysis of the Multi-agent Patolling Poblem Yann Chevaleye Lamsade - univesity pais 9, place du Machal de Latte de Tassigny 75775 PARIS CEDEX 16 yann.chevaleye@lamsade.dauphine.f Abstact A
More informationDistributed Spectrum Allocation via Local Bargaining
Distibuted Spectum Allocation via Local Bagaining Lili Cao Shanghai Jiaotong Univesity, Shanghai, P.R. China Email: cao li li@yahoo.com Haitao Zheng Micosoft Reseach Asia, Beijing, P.R. China Email: htzheng@ieee.og
More informationDTTF/NB479: Dszquphsbqiz Day 30
DTTF/NB479: Dszquphsbqiz Day 30 Announcements: Questions? This week: Digital signatures, DSA Coin flipping over the phone RSA Signatures allow you to recover the message from the signature; ElGamal signatures
More informationThe phenomenon of incoherent signal interference
The phenomenon of incoheent signal intefeence.. Goshenkov #, Y.N. Klikushin #, K.T. Koshekov *3 # Depatment "Technology of electonics", Omsk tate Technical Univesity, OmGTU, Omsk, Russia goshenkov@omgtu.u
More informationStudy and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna
, pp.236-243 http://dx.doi.og/10.14257/astl.2017.147.33 Study and Design of Dual Fequency High Gain and Confomal Micostip Patch Antenna S. Auna 1, K. Sinivasa Naik 2, J. Ramesh 2 and D. Madhu 2 1 Andha
More informationAntenna fundamentals: With answers to questions and problems (See also Chapter 9 in the textbook.)
adio Technology Metopolia/A. Koivumäki Antenna fundamentals: With answes to questions and poblems (See also Chapte 9 in the textbook.) 1. a) Make up a definition fo the tem "antenna". Answe: One definition:
More informationDevelopment of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage
Moden Envionmental Science and Engineeing (ISSN 333-58) July 07, Volume 3, No. 7, pp. 505-509 Doi: 0.534/mese(333-58)/07.03.07/0 Academic Sta Publishing Company, 07 www.academicsta.us Development of Coona
More informationOptimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems
Optimal Design of Smat Mobile Teminal Antennas fo Wieless Communication and Computing Systems Autho Lu, Junwei, Yang, Shiyou Published 2007 Confeence Title 2007 4th Intenational Symposium on Electomagnetic
More informationLow-Complexity Time-Domain SNR Estimation for OFDM Systems
Low-Complexity Time-Domain SR Estimation fo OFDM Systems A. jaz, A.B. Awoseyila and B.G. Evans A low-complexity SR estimation algoithm fo OFDM systems in fequency-selective fading channels is poposed.
More informationMetal face seals product listings
poduct listings Undestanding key tale elements Designed to e use-fiendly, CR Seals and poduct listings convey a good deal of infomation on evey line. As you familiaize youself with the tales, keep these
More informationLocalization Algorithm for a mobile robot using igs
Poceedings of the 17th Wold Congess The Intenational Fedeation of Automatic Contol Seoul, Koea, July 6-11, 008 Localization Algoithm fo a mobile obot using igs DaeGeun Seo *, JangMyung Lee** * Electical
More informationJournal of Applied Science and Agriculture
Jounal of Applied Science and Agicultue, 9(16) Octobe 214, Pages: 1-15 AENSI Jounals Jounal of Applied Science and Agicultue ISSN 1816-9112 Jounal home page: www.aensiweb.com/jasa A Design of New Bluetooth
More informationVoltage Control of a 12/8 Pole Switched Reluctance Generator Using Fuzzy Logic
Intenational Jounal of Moden Nonlinea Theoy and Application, 22,, 7-2 http://dx.doi.og/.4236/ijmnta.22.36 Published Online Septembe 22 (http://www.scirp.og/jounal/ijmnta) Voltage ontol of a 2/8 Pole Switched
