689 research outputs found

    On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees

    Full text link
    In the literature, few constructions of nn-variable rotation symmetric bent functions have been presented, which either have restriction on nn or have algebraic degree no more than 44. In this paper, for any even integer n=2m≥2n=2m\ge2, a first systemic construction of nn-variable rotation symmetric bent functions, with any possible algebraic degrees ranging from 22 to mm, is proposed

    Systematic Constructions of Bent-Negabent Functions, 2-Rotation Symmetric Bent-Negabent Functions and Their Duals

    Full text link
    Bent-negabent functions have many important properties for their application in cryptography since they have the flat absolute spectrum under the both Walsh-Hadamard transform and nega-Hadamard transform. In this paper, we present four new systematic constructions of bent-negabent functions on 4k,8k,4k+24k, 8k, 4k+2 and 8k+28k+2 variables, respectively, by modifying the truth tables of two classes of quadratic bent-negabent functions with simple form. The algebraic normal forms and duals of these constructed functions are also determined. We further identify necessary and sufficient conditions for those bent-negabent functions which have the maximum algebraic degree. At last, by modifying the truth tables of a class of quadratic 2-rotation symmetric bent-negabent functions, we present a construction of 2-rotation symmetric bent-negabent functions with any possible algebraic degrees. Considering that there are probably no bent-negabent functions in the rotation symmetric class, it is the first significant attempt to construct bent-negabent functions in the generalized rotation symmetric class

    D.STVL.9 - Ongoing Research Areas in Symmetric Cryptography

    Get PDF
    This report gives a brief summary of some of the research trends in symmetric cryptography at the time of writing (2008). The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5)

    Ongoing Research Areas in Symmetric Cryptography

    Get PDF
    This report is a deliverable for the ECRYPT European network of excellence in cryptology. It gives a brief summary of some of the research trends in symmetric cryptography at the time of writing. The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the recently proposed algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5)

    D-branes at Toric Singularities: Model Building, Yukawa Couplings and Flavour Physics

    Full text link
    We discuss general properties of D-brane model building at toric singularities. Using dimer techniques to obtain the gauge theory from the structure of the singularity, we extract results on the matter sector and superpotential of the corresponding gauge theory. We show that the number of families in toric phases is always less than or equal to three, with a unique exception being the zeroth Hirzebruch surface. With the physical input of three generations we find that the lightest family of quarks is massless and the masses of the other two can be hierarchically separated. We compute the CKM matrix for explicit models in this setting and find the singularities possess sufficient structure to allow for realistic mixing between generations and CP violation.Comment: 55 pages, v2: typos corrected, minor comments adde

    Computational dynamics and virtual dragline simulation for extended rope service life

    Get PDF
    The dragline machinery is one of the largest equipment for stripping overburden materials in surface mining operations. Its effectiveness requires rigorous kinematic and dynamic analyses. Current dragline research studies are limited in computational dynamic modeling because they eliminate important structural components from the front-end assembly. Thus, the derived kinematic, dynamic and stress intensity models fail to capture the true response of the dragline under full operating cycle conditions. This research study advances a new and robust computational dynamic model of the dragline front-end assembly using Kane\u27s method. The model is a 3-DOF dynamic model that describes the spatial kinematics and dynamics of the dragline front-end assembly during digging and swinging. A virtual simulator, for a Marion 7800 dragline, is built and used for analyzing the mass and inertia properties of the front-end components. The models accurately predict the kinematics, dynamics and stress intensity profiles of the front-end assembly. The results showed that the maximum drag force is 1.375 MN, which is within the maximum allowable load of the machine. The maximum cutting resistance of 412.31 KN occurs 5 seconds into digging and the maximum hoist torque of 917. 87 KN occurs 10 seconds into swinging. Stress analyses are carried out on wire ropes using ANSYS Workbench under static and dynamic loading. The FEA results showed that significant stresses develop in the contact areas between the wires, with a maximum von Mises stress equivalent to 7800 MPa. This research study is a pioneering effort toward developing a comprehensive multibody dynamic model of the dragline machinery. The main novelty is incorporating the boom point-sheave, drag-chain and sliding effect of the bucket, excluded from previous research studies, to obtain computationally dynamic efficient models for load predictions --Abstract, page iii
    • …
    corecore