630 research outputs found

    Breaking a secure communication scheme based on the phase synchronization of chaotic systems

    Get PDF
    A security analysis of a recently proposed secure communication scheme based on the phase synchronization of chaotic systems is presented. It is shown that the system parameters directly determine the ciphertext waveform, hence it can be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure

    Breaking parameter modulated chaotic secure communication system

    Full text link
    This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.Comment: 8 pages, 3 figures, latex forma

    Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems

    Get PDF
    This paper describes how to determine the parameter values of the chaotic Lorenz system used in a two-channel cryptosystem. The geometrical properties of the Lorenz system are used firstly to reduce the parameter search space, then the parameters are exactly determined, directly from the ciphertext, through the minimization of the average jamming noise power created by the encryption process.Comment: 5 pages, 5 figures Preprint submitted to IEEE T. Cas II, revision of authors name spellin

    Gluon TMD fragmentation function into quarkonium

    Full text link
    We compute the gluon transverse-momentum-dependent fragmentation function (TMDFF) at next-to-leading order (NLO) into heavy quarkonium in the color-octet 3S1[8]^3S_1^{[8]} channel, based on the NRQCD factorization approach. The spurious rapidity divergences are explicitly shown to cancel in a well-defined TMDFF, which incorporates the needed soft factor. We also compute the integrated gluon FF at NLO in the same 3S1[8]^3S_1^{[8]} channel, and show that the matching coefficient of the TMDFF onto the FF at large transverse momentum is the expected one. These results are relevant to perform precise and sensible phenomenological studies of transverse-momentum spectra of quarkonium production, for which the production mechanism through fragmentation plays a relevant role, like in the future Electron-Ion Collider.Comment: v2: typos corrected; v1: 29 pages, 2 figure

    Cryptanalyzing a discrete-time chaos synchronization secure communication system

    Full text link
    This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.Comment: 11 pages, 3 figures, latex forma

    Leonardo's Civil Bridges

    Get PDF
    Within both aesthetic and history fields, civil engineering occupies a privileged place among arts whose manifestations are based on drawing. In this work, Leonardo’s creativity concerned with civil bridges proyects, have been studied. Leonardo designed ten bridges: eight of them intended for military porposes and only two were purely planned for civil functionaly - “Ponte sul corno d’oro”, infolio 66, manuscript L; and “Ponte a due piani”, represented in the Manuscript B at the Institute of France, infolio 23. There can be no doubt about Leonardo’s intentions when he started on designing these two bridges: his genious for creativy focused on providing both singulary and functionaly to the structures: they should be admired and utilized at the same time, a monument for civil society to be used.The work presented here attemps to make an scientist-historical trip along these Leonardo’s bridges, highlighting their technical, geometrical and aesthetic characteristics, as well as emphasizing Leonardo’s human, scientist and artistic nature
    corecore