More informationSequential Aggregate Signatures from Trapdoor Permutations
Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya Silvio Micali Leonid Reyzin Hovav Shacham Abstract An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and
More informationSignal Extraction Technology
Extaction Technology Intoduction Masimo SET pulse oximety is a new and fundamentally distinct method of acquiing, pocessing and epoting ateial oxygen satuation and pulse ate. As illustated below, Masimo
More informationRealistic Simulation of a Wireless Signal Propagation in an Urban Environment
Realistic Simulation of a Wieless Signal Popagation in an Uban Envionment Keyukuma J. Patel Univesity of Southen Queensland Toowoomba, Austalia e-mail: keyupatel@ieee.og Andew Y. J. Lee Nanyang Technological
More informationRSA hybrid encryption schemes
RSA hybrid encryption schemes Louis Granboulan École Normale Supérieure Louis.Granboulan@ens.fr Abstract. This document compares the two published RSA-based hybrid encryption schemes having linear reduction
More informationFlexible PVDF comb transducers for excitation of axisymmetric guided waves in pipe
Sensos and Actuatos A 100 (2002) 18 23 Flexible PVDF comb tansduces fo excitation of axisymmetic guided waves in pipe Thomas R. Hay *, Joseph L. Rose ESM Depatment, Pennsylvania State Univesity, 212 EES
More informationδ =0.586 Average number of nearest signal points (NN): 0.5 NN: 1.5 δ =2.000
IEICE TRANS. FUNDAMENTALS, VOL. E{A, NO. JANUARY 999 PAPER Regula pape Tadeos between Eo Pefomance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding Motohiko
More informationA. Ebadi*, M. Mirzaie* and S. A. Gholamian*
A Compaison Between Electical Cicuit and Finite Element Modeling Methods fo Pefomance Analysis of a Thee-Phase nduction Moto unde oltage Unbalance A. Ebadi*, M. Mizaie* and S. A. Gholamian* Abstact: nduction
More informationAnalysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design
Jounal of lectomagnetic Analysis and Applications, 01, 4, 35-4 http://dx.doi.og/10.436/jemaa.01.46033 Published Online June 01 (http://www.scirp.og/jounal/jemaa) 35 Analysis of the Radiation Resistance
More informationRandomized Self-Assembly for Exact Shapes
Randomized Self-Assembly fo Exact Shapes David Doty Depatment of Compute Science Iowa State Univesity Ames, IA 500, USA ddoty@iastate.edu Abstact Woking in Winfee s abstact tile assembly model, we show
More informationExercise 1 (MC Question)
D J Tani -9- Contol Systems II (Sping 8 Solution Execise Set 9 Linea Quadatic Regulato Gioele Zadini, gzadini@ethzch, 7th May 8 Execise (MC Question (I-D, (II-A, (III-C, (IV-B (I-C, (II-A, (III-D, (IV-B
More informationOverlapping community detection in signed networks
Ovelapping community detection in signed netwoks Yi Chen 1 Xiao-long Wang 1, 2 Bo Yuan 1 1 (Depatment of Compute Science and Technology, Shenzhen Gaduate School, Habin Institute of Technology, Shenzhen
More informationThe Periodic Ambiguity Function Its Validity and Value
The Peiodic Ambiguity Function Its Validity and Value Nadav Levanon Dept. of Electical Engineeing Systems Tel Aviv Univesity Tel Aviv, Isael nadav@eng.tau.ac.il Abstact The peiodic ambiguity function (PAF)
More informationA Lifting Algorithm for Output-only Continuous Scan Laser Doppler Vibrometry
53d AIAA/ASME/ASCE/AHS/ASC Stuctues Stuctual Dynamics and Mateials Confeence2th AI 23-26 Apil 22 Honolulu Hawaii AIAA 22- A Lifting Algoithm fo Output-only Continuous Scan Lase Dopple Vibomety Shifei
More information