We present an advanced brute force attack on the A5/1 keystream generator, that is still widely used in modern GSM networks. To greatly reduce the search space, we use a well-known idea, introduced by R. Anderson more...
详细信息
In this paper, we propose an algorithm for constructing guess-and-determine attacks on keystream generators and apply it to the cryptanalysis of the alternating step generator (ASG) and two its modifications (MASG and...
详细信息
This paper addresses the optimistic statement of one class of bilevel optimization problems (BOPs) with a nonconvex lower level. Namely, we study BOPs with a convex quadratic objective function at the upper level and ...
详细信息
The paper proposes a method for obtaining the missing information in the construction of a semantic network, based on the analysis of statistical data about the service use by users. The advantage of the method is tha...
详细信息
We study a class of optimal control problems for measure-driven differential equations with rate independent hysteresis. The hysteresis is modeled by an evolution variational inequality equivalent to the action of pla...
详细信息
When constructing a digital terrain model from the available vector data, iso-lines (relief contour lines) are used as the main source of information. Also the maps may contain the point elevation marks. To obtain the...
详细信息
The efficiency of the intelligent systems engineering on the basis of conceptual models can be improved through the use of specialized languages. The paper describes a domain-specific language designed for describing ...
详细信息
In this paper, we propose a matrix-vector Boolean differential model for constructing plans of computational actions in solving non-procedural problems on a computational model of a modular software system. The condit...
详细信息
The paper describes an approach for the computer-aided development of rule-based knowledge bases on the basis of analysis of fault trees represented with the aid of the author’s notation. The approach is based on the...
详细信息
The Conflict-Driven Clause Learning algorithms for solving the Boolean satisfiability problem comprise the major part of the methods used to solve various instances of the problems that arise in industry and science. ...
详细信息
暂无评论