630 research outputs found
Breaking a secure communication scheme based on the phase synchronization of chaotic systems
A security analysis of a recently proposed secure communication scheme based
on the phase synchronization of chaotic systems is presented. It is shown that
the system parameters directly determine the ciphertext waveform, hence it can
be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure
Breaking parameter modulated chaotic secure communication system
This paper describes the security weakness of a recently proposed secure
communication method based on parameter modulation of a chaotic system and
adaptive observer-based synchronization scheme. We show that the security is
compromised even without precise knowledge of the chaotic system used.Comment: 8 pages, 3 figures, latex forma
Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems
This paper describes how to determine the parameter values of the chaotic
Lorenz system used in a two-channel cryptosystem. The geometrical properties of
the Lorenz system are used firstly to reduce the parameter search space, then
the parameters are exactly determined, directly from the ciphertext, through
the minimization of the average jamming noise power created by the encryption
process.Comment: 5 pages, 5 figures Preprint submitted to IEEE T. Cas II, revision of
authors name spellin
Gluon TMD fragmentation function into quarkonium
We compute the gluon transverse-momentum-dependent fragmentation function
(TMDFF) at next-to-leading order (NLO) into heavy quarkonium in the color-octet
channel, based on the NRQCD factorization approach. The spurious
rapidity divergences are explicitly shown to cancel in a well-defined TMDFF,
which incorporates the needed soft factor. We also compute the integrated gluon
FF at NLO in the same channel, and show that the matching
coefficient of the TMDFF onto the FF at large transverse momentum is the
expected one. These results are relevant to perform precise and sensible
phenomenological studies of transverse-momentum spectra of quarkonium
production, for which the production mechanism through fragmentation plays a
relevant role, like in the future Electron-Ion Collider.Comment: v2: typos corrected; v1: 29 pages, 2 figure
Cryptanalyzing a discrete-time chaos synchronization secure communication system
This paper describes the security weakness of a recently proposed secure
communication method based on discrete-time chaos synchronization. We show that
the security is compromised even without precise knowledge of the chaotic
system used. We also make many suggestions to improve its security in future
versions.Comment: 11 pages, 3 figures, latex forma
Leonardo's Civil Bridges
Within both aesthetic and history fields, civil engineering occupies a privileged place among arts whose manifestations are based on drawing. In this work, Leonardo’s creativity concerned with civil bridges proyects, have been studied. Leonardo designed ten bridges: eight of them intended for military porposes and only two were purely planned for civil functionaly - “Ponte sul corno d’oro”, infolio 66, manuscript L; and “Ponte a due piani”, represented in the Manuscript B at the Institute of France, infolio 23. There can be no doubt about Leonardo’s intentions when he started on designing these two bridges: his genious for creativy focused on providing both singulary and functionaly to the structures: they should be admired and utilized at the same time, a monument for civil society to be used.The work presented here attemps to make an scientist-historical trip along these Leonardo’s bridges, highlighting their technical, geometrical and aesthetic characteristics, as well as emphasizing Leonardo’s human, scientist and artistic nature
- …