We present an advanced brute force attack on the A5/1 keystream generator, that is still widely used in modern GSM networks. To greatly reduce the search space, we use a well-known idea, introduced by R. Anderson more...
详细信息
This paper addresses the nonconvex optimal control (OC) problem with the cost functional and inequality constraint given by the functionals of Bolza. All the functions in the statement of the problem are state-DC, i.e...
详细信息
In this paper, we propose an algorithm for constructing guess-and-determine attacks on keystream generators and apply it to the cryptanalysis of the alternating step generator (ASG) and two its modifications (MASG and...
详细信息
This work addresses the optimistic statement of a bilevel optimization problem with a general d.c. optimization problem at the upper level and a convex optimization problem at the lower level. First, we use the reduct...
详细信息
The article proposes a method based on the use of logical dynamic systems in the classification problem for Boolean vectors (binary feature vectors). This method has practical application in various fields of science ...
详细信息
A constructive logical method for the synthesis of the characteristic matrix of a linear binary dynamical system with a given set of one-point attractors and one-step dynamics of reaching this set from any state is pr...
详细信息
Set cover problems are among the most popular and well-studied models in facility location. In this paper, we address an extension of the set covering and partial set covering problems. We suppose that a set of custom...
详细信息
Based on the Boolean constraints method several problems of qualitative analysis of bipartite logical networks are solved. The dynamics of the trajectories behavior of these networks is studied over a finite time inte...
详细信息
A logic-syntactic method of object recognition on images is proposed that is based on logical inference with use of the structural description of objects. The search for boundaries of objects on the image is performed...
详细信息
暂无评论